CN102355461A - XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system - Google Patents

XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system Download PDF

Info

Publication number
CN102355461A
CN102355461A CN2011103009288A CN201110300928A CN102355461A CN 102355461 A CN102355461 A CN 102355461A CN 2011103009288 A CN2011103009288 A CN 2011103009288A CN 201110300928 A CN201110300928 A CN 201110300928A CN 102355461 A CN102355461 A CN 102355461A
Authority
CN
China
Prior art keywords
xbrl
module
document
verification
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103009288A
Other languages
Chinese (zh)
Other versions
CN102355461B (en
Inventor
张昊
李军学
段鑫
王彦桂
殷进春
王琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Haoan Intelligent Technology Co., Ltd.
Original Assignee
Guangzhou Ch Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Ch Control Technology Co Ltd filed Critical Guangzhou Ch Control Technology Co Ltd
Priority to CN201110300928.8A priority Critical patent/CN102355461B/en
Publication of CN102355461A publication Critical patent/CN102355461A/en
Application granted granted Critical
Publication of CN102355461B publication Critical patent/CN102355461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an XBRL (Extensible Business Reporting Language) credible data storage method and a credible data storage system. The system comprises an XBRL secure storage and transmission system, wherein an XBRL document data checker and an XBRL document clearing tool. The method comprises three aspects that: at least one secure mode is adopted for data storage and transmission; document checking is adopted to ensure the reliability of a document; and the document is cleared. The secure storage and transmission functions of the XBRL credible data storage method and the system are achieved based on the traditional security strategy in combination with the advantages of various technologies, and various defects can be overcome. Due to introduction of a WEB service security architecture, the problems of information exchange between heterogeneous systems and heterogeneous platforms can be solved, the problem that the conventional security technologies and tools cannot be used can be solved at the same time, and the target of the method and the system is identical to the target of information exchange of XBRL between the heterogeneous systems.

