CN117314661A - Accounting processing method, device, equipment, medium and product - Google Patents

Accounting processing method, device, equipment, medium and product Download PDF

Info

Publication number
CN117314661A
CN117314661A CN202311133689.0A CN202311133689A CN117314661A CN 117314661 A CN117314661 A CN 117314661A CN 202311133689 A CN202311133689 A CN 202311133689A CN 117314661 A CN117314661 A CN 117314661A
Authority
CN
China
Prior art keywords
reconciliation
request
identity information
requester
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311133689.0A
Other languages
Chinese (zh)
Inventor
王聪
屈贯伟
唐锆
杨彬
陈耀星
张顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311133689.0A priority Critical patent/CN117314661A/en
Publication of CN117314661A publication Critical patent/CN117314661A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to a reconciliation processing method, a reconciliation processing device, computer equipment, a storage medium and a computer program product, which can be used in the technical field of big data. The method comprises the following steps: acquiring an account checking request and a corresponding first digital signature sent by a requester; obtaining request data based on the account checking request, the first digital signature and a preset hash function; acquiring a first transaction flow meter corresponding to a requester from a database based on the reserved foreign key field and the request data; acquiring a plurality of target identity information tables of a requesting party related to a reconciliation process from a database; and finishing the reconciliation process based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the reconciliation request. The method provided by the application enables the account checking flow to be more flexible and free.

Description

Accounting processing method, device, equipment, medium and product
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a reconciliation processing method, apparatus, computer device, storage medium, and computer program product.
Background
With the improvement of international socioeconomic status of China, the population of domestic entrepreneurs is rapidly growing. Especially for small and medium-sized micro enterprises, the method has the characteristics of flexible service and low cost, and gains rapid development in the large environment of country encouragement of entrepreneur. At present, the account checking mode of each small and medium-sized micro enterprise is mostly implemented by using a desktop computer and a U shield, the account checking scene mostly occurs in an office, the account checking mode depends on the U shield and a PC, the account checking mode is not very flexible, and particularly, the account checking difficulty of banks and enterprises can be caused under the condition that relevant personnel of the enterprises cannot arrive at the office in time.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a reconciliation processing method, apparatus, computer device, computer-readable storage medium, and computer program product that are capable of flexibly processing a reconciliation process.
In a first aspect, the present application provides a reconciliation processing method, the method including:
acquiring a reconciliation request and a corresponding first digital signature sent by a requester, wherein the reconciliation request corresponds to one reconciliation step in a reconciliation process, the reconciliation process comprises a plurality of reconciliation steps, and each reconciliation step corresponds to an application program interface;
obtaining request data based on the reconciliation request, the first digital signature and a preset hash function;
acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester;
acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from the database, wherein each target identity information table stores one type of identity information;
and finishing the checking flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the checking request.
In one embodiment, the obtaining request data based on the reconciliation request, the first digital signature and a preset hash function includes:
decrypting the first digital signature by using the public key to obtain a first message digest;
carrying out hash processing on the reconciliation request by utilizing the preset hash function to obtain a second message abstract;
and if the first message abstract is consistent with the second message abstract, decrypting the reconciliation request by using a private key to obtain request data.
In one embodiment, the step of completing the reconciliation process based on the first transaction flow meter, the target identity information table, and the application program interface corresponding to the reconciliation request includes:
if the identity information does not comprise the target identifier, merging all target identity information tables corresponding to the first transaction flow meter and the requester to obtain a target data table, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request;
and obtaining a corresponding account checking request and a corresponding digital signature of the next account checking step sent by the requesting party, returning to the step of decrypting the digital signature by using the public key to obtain a first message abstract, and continuing to execute until the account checking process is finished.
In one embodiment, the method further comprises:
and if the target identity information comprises the target identifier, returning an instruction for stopping reconciliation to the requester.
In one embodiment, the returning the target data table to the requester via the application program interface corresponding to the reconciliation request includes:
encrypting the target data table by using the public key;
generating a third message digest corresponding to the target data table based on the preset hash function;
encrypting the third message digest by using the private key to obtain a second digital signature;
and returning the encrypted target data table and the second digital signature to the requester through the application program interface.