Description

A kind of XBRL trust data storage means and trusted data storage system
Technical field
The present invention relates to the trusted storage processing method of business data such as accounting statement etc., particularly a kind of method and system that utilizes XBRL (eXtensible Business Reporting Language can expand the business report language) to carry out the business data storage.
Background technology
XBRL be one based on XML (extend markup language, eXtensible Markup Language) be used for specially work out business finance report, under network environment, disclose company information, improve the standardized language of ability to utilize information.XBRL provides a standardized method that exchanges Financial Reporting of Corporation with diversified form announcement, reliable acquisition with automation; But XBRL information encoded reliability and integrality exist many-sided threat simultaneously, and appropriately whether whether use, accounting item and data can accurately be mapped to correspondence markings, whether all data can guarantee all to have added mark like criteria for classification.In addition, as unprotected data among other XML, the XBRL document is vulnerable to rogue attacks, and anyone can be easy to create and distort the XBRL instance document.
Because of XBRL is based on XML, cause XBRL itself not consider quality of information, do not consider also whether information is reliable, and quality of information and reliability are very important concerning financial report.
The reliability of XBRL document information mainly depends on the process reliability that produces the document, the measure of the assurance fail safe of in the transmission over networks process, being implemented in security strategy character, degree and the information implemented on this information etc.The criteria for classification that insecurity mainly shows as use is mistake or inauthoritative, and employed label is skimble-scamble, and the XBRL document also is easy to by disabled user's visit and modification.The needs that these potential safety hazards have are artificially controlled, and the needs employing corresponding techniques that has is carried out safety and guaranteed.
The fail safe of XBRL document comprises authenticity, integrality and the confidentiality etc. of information, and a real financial report need be audited by the financial audit personnel.And the XBRL technology is not protected information, and anyone can revise, such one piece the report through audit just can not be shown as through auditing, so authenticity that can not guarantee information.
In addition, the XBRL document need transmit through network, and the XBRL document need consider to store the safety of document and the safety of transferring documents.
XBRL is based on the XML technology, and the XBRL document need transmit with the Web service form, so the XBRL document exists the demand for security of XML document, also exists the demand for security of Web service.
XBRL advantage on financial report issue and analyzing and processing is very tangible; But also have many deficiencies and defective, as criteria for classification set as yet standardization fully, network security problem, storage problem, enterprise to the understanding of XBRL have to be strengthened, corresponding software is not enough, technical threshold is higher and local industry protection doctrine resistance etc.XBRL comprises following aspect to the influence of financial report measuring quality standard:
1. to the influence of correlation
1) as far as enterprise, from simply storing the greater role of performance accounting information into.Because the XBRL transmission is more basic metadata, thereby significantly reduces transmission quantity, improves the supply and demand promptness of accounting information greatly; Also conveniently carry out different times, the convertible comparison of accounting statement information under the different accounting standard systems; In addition, but because the characteristic of XBRL mark makes storage, search and excavation become easily, thereby find out " rule " more easily, make reliable deduction for the decision-making in future, have predictive value.
2) as far as affairs auditor in one's power, from simply discerning increase in value.The support of XBRL technology promotes the reliability of data greatly; Under the prerequisite that has guaranteed reliability; Affairs auditor in one's power also can be from simply discerning originally; Enterprise does to record separately whether just and sound reaching and from the legal link of not rising in value, spins off; Energy and Limited resources put in the increment link that promotes enterprise value go, be i.e. non-audit operations on the ordinary meaning.
3), receive interactive customization from passive as far as the form user.XBRL is provided with the feedback information of both sides of supply and demand and links up approach, thereby the feedback that improves accounting information is worth.And the extensibility of XBRL, make XBRL face new things and can carry out the part transformation of the way faster and add definition, be to make feedback opinion better obtain the important assurance of replying; In addition, unify at XBRL on the former data flow of standard, through the adjustment output format, the report user can obtain that it is required, interactive customization.
2. to the influence of reliability
1) XBRL can solve under traditional financial information supplying mode since " management level crime " and input error to the influence of data reliability.Be that the basis is write and issued under the financial report pattern with XBRL; Economic work just in time sends information centre automatically to through computer and externally announces after generation; The company that can prevent handles and distorts accounting data in the later stage arbitrarily, thereby solved " the management level crime ".Because data no longer are to repeat input, thereby have reduced input error.
2) XBRL issues on the net and can accelerate issue speed, and the generation time that this reduces enterprise's report to a great extent makes real-time monitoring and continuous audit become possibility.Because XBRL only told about data " what is ", and it is not handled, therefore according to the reconfiguring of the former data of bottom, with financial statement storage, transmission with utilize again.
3) be that the authenticity that each side supervises authorization information is convenient in the financial report that the basis is write and issued with XBRL." boring down " function of the existence of managing detailed catalogue, non-financial information and XBRL makes the user review, to check and to verify the financial report data.
Common XBRL data quality problem
In sum, the quality of data of XBRL instance document is mainly decided the degree of observing of XBRL technical specification by the quality of data in initial data source and instance document.
The main body of instance document is professional relevant data, and possibly there is following problem in the quality of data of these data:
1) data disappearance
Lose some data necessary item, such as fund be called for short, Net asset value is NULL, this maybe be uncertain owing to the data acquisition duration, misoperation or adopted reason such as default value to cause.
2) data redundancy with conflict
Identical element occurs repeatedly quoting identical context, and the repetition of data generation just conflict just occurred if the value of data is inequality.Occur when these all can cause instance document to be used can't specified data problem.
3) data relationship mistake
Business datum in the instance document possibly run counter to some business relations that must observe, and such as the rule that " assets=debt+owner's equity " are arranged in the financial report, the data in the instance document possibly not satisfy this requirement for some reason.
In addition; The technological frame of instance document is decided by the XBRL standard; So must observe the dependency rule of XBRL technically; Possibly comprise XBRL2.1, FRIS1.0, Formula 1.0, Dimension1.0 etc.; Specifically to see the criteria for classification that instance document adopted of making and the situation that supporting technology is guided; If instance document also has self-defined expansion criteria for classification, then also need observe the rule of FRTA.
Summary of the invention
The objective of the invention is to set about from professional and technology two aspects, a kind of XBRL trust data storage means and trusted data storage system are provided, to guarantee the correctness and the integrality of data in order to improve the quality of XBRL instance document.
The present invention for the technical scheme of accomplishing its goal of the invention and adopting is: a kind of XBRL trust data storage means,
At least a secured fashion below when carrying out storage, adopting with transmission:
Adopt fire compartment wall, Transport Layer Security, message-oriented communication protocol that most basic safeguard protection is provided;
Adopt extensible access control markup language and security assertion markup language that access control is provided;
Adopt signature to realize authentication;
Document is encrypted the confidentiality of guaranteeing document;
Adopt WSSA, encryption, signature to realize with the needed fail safe of WEB service form issue XBRL document;
Guarantee that the document reliability adopts following document verification mode:
Adopt the verification of XML rule;
Adopt the verification of XBRL2.1 rule;
Adopt the verification of FRTA1.0 rule;
Adopt the verification of FRIS1.0 rule;
Follow these steps to document data is cleaned:
Step 1 is provided with proving program to technical specification and verifies;
Step 2 is carried out content auditing through computer comparison instrument;
Step 3 is resolved instance and is extracted storage to database;
Step 4 is further carried out hook and is checked inspection through database;
If step 5 clean through write and clean report, send described cleaning report to the side of reporting and submitting; Otherwise turn to step 1.
Further, in above-mentioned a kind of XBRL trust data storage means: described extensible access control markup language is that a kind of permission keeper defines the access control demand, so that obtain the policy language of required application resource; Described security assertion markup language is based on safe access control frame system and the agreement that XBRL realizes interoperability between the WEB service safe product, realizes access control through authorizing the information in the specified data storehouse.
Further, in above-mentioned a kind of XBRL trust data storage means: the content of described XML rule verification comprises: to the closure of element tags, to the statement mode and the statement of XML version of name space.
Further, in above-mentioned a kind of XBRL trust data storage means: the verification of described XBRL2.1 rule comprises regular verification and element and the judgment rule verification that tuple repeats of service regeulations verification, data type of verification, element property of definition aspect of verification, the element of file structure aspect.
The present invention also provides a kind of XBRL trusted data storage system, and its technical scheme is: a kind of XBRL trusted data storage system comprises XBRL safe storage transmission system, XBRL document data checker, XBRL document cleaning means;
Described XBRL safe storage transmission system comprises: at least one module in basic security module, access control module, signature blocks, encrypting module and the message safety module;
Described XBRL document data checker comprises input interface, disaggregated model, operation model, XBRL checking processing service module, output interface and XBRL dispatch service module;
Described input interface comprises input bus;
Described operation model links to each other with described input interface, comprises the XBRL parsing module, XBRL load-on module and the XBRL recombination module that connect successively;
Described disaggregated model links to each other with described operation model, comprises the definition chained library, calculating linking storehouse, displaying chained library, tag link storehouse and the Reference-links storehouse that connect successively;
Described XBRL checking is handled service module and is linked to each other with described operation model through described input interface, comprises dimension specification handles device, formula specification handles device, XBRL specification handles device and XML specification handles device;
Described output interface comprises output bus;
Described XBRL dispatch service module is handled service module with input interface, disaggregated model, operation model, XBRL checking respectively, output interface links to each other
Described XBRL document cleaning means comprises that instance document and WORD comparing module, WORD and WORD comparing module, instance document authentication module and instance document go into library module.
Further, in above-mentioned a kind of XBRL trusted data storage system: described basic security module comprises FWSM, Transport Layer Security module and message-oriented communication protocol module.
Further, in above-mentioned a kind of XBRL trusted data storage system: described access control module comprises extensible access control markup language module and security assertion markup language module;
Further, in above-mentioned a kind of XBRL trusted data storage system: described extensible access control markup language module is that a kind of permission keeper defines the access control demand, so that obtain the policy language module of required application resource; Described security assertion markup language module is based on safe access control frame system and the agreement that XBRL realizes interoperability between the WEB service safe product, through authorizing the module of the information realization access control in the specified data storehouse.
Further, in above-mentioned a kind of XBRL trusted data storage system: described signature blocks comprises fingerprint verification system.
The safe storage transfer function of XBRL trust data storage means of the present invention and system is based upon on traditional security strategy basis, in conjunction with the advantage of various technology, has remedied various defectives.The introducing of WEB service safe framework; Solved exchangeing problem of information between heterogeneous system, the heterogeneous platform; Solved original safe practice, instrument simultaneously and can not have been continued the problem used, this is consistent with XBRL carries out information exchange between heterogeneous system target.In addition, the privacy problem of transmit leg and the recipient's Verify Your Identity questions and the sensitive data of document has been guaranteed in the use of XML encryption and XML signature technology in the framework, thereby has solved information integrity, validity, authenticity and non repudiation problem.System uses current some security means commonly used such as fire compartment wall, SSL/TLS when using these security strategies, not only consolidated fail safe but also can utilize original resource.Mainly there is following advantage in system:
Integrality: native system mainly adopts XML signature and XML to encrypt the integrality of guarantee information.Through being verified, the XML signature guarantees that information is not by malicious sabotage.In order to guarantee that the XML signature is not modified, therefore in the process of transmission, the XML signature need be encrypted.Through the XML of encrypted transmission signature is verified can guarantee information integrality.
Authorize: native system mainly adopts security assertion markup language SAML to carry out, and it has guaranteed interoperability, has so just guaranteed between one group of trust partner exchange message safely, and need not revise security configuration.Use when simultaneously SAML also provides single registration and licensing scheme just in time to satisfy the XBRL service with other services, user's input validation information is once just verified between a plurality of trust domain like this.So not only realize user's mandate but also saved user's time.
Confidentiality: native system mainly adopts authorizes and XML encryption technology realization confidentiality.Be not that all financial information all need be encrypted; And the data volume of a financial report is very big; Therefore can not encrypt whole financial report, adopt only the encryptions part that needs encryption of XML encryption technology, so just can well satisfy the confidentiality requirement.
Non repudiation: adopt digital signature to realize non repudiation in the native system.Before both parties conclude the business, must carry out authentication through third-party authoritative institution, and in the content of transaction, sign, transmit leg just can not be denied the file that once sent like this.
Associating trust: adopt message safety model, SAML and XACML technology to create the associating trust in the native system.
Authentication: adopt digital certificate to verify that the both sides of transaction are that they state.
Selective encryption: native system adopts XML to encrypt the data designated part.XML encrypts the mode that the mode that both can adopt symmetric key also can adopt unsymmetrical key, and this can determine as the case may be.
Safety end to end: native system can be realized safety end to end, and therefore, even if there are a plurality of intermediate stations also can not decipher through information encrypted between from the source point to the point of destination, thereby the information that guaranteed is carried out safety of transmission between a plurality of end points.
In many ways guarantee: native system has adopted XARL technology and XML signature technology.To having a plurality of auditors to audit with a XBRL document, they sign to the part of audit separately, and do not disturb mutually.
The fail safe of heterogeneous platform: native system has been used WSSA, and the main purpose of WSSA is exactly to realize the safety of heterogeneous platform, and different WEB services can be adopted the different techniques strategy, still can communicate between them at that time and is independent of each other.