In one embodiment, the method further comprises:
acquiring a day cutting time point;
and updating the first transaction flow meter and all target identity information tables stored in a database at the daily cut time point.
In a second aspect, the present application further provides a reconciliation processing apparatus, the apparatus comprising:
the first acquisition module is used for acquiring a checking request and a corresponding first digital signature sent by a requester, wherein the checking request corresponds to one checking step in a checking flow, the checking flow comprises a plurality of checking steps, and each checking step corresponds to one application program interface;
The second acquisition module is used for acquiring request data based on the reconciliation request, the first digital signature and a preset hash function;
the third acquisition module is used for acquiring a first transaction flow water meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow water meter with a second transaction flow water meter stored by the requester;
a fourth obtaining module, configured to obtain, from the database, a plurality of target identity information tables related to the reconciliation process of the requesting party, where each target identity information table stores one type of identity information;
and the accounting module is used for finishing an accounting flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the accounting request.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the method of any of the embodiments described above when the computer program is executed by the processor.
In a fourth aspect, the present application also provides a computer-readable storage medium. A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method of any of the embodiments described above.
In a fifth aspect, the present application also provides a computer program product. A computer program product comprising a computer program which, when executed by a processor, implements the steps of the method of any of the embodiments described above.
The method, the device, the computer equipment, the storage medium and the computer program product for checking account acquire the checking account request and the corresponding first digital signature sent by the requester, wherein the checking account request corresponds to one checking account step in a checking account flow, the checking account flow comprises a plurality of checking account steps, and each checking account step corresponds to an application program interface; obtaining request data based on the account checking request, the first digital signature and a preset hash function; acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester; acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from a database, wherein each target identity information table stores one type of identity information; and finishing the reconciliation process based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the reconciliation request. According to the method provided by the application program interface, each checking step corresponds to one application program interface, so that no matter what equipment the terminal of the requesting party is, as long as communication connection can be established between the terminal and the bank terminal through the application program interface, the checking flow can be carried out in steps by sending the checking request to the bank terminal, and the checking flow is more flexible and free.
Drawings
FIG. 1 is a flow diagram of a reconciliation process methodology in one embodiment;
FIG. 2 is a flow chart of a method for sending a target data table in one embodiment;
FIG. 3 is a block diagram of a reconciliation processing apparatus in one embodiment;
fig. 4 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, a reconciliation processing method is provided, where this embodiment is applied to a terminal for illustration, it is understood that the method may also be applied to a server, and may also be applied to a system including a terminal and a server, and implemented through interaction between the terminal and the server. In this embodiment, the method includes the steps of:
s102, acquiring a checking request and a corresponding first digital signature sent by a requester, wherein the checking request corresponds to one checking step in a checking flow, the checking flow comprises a plurality of checking steps, and each checking step corresponds to an application program interface.
In the field of banks or finance, the requestor can be a client who has business to and from the bank or the finance institution; the digital signature is a section of digital string which can not be forged by others only generated by the information sender, and the section of digital string is also a valid proof for the authenticity of the information sent by the information sender; the reconciliation process between the bank or the financial institution and the customer may include reconciliation steps such as reconciliation authorization, sponsored reconciliation, approval reconciliation, and bill inquiry, and the reconciliation process may be used in other fields, which is not specifically limited in the embodiments of the present application; an application program interface (Application Programming Interface, API) is a set of specifications defining the manner in which software components interact with each other, allowing communication and interaction between different software systems to perform various functions.
Specifically, the requester sequentially sends the reconciliation request and the corresponding first digital signature to the terminal through the application program interface corresponding to the reconciliation steps according to the sequence of each reconciliation step in the reconciliation process, and the terminal processes the corresponding reconciliation steps after receiving the reconciliation request and the first digital signature.
S104, obtaining request data based on the reconciliation request, the first digital signature and a preset hash function.