The XBRL document verification of XBRL trusted data storage system and data cleansing function have improved the quality of XBRL document through professional and technical assurance, have guaranteed the correctness and the integrality of XBRL data.
Description of drawings
Accompanying drawing 1 is an embodiment of the invention block diagram.
Accompanying drawing 2 is structure charts of checker of the present invention.
Embodiment
In the present embodiment, data-storage system comprises that three parts are respectively: XBRL safe storage transmission system, XBRL document data checker, XBRL document cleaning means.As shown in Figure 1, respectively these three modules are further illustrated below.
The safe storage transfer function of XBRL trusted data storage system mainly comprises five modules; Be respectively basic security module, access control module, signature blocks, encrypting module and message safety module; In concrete the application, can select needed module to realize, and each module implementation also can be selected as the case may be according to actual conditions.
The basis security module mainly adopts traditional safe practice, such as fire compartment wall, SSL/TLS (Transport Layer Security), S-HTTP technology such as (message-oriented communication protocols) most basic safeguard protection is provided.
Access control module mainly adopts extensible access control markup language (XACML) and security assertion markup language (SAML) that access control is provided.Extensible access control markup language is a kind of policy language, allows the keeper to define the access control demand, so that obtain required application resource; Security assertion markup language is based on safe access control frame system and the agreement that XBRL realizes interoperability between the WEB service safe product, realizes access control through authorizing the information in the specified data storehouse.
Signature blocks mainly adopts signature to realize fail safes such as authentication, and it is signed after earlier the content of signature being standardized again.Through just can judging to the checking of signature whether document was modified, thereby guarantee the integrality of document, and realization authentication and non repudiation.
Encrypting module mainly adopts encryption technology to guarantee the confidentiality of document, and encryption can adopt the close spoon of symmetry to encrypt, and also can adopt asymmetric close spoon to encrypt, and can carry out selective encryption.
The message safety module mainly adopts utilizes relevant safety standard and the framework of WEB service, waits like WSSA, encryption, signature and realizes with the needed fail safe of WEB service form issue XBRL document.
The safe storage function of XBRL trusted data storage system provides the access control of XBRL document and WEB service form to issue the needed fail safe of XBRL document through above five modules, has satisfied the requirement of XBRL document to fail safes such as integrality, confidentiality, authentication and non repudiations itself simultaneously.
A part and parcel is the verification of XBRL document data in the present embodiment
The XBRL document verifying function of XBRL trusted data storage system carries out through system automatically, and the foundation of verification is XBRL standard, FRTA, distribution XBRL criteria for classification and the corresponding standard of industry.
The XBRL checker meets technical specifications such as XBRL2.1 standard, FRTA1.0 standard, Dimension standard, can be suitable for the criteria for classification and the instance document that generate according to them.
The XBRL document is verified according to the DTS information of being excavated, and roughly reduces following main checking content:
The verification of factual data self;
The verification of factual data internal relation;
The verification of data refers to the automatic verification of the XBRL instance document being carried out through the checker instrument here, and verification can be provided by the instance document manufacturing system, supplies the XBRL producer in the example of making document process, to carry out, and in time checks error correction.Also should provide, in order to filter out wrong instance document by the receiving system of reporting and submitting of instance document.
The verification of instance document has pair instance document itself whether to close the inspection of rule, and the inspection of the solid data of explaining in pair instance document is also arranged, and in general, mainly comprises the following aspects:
The verification of XML rule
Say that from syntactic structure the XBRL instance document is an XML file, therefore, it must observe the dependency rule of XML.Such as, the statement mode of the closure of element tags, name space, the statement of XML version or the like.
The verification of XBRL2.1 rule
XBRL2.1 is the basic norm of XBRL, specified in more detail the rule that must observe of criteria for classification and instance document.Comprise the file structure aspect from these rules of angle of instance document verification; Such as root element must be " XBRL "; At least the daughter element that comprises " SchemaRef " conduct " XBRL ", and must on order, come the front of other types element.Comprise the definition aspect of element, such as, must clear and definite assigned I D attribute in the contextual definition, the value of period and entity daughter element etc.In addition, also comprise judgment rule that Different Rule, element and the tuple of service regeulations, the different types of data of element property repeat or the like.
FRIS 1.0 regular verifications
FRIS 1.0 is on the basis of XBRL2.1, to special ask for something and the restriction that proposes of instance document, in order to guarantee the quality of instance document, improves the reusability of instance document.This cover rule degree as requested classifies, and has to observe, such as " forbidding comprising the contextual definition of structural equivalence in the instance document "; Have and observe, such as " should use the name space prefix of the acquiescence of recommendation in the instance document "; Have and to observe, such as " instance document can comprise the XML note, but should not suppose that the instance document user necessarily uses them ".
Formula 1.0 regular verifications
This rule is the optional extension element of XBRL2.1, and it has replenished the deficiency of calculating chained library in the XBRL2.1 standard, and the agreement of various complex relationships can be provided.Comprise: plain filter standard, notion filter specification, period filter specification, entity filter specification, unit filter specification, value filter specification, dimension filter specification, tuple filter specification, segment and scene filter specification or the like.If adopted Formula in the criteria for classification of instance document correspondence, the verification of instance document should comprise defining an inspection of rule among the Formula.
If the business rule of Formula is formulated very in detail, the inspection of body of the report business datum quality possibly mainly depend on it greatly in instance document so.
FRTA 1.0 regular verifications
FRTA1.0 makes to the financial report criteria for classification to go up a whole set of the complete relatively constraint that proposes, and is comparatively strict, even the part rule has been the definition of having done to the reasonability of value.FRTA itself is not a peremptory norm, but in the concrete application of XBRL project, the authorized personnel of criteria for classification generally can go initiatively to observe such rule in order to improve the accuracy of criteria for classification.Therefore, in instance document, exist under the situation of self-defined element suggestion self-defining criteria for classification to be carried out the verification of FRTA rule.
The verification of custom rule
If the rule that criteria for classification itself provides can not satisfy the needs of service observation fully, the verification rule of some expansions can be provided when developing software instrument.The verification of custom rule is generally provided by manufacturing system, and these rules are not suitable for receiving system and carry out open checking in the face of the whole market.
Data check instrument: checker
Checker is the general Software tool of making according to aforesaid verification rule that is used for instance document is carried out the automation inspection.Can improve make efficiency in order to the problem that exists in the test case document, reduce error probability.Can also be applied to the recipient and the user of instance document, collect with the use-case document before it is carried out necessary verification, guarantee to collect and the data used correctly complete, the problem on the subsequent applications of avoiding causing because of the mistake of instance document own.