The hash function is an algorithm for converting an input with any length into an output with a fixed length, and is mainly characterized in that the same output is always generated for the same input, and different outputs are generated for different inputs.
Specifically, the reconciliation request can be processed by using a preset hash function, the first digital signature is processed by using the public key, the first digital signature is checked based on two processing results, and after the check passes, the reconciliation request is processed by using the private key to obtain corresponding request data.
S106, based on the reserved foreign key field and the request data, acquiring a first transaction flow meter corresponding to the request party from the database, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the request party.
The reserved foreign key field is a mechanism for establishing the association relationship between the tables in the relational database, the foreign key field is a field in one table and refers to a main key field of the other table, so that the relationship between the tables is established; in the banking or financial field, the transaction flow meter is used for recording detailed information of all transaction activities between a bank and a customer, the first transaction flow meter is a transaction flow meter stored in a bank side database, the second transaction flow meter is a transaction flow meter stored in a customer side, and the transaction flow meter can also be used in other fields, and the embodiment of the application is not limited in particular.
S108, acquiring a plurality of target identity information tables related to the reconciliation process of the requesting party from the database, wherein each target identity information table stores one type of identity information.
The method comprises the steps of abstracting a plurality of identity information of a requester into a plurality of corresponding data models in an object-oriented mode, and mapping the plurality of data models into a plurality of target identity information tables with association relations according to BC paradigm requirements. In the banking or financial field, if the requesting party is an individual, the identity information is basic information of the individual, and if the requesting party is an enterprise, the identity information may include enterprise information, corporate legal information, and corporate financial staff information.
S110, based on the first transaction flow water meter, the target identity information table and the corresponding application program interfaces of the reconciliation request, the reconciliation process is completed.
And the identity information is used for judging whether the requesting party has the reconciliation qualification, and under the condition that the requesting party has the reconciliation qualification, the corresponding reconciliation step of the reconciliation request is completed, and the first transaction flow water meter and the target identity information table are processed and then sent to the requesting party for informing the requesting party that the current reconciliation step is completed. In the banking or financial field, the reconciliation qualification may be a credit score of the customer, and when the credit score of the customer is below a preset scoring threshold, it is determined that the customer is not entitled to reconciliation.
In the checking method, a checking request sent by a requester and a corresponding first digital signature are obtained, the checking request corresponds to one checking step in a checking flow, the checking flow comprises a plurality of checking steps, and each checking step corresponds to an application program interface; obtaining request data based on the account checking request, the first digital signature and a preset hash function; acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester; acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from a database, wherein each target identity information table stores one type of identity information; and finishing the reconciliation process based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the reconciliation request. According to the method provided by the application program interface, each checking step corresponds to one application program interface, so that no matter what equipment the terminal of the requesting party is, as long as communication connection can be established between the terminal and the bank terminal through the application program interface, the checking flow can be carried out in steps by sending the checking request to the bank terminal, and the checking flow is more flexible and free.
In some embodiments, obtaining the request data based on the reconciliation request, the first digital signature, and the preset hash function includes: decrypting the first digital signature by using the public key to obtain a first message digest; carrying out hash processing on the account checking request by using a preset hash function to obtain a second message abstract; if the first message abstract is consistent with the second message abstract, decrypting the account checking request by using the private key to obtain request data.
The message digest is a fixed-length character string obtained by abstracting or hashing a piece of data.
In this embodiment, the first digital signature and the reconciliation request are respectively processed to obtain the first message digest and the second message digest, and the first message digest and the second message digest are compared to check the first digital signature, so that whether the reconciliation request is sent by the requester can be verified, and other parties can be effectively prevented from masquerading as the requester to send the reconciliation request.
In some embodiments, as shown in fig. 2, based on the first transaction flow meter, the target identity information table, and the application program interface corresponding to the reconciliation request, the reconciliation process is completed, including:
S202, if the identity information does not comprise the target identifier, merging all target identity information tables corresponding to the first transaction flow meter and the requester to obtain a target data table, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request.
The target identifier is used to determine whether the requester is qualified for reconciliation, and in the banking or financial field, the target identifier may refer to that the credit score of the client is lower than a preset score threshold, where the client does not have the reconciliation qualification.
S204, obtaining a corresponding account checking request and a corresponding digital signature of the next account checking step sent by the requesting party, returning to the step of decrypting the digital signature by using the public key to obtain the first message abstract, and continuing to execute until the account checking process is finished.
After the target data table is acquired, the requester checks the current checking result and sends a corresponding checking request of the next checking step to the terminal through a corresponding application program interface.
In this embodiment, whether the requester has the reconciliation qualification is determined through the target identifier, and the reconciliation process is performed only when the requester has the reconciliation qualification, so that the entire reconciliation process is more complete.
In some embodiments, the method further comprises: and if the target identity information comprises the target identifier, returning an instruction for stopping checking to the requester.
The instruction for stopping the checking out is used for reminding the requester that the requester does not have the checking out qualification, and in the field of banks or finance, the instruction for stopping the checking out is used for reminding the client that the credit score of the client is too low and the client cannot check out temporarily, and the client can continue to initiate the checking out request after the credit score of the client is improved to a preset score threshold value through corresponding processing.
In this embodiment, when the requester does not have the reconciliation qualification, the reconciliation process is stopped, so that the security of the reconciliation process can be ensured.
In some embodiments, returning the target data table to the requestor via the application program interface corresponding to the reconciliation request includes: encrypting the target data table by using the public key; generating a third message digest corresponding to the target data table based on a preset hash function; encrypting the third message digest by using the private key to obtain a second digital signature; the encrypted target data table and the second digital signature are returned to the requestor via the application program interface.
After receiving the target data table encrypted by the public key, the requester can decrypt the target data table by using the private key.
In the embodiment, the security in the sending process of the target data table can be effectively ensured by encrypting the target data table and generating the second digital signature corresponding to the target data table.
In some embodiments, the method further comprises: acquiring a day cutting time point; updating the first transaction flow table and all target identity information tables stored in the database at the time point of day cut.
The day-cut time point refers to a time point at which system settlement and data processing are performed after each transaction day is finished in a bank or a financial institution. After this point in time, the system will perform accounting, interest calculation, risk management, and report generation to ensure that the data and accounts for each transaction day are properly processed and updated.
In this embodiment, the relevant data is updated at the daily time point of each day, so that the real-time performance of the data related to the reconciliation process can be ensured.
In one embodiment, another reconciliation processing method is provided, and a corresponding system includes an API service filter, an API service controller, a data model and data table record conversion module, a data model description module, and a scheduler. The API service filter realizes signature verification and decryption functions of the checking request by rewriting a standard filter method, and the checking request subjected to signature verification and decryption can call up a corresponding API service controller; the API service controller receives the data plaintext, calls a database through a data model and data table record conversion module to finish account checking authorization, account checking by a manager, account checking by approval, bill inquiry and record operation flow; the data model and data table record conversion module needs the module in the server, the embodiment adopts hibernate, when the data is inserted into the database, the data model instance with assigned value in the memory is converted into a record of the database table, or after the database is queried, a data record is converted into a data model instance with assigned value in the memory; the data model description module comprises all data model description files, describes types of various fields in a transaction and operation stream data model, and comprises basic data types such as character strings, integers, dates, floating point numbers and the like; after 0 day-cut, the scheduler scans all updated enterprise information, enterprise legal person information and enterprise financial person information and updates the application database, and in this embodiment, the scheduler adopts spring+quantiz. The method comprises the following steps:
(1) Transactions such as reconciliation authorization, administrative reconciliation, approval reconciliation, bill inquiry and the like are consolidated and named as different APIs.
(2) And abstracting the enterprise information, the enterprise legal information and the enterprise financial staff information into a data model in an object-oriented mode.
(3) And according to BC paradigm requirements, mapping the object-oriented data model into a plurality of data tables with association relations, and reserving an external Key (foring Key) field in the transaction flow water meter for association with the transaction flow of the partner.