The XBRL criteria for classification by an XML schema file and comprise in this schema file inside or form by whole chained libraries that this schema file is directly quoted.According to the standard of XML 1.0 specifications of W3C, the XML file must form complete (Well-formed).Because the XBRL criteria for classification has the particularity in financial accounting field, and the XBRL specification complicacy next far beyond general XML specification itself, can't use general XML software to verify, need accomplish this task by special-purpose XBRL criteria for classification validator.XBRL criteria for classification validator is as the core application of XBRL processor (processor); Realization is to the checking of grammer, semanteme and the applied logic of XBRL file; Whether the simultaneous verification criteria for classification meets XML 1.0, XBRL2.1, FRTA 1.0, DIM 1.0, Formula 1.0 technical specifications, supports self-defined verification rule parsing, loads automatically.
XBRL criteria for classification validator is the XBRL tool software that a cover is realized based on the JAVA language; And the XML treatment technology integrated and compile; Through separating of application model and basic framework; Satisfy the multifarious demand of platform flexibility, extensibility and interface service, support free selection sort standard to mate verification.
Shown in Figure 2 is the technology realization Organization Chart of XBRL criteria for classification validator:
As shown in the figure; Comprised import file (input file) by the file of verification; Xlink href; Schema file; The chained library file gets into the input interface of other inlet file from this validator; In operation model; Handle 4 processors of service in conjunction with the XBRL checking: dimension 1.0 specification handles devices; Formula 1.0 specification handles devices; XBRL2.1 specification handles device and XML1.0 specification handles device; Resolve through XBRL; Load and reorganization generate pattern file; Through five big chained libraries promptly: definition; Calculate; Show; Label and Reference-links storehouse formation base sort file are exported authorization information through output bus under the XBRL dispatch service; Result such as abnormal information and report.
The rule of XML, XBRL2.1, FRIS 1.0 belongs to the international essential rule of following in the checker, just must carry out respective rule and checks as long as carry out the instance document verification.FRTA 1.0, Formula 1.0 and custom rule can determine whether that the result who carries out these regular inspection verifications can preserve with the Word file according to actual conditions.
For check results; This instrument can provide the verification conclusion, each regular detailed description is provided simultaneously, if wrong; Then provide the details of the concrete element that makes a mistake, the prompting of the prompting of contextual definition mistake, the prompting of definition error and calculated relationship mistake.
Another part and parcel of present embodiment is to carry out the XBRL document data to clean
The XBRL data cleansing function of XBRL trusted data storage system is that the XBRL document that reports is carried out a series of arrangement, verification; Avoid the data of mistake are externally announced on the information announcing website, also can improve the data accuracy in regulator's supervision application.
The work of XBRL data cleansing itself is not made judgement to false data.Clean rule if false data can satisfy, then regard normal data as.
The XBRL document content in principle should be consistent with original text, only if obviously mistake is not generally revised easily.And there is certain relation in instance document data considerable part.Like self-consistentency property, total component is consistent, front and back phase unanimity etc.List the change relation as the cleaning standard, help to improve cleaning quality.
The XBRL data cleansing comprises automatic cleaning and manually cleans.
The data of instance document also can or can not be wrong through after the verification, and answer is inevitable.Such as, computer can carry out the automatic inspection of data according to the verification rule of setting, but can't guarantee the accuracy of content of text.If therefore checking routine has only been checked out the mistake of a part of data, the inspection of textual portions has just been given cleaning procedure so.Cleaning is meant the process that the instance document of reporting and submitting is up carried out that further close inspection, content are checked, misarrangement is cleared up, stores warehouse-in.
Be general step, the flow process that off-the-shelf item is cleaned in the present embodiment below
The stricter proving program of step 1 setting is verified (not only to technical specification, need add more detailed business rule verification in addition);
Step 2 is carried out content auditing through computer comparison instrument;
Step 3 is resolved instance and is extracted storage to database (ORACLE etc.) (Automatic Program realization);
Step 4 is further carried out hook and is checked (can carry out misarrangement through query statement, find out some query data) such as inspections through database;
Step 5 is write and is cleaned report (the cleaning report and the interim cleaning task that comprise each part instance document are summed up, and type of error is added up report);
Step 6 is sent to the side of reporting and submitting and is cleaned report;
Step 7 is organized again for the unsanctioned instance document of cleaning and is reported and submitted, and cleans again;
Step 8 consolidation database data, instance document are paid, and clean to sum up and report.
The data cleansing instrument
The instance document cleaning means comes down to a kind of instrument of semi-intelligent, because also need artificial participation.The main purpose of instrument is naked eyes are failed to understand or to be seemed that at least instance document is reduced into the general service form report laboriously; Help being checked by artificial bound fraction comparison program automatically, checking accurately, instance document then writes database by going into library.Cleaning means mainly is made up of following modules in the present embodiment:
Instance document and WORD comparing module---comparison automatically
Can come out the data extract of reporting and submitting in the instance document in WORD, to check, can find partly to fail to report many newspapers, but since too much with the element subject that is worth, therefore cause the result very inaccurate;
WORD and WORD comparing module---comparison automatically
The prerequisite of this module is the instance document reduction conversion need be become WORD; Different editions comparison function or other third party WORD comparison instruments that can utilize WORD itself to have are compared; But be reduced into the process more complicated of WORD; Type such as form just has multiple; Though it is irrelevant with the comparison of value; But more to approach original text in order restoring, to need very intactly to carry out the conclusion of various complicated types, need in addition in advance to carry out template configuration with the mode of XML.
Instance document authentication module---checking automatically
Authentication module in cleaning process is dispensable, if having, then is stricter proving program, it not with authentication denial through being purpose, but in order to find out some abnormal datas, such as the data that do not meet universal law.Such as the fund net value in the Formula business rule; Its value fix on approximately 0-100 or in theory can only>0; And during to the checking of cleaning module; Its value can be transferred to 0-20 according to our usual experience judgment value; If the value that has fund to report and submit so is 21; The instance document that passes through of receiving terminal so, prompting will have a question when cleaning.
Instance document is gone into library module---puts in storage automatically
Instance document through checking, comparison; Then should get into and clean the storehouse; Provide interface to supply the downstream application system to read; If necessary; Then get into the storage of relevant database; The process of storage is exactly the data pick-up in the instance document to be come out to deposit in the process of relevant database, as long as list structure is provided with rationally, the warehouse-in process is very smoothly basically.The logic discrimination that extracts mainly is context and the element substitution group type of element etc.; Certainly during dimension instance document data loading; Can select to write simultaneously a plurality of fields; Also can select to deposit earlier dimension data; Carry out the data partition by other programs again, this depends on the design of relevant database table afterwards.When data verification is put in storage, can carry out timely message notifying, auxiliary which element of further inspection does not extract, and which puts failure in storage, can help to find out the mistake in the instance document.Should carry out in batches during warehouse-in.