(4) And constructing a filter layer of the API service to carry out message verification. And the signature part of the uploaded data is checked by using a public key certificate, and the transaction with successful check can be continuously executed, so that the caller of the transaction is ensured to be a legal partner with a private key.
(5) Message decryption is performed at the filter layer of the API service. After the signature verification is successful, the message is decrypted by using the private key, and the fact that the data is not tampered and the tampered message fails in decryption is confirmed.
(6) And constructing a controller of the API service, and inquiring the repudiation information and rejecting the service reservation.
(7) And constructing a dispatcher, and updating information such as enterprise information, enterprise legal information, enterprise financial staff information and the like at 0 point per day.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a reconciliation processing device for realizing the reconciliation processing method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the reconciliation processing device or devices provided below may be referred to the limitation of the reconciliation processing method hereinabove, and will not be repeated here.
In one embodiment, as shown in fig. 3, there is provided a reconciliation processing apparatus 300 comprising: a first acquisition module 30, a second acquisition module 302, a third acquisition module 303, a fourth acquisition module 304, and a reconciliation module 305, wherein:
the first obtaining module 301 is configured to obtain a reconciliation request sent by a requester and a corresponding first digital signature, where the reconciliation request corresponds to one reconciliation step in a reconciliation process, and the reconciliation process includes a plurality of reconciliation steps, and each reconciliation step corresponds to an application interface.
The second obtaining module 302 is configured to obtain request data based on the reconciliation request, the first digital signature, and a preset hash function.
And a third obtaining module 303, configured to obtain, from a database, a first transaction flow meter corresponding to the requester based on a reserved foreign key field and the request data, where the reserved foreign key field is used to associate the first transaction flow meter with a second transaction flow meter stored by the requester.
The fourth obtaining module 304 is configured to obtain, from the database, a plurality of target identity information tables related to the reconciliation process for the requesting party, where each target identity information table stores one type of identity information.
And the accounting module 305 is configured to complete an accounting process based on the first transaction flow meter, the target identity information table, and an application program interface corresponding to the accounting request.
In some embodiments, the second obtaining module 302 is further configured to decrypt the first digital signature by using a public key to obtain a first message digest; carrying out hash processing on the reconciliation request by utilizing the preset hash function to obtain a second message abstract; and if the first message abstract is consistent with the second message abstract, decrypting the reconciliation request by using a private key to obtain request data.
In some embodiments, reconciliation module 305 includes:
and the table merging unit is used for merging all the target identity information tables corresponding to the first transaction flow water meter and the requester to obtain a target data table if the identity information does not comprise the target identifier, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request.
And the acquisition unit is used for acquiring the corresponding account checking request and the corresponding digital signature of the next account checking step sent by the requester, returning to the step of decrypting the digital signature by using the public key to obtain the first message abstract, and continuing to execute until the account checking flow is processed.
In some embodiments, the reconciliation module 305 is further configured to return an instruction to stop reconciliation to the requestor if the target identity information includes the target identifier.
In some embodiments, the obtaining unit is further configured to encrypt the target data table with the public key; generating a third message digest corresponding to the target data table based on the preset hash function; encrypting the third message digest by using the private key to obtain a second digital signature; and returning the encrypted target data table and the second digital signature to the requester through the application program interface.
In some embodiments, the reconciliation processing apparatus 300 is specifically configured to obtain a day cut time point; and updating the first transaction flow meter and all target identity information tables stored in a database at the daily cut time point.
The respective modules in the reconciliation processing apparatus described above may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a reconciliation processing method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structures shown in FIG. 4 are block diagrams only and do not constitute a limitation of the computer device on which the present aspects apply, and that a particular computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of: acquiring a reconciliation request and a corresponding first digital signature sent by a requester, wherein the reconciliation request corresponds to one reconciliation step in a reconciliation process, the reconciliation process comprises a plurality of reconciliation steps, and each reconciliation step corresponds to an application program interface; obtaining request data based on the reconciliation request, the first digital signature and a preset hash function; acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester; acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from the database, wherein each target identity information table stores one type of identity information; and finishing the checking flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the checking request.
In one embodiment, the obtaining, by the processor when executing the computer program, request data based on the reconciliation request, the first digital signature, and a preset hash function includes: decrypting the first digital signature by using the public key to obtain a first message digest; carrying out hash processing on the reconciliation request by utilizing the preset hash function to obtain a second message abstract; and if the first message abstract is consistent with the second message abstract, decrypting the reconciliation request by using a private key to obtain request data.
In one embodiment, the processor, when executing the computer program, completes the reconciliation process based on the first transaction flow meter, the target identity information table and the application program interface corresponding to the reconciliation request, including: if the identity information does not comprise the target identifier, merging all target identity information tables corresponding to the first transaction flow meter and the requester to obtain a target data table, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request; and obtaining a corresponding account checking request and a corresponding digital signature of the next account checking step sent by the requesting party, returning to the step of decrypting the digital signature by using the public key to obtain a first message abstract, and continuing to execute until the account checking process is finished.
In one embodiment, the method implemented when the processor executes the computer program further comprises: and if the target identity information comprises the target identifier, returning an instruction for stopping reconciliation to the requester.
In one embodiment, the return of the target data table to the requestor via the application program interface corresponding to the reconciliation request, which is implemented when the processor executes the computer program, comprises: encrypting the target data table by using the public key; generating a third message digest corresponding to the target data table based on the preset hash function; encrypting the third message digest by using the private key to obtain a second digital signature; and returning the encrypted target data table and the second digital signature to the requester through the application program interface.
In one embodiment, the method implemented when the processor executes the computer program further comprises: acquiring a day cutting time point; and updating the first transaction flow meter and all target identity information tables stored in a database at the daily cut time point.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring a reconciliation request and a corresponding first digital signature sent by a requester, wherein the reconciliation request corresponds to one reconciliation step in a reconciliation process, the reconciliation process comprises a plurality of reconciliation steps, and each reconciliation step corresponds to an application program interface; obtaining request data based on the reconciliation request, the first digital signature and a preset hash function; acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester; acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from the database, wherein each target identity information table stores one type of identity information; and finishing the checking flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the checking request.
In one embodiment, the obtaining the request data based on the reconciliation request, the first digital signature, and a preset hash function implemented when the computer program is executed by the processor includes: decrypting the first digital signature by using the public key to obtain a first message digest; carrying out hash processing on the reconciliation request by utilizing the preset hash function to obtain a second message abstract; and if the first message abstract is consistent with the second message abstract, decrypting the reconciliation request by using a private key to obtain request data.
In one embodiment, the implementation of the computer program when executed by the processor completes the reconciliation process based on the first transaction flow meter, the target identity information table, and the application program interface corresponding to the reconciliation request, including: if the identity information does not comprise the target identifier, merging all target identity information tables corresponding to the first transaction flow meter and the requester to obtain a target data table, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request; and obtaining a corresponding account checking request and a corresponding digital signature of the next account checking step sent by the requesting party, returning to the step of decrypting the digital signature by using the public key to obtain a first message abstract, and continuing to execute until the account checking process is finished.
In one embodiment, the method implemented by the computer program when executed by the processor further comprises: and if the target identity information comprises the target identifier, returning an instruction for stopping reconciliation to the requester.
In one embodiment, the return of the target data table to the requestor via the application program interface corresponding to the reconciliation request, which is implemented when the computer program is executed by the processor, comprises: encrypting the target data table by using the public key; generating a third message digest corresponding to the target data table based on the preset hash function; encrypting the third message digest by using the private key to obtain a second digital signature; and returning the encrypted target data table and the second digital signature to the requester through the application program interface.