Claims (9)

1. XBRL trust data storage means is characterized in that:
At least a secured fashion below when carrying out storage, adopting with transmission:
Adopt fire compartment wall, Transport Layer Security, message-oriented communication protocol so that most basic safeguard protection to be provided;
Adopt extensible access control markup language (XACML) and security assertion markup language (SAML) that access control is provided;
Adopt signature to realize authentication;
Document is encrypted the confidentiality of guaranteeing document;
Adopt WSSA, encryption, signature to realize with the needed fail safe of WEB service form issue XBRL document;
Guarantee that the document reliability adopts following document verification mode:
Adopt the verification of XML rule;
Adopt the verification of XBRL2.1 rule;
Adopt the verification of FRTA1.0 rule;
Adopt the verification of FRIS1.0 rule;
Follow these steps to document data is cleaned:
Step 1 is provided with proving program to technical specification and verifies;
Step 2 is carried out content auditing through computer comparison instrument;
Step 3 is resolved instance and is extracted storage to database;
Step 4 is further carried out hook and is checked inspection through database;
If step 5 clean through write and clean report, send described cleaning report to the side of reporting and submitting; Otherwise turn to step 1.
2. a kind of XBRL trust data storage means according to claim 1 is characterized in that: described extensible access control markup language is that a kind of permission keeper defines the access control demand, so that obtain the policy language of required application resource; Described security assertion markup language is based on safe access control frame system and the agreement that XBRL realizes interoperability between the WEB service safe product, realizes access control through authorizing the information in the specified data storehouse.
3. a kind of XBRL trust data storage means according to claim 1 is characterized in that: the content of described XML rule verification comprises: to the closure of element tags, to the statement mode and the statement of XML version of name space.
4. a kind of XBRL trust data storage means according to claim 1 is characterized in that: the verification of described XBRL2.1 rule comprises regular verification and element and the judgment rule verification that tuple repeats of service regeulations verification, data type of verification, element property of definition aspect of verification, the element of file structure aspect.
5. an XBRL trusted data storage system is characterized in that: comprise XBRL safe storage transmission system, XBRL document data checker, XBRL document cleaning means;
Described XBRL safe storage transmission system comprises: at least one module in basic security module, access control module, signature blocks, encrypting module and the message safety module;
Described XBRL document data checker comprises input interface, disaggregated model, operation model, XBRL checking processing service module, output interface and XBRL dispatch service module;
Described input interface comprises input bus;
Described operation model links to each other with described input interface, comprises the XBRL parsing module, XBRL load-on module and the XBRL recombination module that connect successively;
Described disaggregated model links to each other with described operation model, comprises the definition chained library, calculating linking storehouse, displaying chained library, tag link storehouse and the Reference-links storehouse that connect successively;
Described XBRL checking is handled service module and is linked to each other with described operation model through described input interface, comprises dimension specification handles device, formula specification handles device, XBRL specification handles device and XML specification handles device;
Described output interface comprises output bus;
XBRL dispatch service module is handled service module with input interface, disaggregated model, operation model, XBRL checking respectively, output interface links to each other;
Described XBRL document cleaning means comprises that instance document and WORD comparing module, WORD and WORD comparing module, instance document authentication module and instance document go into library module.
6. a kind of XBRL trusted data storage system according to claim 5 is characterized in that: described basic security module comprises FWSM, Transport Layer Security module and message-oriented communication protocol module.
7. a kind of XBRL trusted data storage system according to claim 5 is characterized in that: described access control module comprises extensible access control markup language module and security assertion markup language module;
8. a kind of XBRL trusted data storage system according to claim 7; It is characterized in that: described extensible access control markup language module is that a kind of permission keeper defines the access control demand, so that obtain the policy language module of required application resource; Described security assertion markup language module is based on safe access control frame system and the agreement that XBRL realizes interoperability between the WEB service safe product, through authorizing the module of the information realization access control in the specified data storehouse.
9. a kind of XBRL trusted data storage system according to claim 5, it is characterized in that: described signature blocks comprises fingerprint verification system.
CN201110300928.8A 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system Active CN102355461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110300928.8A CN102355461B (en) 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110300928.8A CN102355461B (en) 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system

Publications (2)

Publication Number Publication Date
CN102355461A true CN102355461A (en) 2012-02-15
CN102355461B CN102355461B (en) 2014-05-28

Family

ID=45578956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110300928.8A Active CN102355461B (en) 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system

Country Status (1)

Country Link
CN (1) CN102355461B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577905A (en) * 2012-07-23 2014-02-12 深圳中兴网信科技有限公司 Audit method and system for information safety
CN103984702A (en) * 2014-04-21 2014-08-13 浪潮通用软件有限公司 XBRL (extensible business reporting language) reporting data-based system and XBRL reporting data-based method for constructing business intelligence industry analysis cloud
CN105227551A (en) * 2015-09-24 2016-01-06 四川长虹电器股份有限公司 The uniform permission administration method of XBRL application platform
CN105224514A (en) * 2015-09-24 2016-01-06 四川长虹电器股份有限公司 The method of XBRL criteria for classification is expanded based on Flex
CN105260298A (en) * 2015-09-17 2016-01-20 四川长虹电器股份有限公司 XBRL classification standard verification method based on FRTA verification platform
CN105354181A (en) * 2015-09-24 2016-02-24 四川长虹电器股份有限公司 XBRL document checking and error correction positioning method
CN105608063A (en) * 2014-11-14 2016-05-25 金蝶软件(中国)有限公司 XBRL (Extensible Business Reporting Language) instance document calibration method and system
CN106127080A (en) * 2016-07-18 2016-11-16 合肥赑歌数据科技有限公司 A kind of guard method of big data resource
CN106649305A (en) * 2015-10-28 2017-05-10 北京国双科技有限公司 Data processing method and device
CN107317819A (en) * 2017-07-13 2017-11-03 北京邮电大学 Encryption method, decryption method and its device of conventional data based on trust data form
CN107492032A (en) * 2017-09-18 2017-12-19 发贵科技(贵州)有限公司 A kind of business financial auditing reports management system and its database platform
CN107577743A (en) * 2017-08-28 2018-01-12 武汉奇米网络科技有限公司 Financial settlement data processing method and device based on ETL
CN108228688A (en) * 2017-06-20 2018-06-29 上海吉贝克信息技术有限公司 A kind of template generation method based on XBRL, system and server
CN109952752A (en) * 2016-11-04 2019-06-28 微软技术许可有限责任公司 For the authorization of having ready conditions of isolation set
CN110263221A (en) * 2019-06-21 2019-09-20 福建南威软件有限公司 A kind of method and system based on xml operation word document
CN110716719A (en) * 2019-10-09 2020-01-21 民生科技有限责任公司 Dynamic endorsement strategy implementation method for financial block chain alliance platform transaction
CN115687538A (en) * 2022-11-14 2023-02-03 深圳标普云科技有限公司 Enterprise information acquisition and analysis method and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020240873A1 (en) * 2019-05-31 2020-12-03 富士通株式会社 Verification method, information processing device, and verification program

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101652774A (en) * 2007-04-03 2010-02-17 微软公司 System for financial documentation conversion

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101652774A (en) * 2007-04-03 2010-02-17 微软公司 System for financial documentation conversion

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨文黎; 贾明琪;: "XBRL财务数据转换与存储流程探讨", 《财会通讯》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577905B (en) * 2012-07-23 2018-06-19 深圳中兴网信科技有限公司 The auditing method and system of a kind of information security
CN103577905A (en) * 2012-07-23 2014-02-12 深圳中兴网信科技有限公司 Audit method and system for information safety
CN103984702A (en) * 2014-04-21 2014-08-13 浪潮通用软件有限公司 XBRL (extensible business reporting language) reporting data-based system and XBRL reporting data-based method for constructing business intelligence industry analysis cloud
CN105608063A (en) * 2014-11-14 2016-05-25 金蝶软件(中国)有限公司 XBRL (Extensible Business Reporting Language) instance document calibration method and system
CN105608063B (en) * 2014-11-14 2018-07-27 金蝶软件(中国)有限公司 XBRL instance documents method of calibration and system
CN105260298A (en) * 2015-09-17 2016-01-20 四川长虹电器股份有限公司 XBRL classification standard verification method based on FRTA verification platform
CN105227551A (en) * 2015-09-24 2016-01-06 四川长虹电器股份有限公司 The uniform permission administration method of XBRL application platform
CN105224514A (en) * 2015-09-24 2016-01-06 四川长虹电器股份有限公司 The method of XBRL criteria for classification is expanded based on Flex
CN105354181A (en) * 2015-09-24 2016-02-24 四川长虹电器股份有限公司 XBRL document checking and error correction positioning method
CN106649305A (en) * 2015-10-28 2017-05-10 北京国双科技有限公司 Data processing method and device
CN106127080B (en) * 2016-07-18 2019-05-14 合肥赑歌数据科技有限公司 A kind of guard method of big data resource
CN106127080A (en) * 2016-07-18 2016-11-16 合肥赑歌数据科技有限公司 A kind of guard method of big data resource
CN109952752A (en) * 2016-11-04 2019-06-28 微软技术许可有限责任公司 For the authorization of having ready conditions of isolation set
CN108228688A (en) * 2017-06-20 2018-06-29 上海吉贝克信息技术有限公司 A kind of template generation method based on XBRL, system and server
CN108228688B (en) * 2017-06-20 2022-05-06 上海吉贝克信息技术有限公司 Template generation method, system and server based on XBRL
CN107317819A (en) * 2017-07-13 2017-11-03 北京邮电大学 Encryption method, decryption method and its device of conventional data based on trust data form
CN107577743A (en) * 2017-08-28 2018-01-12 武汉奇米网络科技有限公司 Financial settlement data processing method and device based on ETL
CN107492032A (en) * 2017-09-18 2017-12-19 发贵科技(贵州)有限公司 A kind of business financial auditing reports management system and its database platform
CN110263221A (en) * 2019-06-21 2019-09-20 福建南威软件有限公司 A kind of method and system based on xml operation word document
CN110716719A (en) * 2019-10-09 2020-01-21 民生科技有限责任公司 Dynamic endorsement strategy implementation method for financial block chain alliance platform transaction
CN115687538A (en) * 2022-11-14 2023-02-03 深圳标普云科技有限公司 Enterprise information acquisition and analysis method and system
CN115687538B (en) * 2022-11-14 2023-04-25 深圳标普云科技有限公司 Enterprise information acquisition and analysis method and system

Also Published As

Publication number Publication date
CN102355461B (en) 2014-05-28

Similar Documents

Publication Publication Date Title
CN102355461B (en) XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system
AU2018202830A1 (en) Digital Asset Platform
Accorsi et al. Automated certification for compliant cloud-based business processes
CN115599978A (en) Electronic file platform
Franqueira et al. Risk and argument: A risk-based argumentation method for practical security
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN108305075A (en) A kind of trade document file management system and management method based on block chain
CN112488778A (en) Bill processing method and related device
CN111639914A (en) Block chain case information management method and device, electronic equipment and storage medium
US20150095243A1 (en) Online-id-handling computer system and method
Nishi et al. Electronic healthcare data record security using blockchain and smart contract
Arcari Decoding smart contracts: technology, legitimacy, & legislative uniformity
CN110493268A (en) A kind of data processing method and device based on block chain network
CN112488777A (en) Bill processing method and related device
CN112487491A (en) Control method and related device for block chain system
Schönle et al. Industry use cases on blockchain technology
WO2018013124A1 (en) Digital asset platform
CN109690550A (en) Digital asset framework
Zhe et al. Blockchain and Logistics
US20230092436A1 (en) Framework for demaraction of digital assets
Kirss et al. Using Blockchain Technology to Redesign Know-Your-Customer Processes Within the Banking Industry
Ratnasingham EDI security: a model of EDI risks and associated controls
CN113674098A (en) Non-standard warehouse receipt pledge financing method, device and equipment based on block chain
Handoko et al. The utilization of blockchain technology on remote audit to ensure audit data integrity in detecting potential fraudulent financial reporting
CN111652726A (en) Information processing method and system based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhang Hao

Inventor after: Li Junxue

Inventor after: Duan Xin

Inventor after: Wang Yangui

Inventor after: Yin Jinchun

Inventor after: Wang Lin

Inventor after: Huang Kangpei

Inventor before: Zhang Hao

Inventor before: Li Junxue

Inventor before: Duanxin

Inventor before: Wang Yangui

Inventor before: Yin Jinchun

Inventor before: Wang Lin

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170705

Address after: 510032, No. 2 Xiangshan Road, Yongning Street, Zengcheng District, Guangdong, Guangzhou (the core area of Zengcheng economic and Technological Development Zone)

Patentee after: Guangzhou haoan Electrical Equipment Co., Ltd.

Address before: 510070, Guangdong, Guangzhou, Yuexiu District martyrs Road 100, one of 15 compound

Patentee before: Guangzhou C.H Control Technology Co., Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510032 No. 2 Xiangshan Avenue, Yongning Street, Zengcheng District, Guangzhou, Guangdong (Zengcheng economic and Technological Development Zone core area)

Patentee after: Guangzhou Haoan Intelligent Technology Co., Ltd.

Address before: 510032 No. 2 Xiangshan Avenue, Yongning Street, Zengcheng District, Guangzhou, Guangdong (Zengcheng economic and Technological Development Zone core area)

Patentee before: Guangzhou haoan Electrical Equipment Co., Ltd.