In one embodiment, the method implemented by the computer program when executed by the processor further comprises: acquiring a day cutting time point; and updating the first transaction flow meter and all target identity information tables stored in a database at the daily cut time point.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of: acquiring a reconciliation request and a corresponding first digital signature sent by a requester, wherein the reconciliation request corresponds to one reconciliation step in a reconciliation process, the reconciliation process comprises a plurality of reconciliation steps, and each reconciliation step corresponds to an application program interface; obtaining request data based on the reconciliation request, the first digital signature and a preset hash function; acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester; acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from the database, wherein each target identity information table stores one type of identity information; and finishing the checking flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the checking request.
In one embodiment, the obtaining the request data based on the reconciliation request, the first digital signature, and a preset hash function implemented when the computer program is executed by the processor includes: decrypting the first digital signature by using the public key to obtain a first message digest; carrying out hash processing on the reconciliation request by utilizing the preset hash function to obtain a second message abstract; and if the first message abstract is consistent with the second message abstract, decrypting the reconciliation request by using a private key to obtain request data.
In one embodiment, the implementation of the computer program when executed by the processor completes the reconciliation process based on the first transaction flow meter, the target identity information table, and the application program interface corresponding to the reconciliation request, including: if the identity information does not comprise the target identifier, merging all target identity information tables corresponding to the first transaction flow meter and the requester to obtain a target data table, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request; and obtaining a corresponding account checking request and a corresponding digital signature of the next account checking step sent by the requesting party, returning to the step of decrypting the digital signature by using the public key to obtain a first message abstract, and continuing to execute until the account checking process is finished.
In one embodiment, the method implemented by the computer program when executed by the processor further comprises: and if the target identity information comprises the target identifier, returning an instruction for stopping reconciliation to the requester.
In one embodiment, the return of the target data table to the requestor via the application program interface corresponding to the reconciliation request, which is implemented when the computer program is executed by the processor, comprises: encrypting the target data table by using the public key; generating a third message digest corresponding to the target data table based on the preset hash function; encrypting the third message digest by using the private key to obtain a second digital signature; and returning the encrypted target data table and the second digital signature to the requester through the application program interface.
In one embodiment, the method implemented by the computer program when executed by the processor further comprises: acquiring a day cutting time point; and updating the first transaction flow meter and all target identity information tables stored in a database at the daily cut time point.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. A method of reconciliation processing, the method comprising:
acquiring a reconciliation request and a corresponding first digital signature sent by a requester, wherein the reconciliation request corresponds to one reconciliation step in a reconciliation process, the reconciliation process comprises a plurality of reconciliation steps, and each reconciliation step corresponds to an application program interface;
obtaining request data based on the reconciliation request, the first digital signature and a preset hash function;
Acquiring a first transaction flow meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow meter with a second transaction flow meter stored by the requester;
acquiring a plurality of target identity information tables related to the reconciliation process of a requesting party from the database, wherein each target identity information table stores one type of identity information;
and finishing the checking flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the checking request.
2. The method of claim 1, wherein the obtaining request data based on the reconciliation request, the first digital signature, and a preset hash function comprises:
decrypting the first digital signature by using the public key to obtain a first message digest;
carrying out hash processing on the reconciliation request by utilizing the preset hash function to obtain a second message abstract;
and if the first message abstract is consistent with the second message abstract, decrypting the reconciliation request by using a private key to obtain request data.
3. The method of claim 2, wherein the completing the reconciliation process based on the first transaction flow meter, the target identity information table, and the application program interface corresponding to the reconciliation request comprises:
If the identity information does not comprise the target identifier, merging all target identity information tables corresponding to the first transaction flow meter and the requester to obtain a target data table, and returning the target data table to the requester through an application program interface corresponding to the reconciliation request;
and obtaining a corresponding account checking request and a corresponding digital signature of the next account checking step sent by the requesting party, returning to the step of decrypting the digital signature by using the public key to obtain a first message abstract, and continuing to execute until the account checking process is finished.
4. A method according to claim 3, characterized in that the method further comprises:
and if the target identity information comprises the target identifier, returning an instruction for stopping reconciliation to the requester.
5. A method according to any one of claims 3, wherein said returning the target data table to the requestor via the application program interface corresponding to the reconciliation request comprises:
encrypting the target data table by using the public key;
generating a third message digest corresponding to the target data table based on the preset hash function;
Encrypting the third message digest by using the private key to obtain a second digital signature;
and returning the encrypted target data table and the second digital signature to the requester through the application program interface.
6. The method according to claim 1, wherein the method further comprises:
acquiring a day cutting time point;
and updating the first transaction flow meter and all target identity information tables stored in a database at the daily cut time point.
7. A reconciliation processing apparatus, the apparatus comprising:
the first acquisition module is used for acquiring a checking request and a corresponding first digital signature sent by a requester, wherein the checking request corresponds to one checking step in a checking flow, the checking flow comprises a plurality of checking steps, and each checking step corresponds to one application program interface;
the second acquisition module is used for acquiring request data based on the reconciliation request, the first digital signature and a preset hash function;
the third acquisition module is used for acquiring a first transaction flow water meter corresponding to the requester from a database based on a reserved foreign key field and the request data, wherein the reserved foreign key field is used for associating the first transaction flow water meter with a second transaction flow water meter stored by the requester;
A fourth obtaining module, configured to obtain, from the database, a plurality of target identity information tables related to the reconciliation process of the requesting party, where each target identity information table stores one type of identity information;
and the accounting module is used for finishing an accounting flow based on the first transaction flow water meter, the target identity information table and the application program interface corresponding to the accounting request.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202311133689.0A 2023-09-04 2023-09-04 Accounting processing method, device, equipment, medium and product Pending CN117314661A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311133689.0A CN117314661A (en) 2023-09-04 2023-09-04 Accounting processing method, device, equipment, medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311133689.0A CN117314661A (en) 2023-09-04 2023-09-04 Accounting processing method, device, equipment, medium and product

Publications (1)

Publication Number Publication Date
CN117314661A true CN117314661A (en) 2023-12-29

Family

ID=89236201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311133689.0A Pending CN117314661A (en) 2023-09-04 2023-09-04 Accounting processing method, device, equipment, medium and product

Country Status (1)

Country Link
CN (1) CN117314661A (en)

Similar Documents

Publication Publication Date Title
US11563728B2 (en) System and method for identity management
US11055391B2 (en) System and method for identity management
US20230342734A1 (en) Systems, methods, and apparatuses for implementing smart flow contracts using distributed ledger technologies in a cloud based computing environment
Wolfond A blockchain ecosystem for digital identity: improving service delivery in Canada’s public and private sectors
WO2020108046A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
US20230106484A1 (en) Cryptographic Asset Collateral Management
US20200119906A1 (en) Systems, methods, and apparatuses for information isolation using a distributed ledger accessible by a cloud based computing environment
US9876803B2 (en) System and method for identity management
US20190238316A1 (en) Systems, methods, and apparatuses for implementing intelligent consensus, smart consensus, and weighted consensus models for distributed ledger technologies in a cloud based computing environment
US20240048357A1 (en) Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network
WO2021135169A1 (en) Blockchain-based management method, terminal, apparatus, and storage medium
US9697263B1 (en) Consumer data request fulfillment system
CN110771095A (en) System and method for implementing blockchain-based digital certificates
US20200320622A1 (en) Method and system for processing and documenting digital transactions
CN110800254A (en) System and method for generating digital indicia
WO2020073828A1 (en) Auditing result data storage and query method, and auditing item storage method and apparatus
TW202134903A (en) Information read-write method and device based on block chain
WO2020008445A1 (en) Encrypted blockchain voting system
CN112801778A (en) Federated bad asset blockchain
CN114265577A (en) Service data processing method and device, computer equipment and storage medium
US20230135294A1 (en) Cosigning Using Tokenized Reputation Scores
CN117314661A (en) Accounting processing method, device, equipment, medium and product
CN115099800A (en) Block chain based method and device for transferring poor asset data
CN114565443A (en) Data processing method, data processing device, computer equipment and storage medium
CN114528532A (en) Supply chain data evidence storing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination