CN102355461B - XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system - Google Patents

XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system Download PDF

Info

Publication number
CN102355461B
CN102355461B CN201110300928.8A CN201110300928A CN102355461B CN 102355461 B CN102355461 B CN 102355461B CN 201110300928 A CN201110300928 A CN 201110300928A CN 102355461 B CN102355461 B CN 102355461B
Authority
CN
China
Prior art keywords
xbrl
module
document
verification
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110300928.8A
Other languages
Chinese (zh)
Other versions
CN102355461A (en
Inventor
张昊
李军学
段鑫
王彦桂
殷进春
王琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Haoan Intelligent Technology Co., Ltd.
Original Assignee
Guangzhou Ch Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Ch Control Technology Co Ltd filed Critical Guangzhou Ch Control Technology Co Ltd
Priority to CN201110300928.8A priority Critical patent/CN102355461B/en
Publication of CN102355461A publication Critical patent/CN102355461A/en
Application granted granted Critical
Publication of CN102355461B publication Critical patent/CN102355461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an XBRL (Extensible Business Reporting Language) credible data storage method and a credible data storage system. The system comprises an XBRL secure storage and transmission system, wherein an XBRL document data checker and an XBRL document clearing tool. The method comprises three aspects that: at least one secure mode is adopted for data storage and transmission; document checking is adopted to ensure the reliability of a document; and the document is cleared. The secure storage and transmission functions of the XBRL credible data storage method and the system are achieved based on the traditional security strategy in combination with the advantages of various technologies, and various defects can be overcome. Due to introduction of a WEB service security architecture, the problems of information exchange between heterogeneous systems and heterogeneous platforms can be solved, the problem that the conventional security technologies and tools cannot be used can be solved at the same time, and the target of the method and the system is identical to the target of information exchange of XBRL between the heterogeneous systems.

Description

A kind of XBRL trust data storage means and trusted data storage system
Technical field
The present invention relates to business data as the trusted storage processing method of accounting statement etc., be particularly related to the method and system that one utilizes XBRL (eXtensible Business Reporting Language, can expand business report language) to carry out business data storage.
Background technology
XBRL be one based on XML(extend markup language, eXtensible Markup Language) be used for specially work out business finance report, disclose company information at net environment, improve the standardized language of ability to utilize information.XBRL provides one to announce, reliably obtain with diversified form the standardized method that exchanges Financial Reporting of Corporation with automation, but information reliability and the integrality of XBRL coding exist many-sided threat simultaneously, and as criteria for classification, appropriately whether whether use, accounting item and data can accurately be mapped to correspondence markings, whether all data can guarantee all to have added mark.In addition, as unprotected data in other XML, XBRL document is vulnerable to rogue attacks, and anyone can be easy to create and distort XBRL instance document.
Because XBRL is based on XML, cause XBRL itself not consider the quality of information, also do not consider that whether information is reliable, and the q&r of information is very important concerning financial report.
The reliability of XBRL document information mainly depends on the process reliability that produces the document, the measure of the assurance fail safe that security strategy character, degree and the information of implementing in this information is implemented in transmission over networks process etc.Insecurity main manifestations is that the criteria for classification using is mistake or inauthoritative, and the label using is skimble-scamble, and XBRL document is also easy to be accessed and revise by disabled user.What these potential safety hazards had need to carry out manual control, and some needs adopt corresponding technology to carry out safety to guarantee.
The fail safe of XBRL document comprises authenticity, integrality and the confidentiality etc. of information, and a real financial report need to be audited by financial audit personnel.And XBRL technology is not protected information, anyone can revise, and such one piece just can not be shown as by auditing by the report of audit, therefore authenticity that can not guarantee information.
In addition, XBRL document need to transmit by network, and XBRL document need to consider to store the safety of document and the safety of transferring documents.
XBRL is based on XML technology, and XBRL document need to transmit with Web service form, so XBRL document exists the demand for security of XML document, also exists the demand for security of Web service.
XBRL advantage in financial report issue and analyzing and processing is very obvious; but also there is many deficiencies and defect, as criteria for classification set standardization not yet completely, network security problem, data storage problem, enterprise to the understanding of XBRL have to be strengthened, corresponding software is not enough, technical threshold is higher and local industry protection doctrine resistance etc.XBRL comprises following aspect to the impact of financial report measuring quality standard:
1. the impact on correlation
1) for enterprise, from simply storing the greater role of performance accounting information into.Due to XBRL transmission be more basic metadata, thereby greatly reduce transmission quantity, greatly improve the supply and demand promptness of accounting information; Also conveniently carry out different times, the convertible comparison of accounting statement information under different accounting standard systems; In addition, characteristic that can mark due to XBRL becomes easily data storage, search and excavation, thereby more easily finds out " rule ", makes reliable deduction for following decision-making, has predictive value.
2) for affairs auditor in one's power, from simply discerning increase in value.The support of XBRL technology promotes the reliability of data, guaranteeing under the prerequisite of reliability, affairs in one's power auditor also can be from simply discerning originally, whether enterprise records separately just and sound and spin off from the legal link of not rising in value, energy and limited resource are put in the increment link that enterprise is worth and gone, be i.e. non-auditing service on ordinary meaning.
3), for form user, receive interactive customization from passive.XBRL is provided with the information feedback communication approach of both sides of supply and demand, thereby improves the feedback value of accounting information.And the extensibility of XBRL, make XBRL face new things and can carry out faster the part transformation of the way and add definition, be to make feedback opinion better obtain the important guarantee of replying; In addition, in the former data flow of XBRL unified standard, by adjusting output format, report user can obtain that it is required, interactive customization.
2. the impact on reliability
1) XBRL can solve under traditional financial information supplying mode due to " management level crime " and the impact of input error on data reliability.Writing and issuing under financial report pattern take XBRL as basis, economic work is just automatically sent in time to information centre and is externally announced by computer after generation, the company that can prevent handles and distorts accounting data in the later stage arbitrarily, thereby solved " management level crime ".Because data are no longer to repeat input, thereby reduce input error.
2) XBRL carries out online issue and can accelerate issue speed, and the generation time that this reduces business report to a great extent makes monitoring in real time and continuous audit become possibility.Because XBRL only told about data " what is ", and it is not processed, therefore according to the reconfiguring of the former data of bottom, by the storage of financial statement data, transmission and recycling.
3) authenticity of each side's supervision authorization information is convenient in the financial report of writing and issuing as basis take XBRL." lower boring " function of the existence of managing detailed catalogue, non-financial information and XBRL, makes user can financial report data be reviewed, be checked and verify.
Common XBRL data quality problem
In sum, the quality of data of XBRL instance document is mainly decided the degree of observing of XBRL technical specification by the quality of data in initial data source and instance document.
The main body of instance document is the data of traffic aided, and the quality of data of these data may exist following problem:
1) shortage of data
Lose some necessary data item, such as fund is called for short, Net asset value is NULL, this may be because data acquisition duration be uncertain, misoperation or adopted the reasons such as default value to cause.
2) data redundancy with conflict
Identical element occurs repeatedly quoting identical context, and namely data repeat, and has just occurred conflict if the value of data is not identical.These all can cause instance document when application occur cannot specified data problem.
3) data relationship mistake
Business datum in instance document may be run counter to some business relations that must observe, and such as there being the rule of " assets=debt+owner's equity " in financial report, the data in instance document may not meet this requirement for some reason.
In addition, the technological frame of instance document is decided by XBRL standard, so must observe technically the dependency rule of XBRL, may comprise XBRL2.1, FRIS1.0, Formula1.0, Dimension1.0 etc., specifically to see the situation that criteria for classification that the instance document of making adopts and supporting technology are guided, if instance document also with self-defined expansion criteria for classification, also needs to observe the rule of FRTA.
Summary of the invention
The object of the invention is the quality in order to improve XBRL instance document, set about from business and technology two aspects, a kind of XBRL trust data storage means and trusted data storage system are provided, to guarantee correctness and the integrality of data.
The present invention for the technical scheme that completes its goal of the invention and adopt is: a kind of XBRL trust data storage means,
At least one secured fashion below adopting in the time carrying out data storage and transmission in five kinds of modes:
(1) adopt fire compartment wall, Transport Layer Security, message-oriented communication protocol that most basic safeguard protection is provided;
(2) adopt extensible access control markup language and security assertion markup language that access control is provided;
(3) adopt signature to realize authentication;
(4) document is encrypted to guarantee the confidentiality of document;
(5) adopt WSSA(Web Site Security Audit, web portal security audit), encrypt, signature realizes with WEB service form and issues the needed fail safe of XBRL document;
Guarantee that document reliability adopts as Documents verification mode:
Adopt the verification of XML rule;
Adopt the verification of XBRL2.1 rule;
Adopt the verification of FRTA1.0 rule;
Adopt the verification of FRIS1.0 rule;
Follow these steps to document data to clean:
Step 1 arranges proving program for technical specification and verifies;
Step 2 is carried out content auditing by computer comparison instrument;
Step 3 is resolved Cass collection data and is stored database into;
Step 4, by database, is further carried out hook and is checked inspection;
If step 5 clean by; write and clean report, send described cleaning report to the side of reporting and submitting; Otherwise turn to step 1.
Further, in above-mentioned a kind of XBRL trust data storage means: described extensible access control markup language is that a kind of keeper of permission defines access control demand, to obtain the policy language of required application resource; Described security assertion markup language is safe access control frame system and the agreement that realizes interoperability between WEB service safe product based on XBRL, by authorizing the information realization access control in specified data storehouse.
Further, in above-mentioned a kind of XBRL trust data storage means: the content of described XML rule verification comprises: the closure to element tags, the statement mode to name space and the statement of XML version.
Further, in above-mentioned a kind of XBRL trust data storage means: the verification of described XBRL2.1 rule comprises the judgment rule verification that the regular verification of service regeulations verification, data type of verification, the element property of the definition aspect of verification, the element of file structure aspect and element and tuple repeat.
The present invention also provides a kind of XBRL trusted data storage system, and its technical scheme is: a kind of XBRL trusted data storage system, comprises XBRL safe storage transmission system, XBRL document data checker, XBRL Web Cleaning instrument;
Described XBRL safe storage transmission system comprises: at least one module in basic security module, access control module, signature blocks, encrypting module and message safety module;
Described XBRL document data checker comprises input interface, disaggregated model, operation model, XBRL checking processing service module, output interface and XBRL dispatch service module;
Described input interface comprises input bus;
Described operation model is connected with described input interface, comprises the XBRL parsing module, XBRL load-on module and the XBRL recombination module that connect successively;
Described disaggregated model is connected with described operation model, comprises the definition chained library, calculating linking storehouse, displaying chained library, tag link storehouse and the Reference-links storehouse that connect successively;
Described XBRL checking is processed service module and is connected with described operation model through described input interface, comprises dimension specification handles device, formula specification handles device, XBRL specification handles device and XML specification handles device;
Described output interface comprises output bus;
Described XBRL dispatch service module is processed service module with input interface, disaggregated model, operation model, XBRL checking respectively, output interface is connected
Described XBRL Web Cleaning instrument comprises that instance document and WORD comparing module, WORD and WORD comparing module, instance document authentication module and instance document enter library module.
Further, in above-mentioned a kind of XBRL trusted data storage system: described basic security module comprises FWSM, Transport Layer Security module and message-oriented communication protocol module.
Further, in above-mentioned a kind of XBRL trusted data storage system: described access control module comprises extensible access control markup language module and security assertion markup language module;
Further, in above-mentioned a kind of XBRL trusted data storage system: described extensible access control markup language module is that a kind of keeper of permission defines access control demand, to obtain the policy language module of required application resource; Described security assertion markup language module is to realize safe access control frame system and the agreement of interoperability between WEB service safe product based on XBRL, by authorizing the module of the information realization access control in specified data storehouse.
Further, in above-mentioned a kind of XBRL trusted data storage system: described signature blocks comprises fingerprint verification system.
The safe storage transfer function of XBRL trust data storage means of the present invention and system is based upon on traditional security strategy basis, in conjunction with the advantage of various technology, has made up various defects.The introducing of WEB service safe framework, solve exchangeing problem of information between heterogeneous system, heterogeneous platform, solved original safe practice, instrument simultaneously and can not have been continued the problem using, this target of carrying out information exchange with XBRL between heterogeneous system is consistent.In addition, in framework, the privacy problem of transmit leg and recipient's Verify Your Identity questions and the sensitive data of document has been guaranteed in the use of XML encryption and XML signature technology, thereby has solved information integrity, validity, authenticity and non repudiation problem.System is used current some conventional security means such as fire compartment wall, SSL/TLS in these security strategies of application, has not only consolidated fail safe but also can utilize original resource.Mainly there is following advantage in system:
Integrality: native system mainly adopts XML signature and XML to encrypt the integrality of guarantee information.By XML signature is verified to guarantee that information is not by malicious sabotage.In order to guarantee that XML signature is not modified, therefore in the process of transmission, need XML signature to be encrypted.XML signature by encrypted transmission is verified integrality that can guarantee information.
Authorize: native system mainly adopts security assertion markup language SAML to carry out, and it has guaranteed interoperability, so just guaranteed between one group of trust partner exchange message safely, and do not needed to revise security configuration.When simultaneously SAML also provides single registration and licensing scheme just in time to meet XBRL service with other services, use, just input validation information once of user is verified between multiple trust domain like this.So not only realized user's mandate but also saved user's time.
Confidentiality: native system mainly adopts mandate and XML encryption technology to realize confidentiality.Be not that all financial information all need to be encrypted, and the data volume of a financial report is very large, therefore can not encrypt whole financial report, adopt XML encryption technology an encryption to need the part of encrypting, so just can well meet confidentiality requirement.
Non repudiation: adopt digital signature to realize non repudiation in native system.Before both parties conclude the business, must carry out authentication by third-party authoritative institution, and sign in the content of transaction, transmit leg just can not be denied the file once sending like this.
Associating trust: adopt message safety model, SAML and XACML technology to create associating trust in native system.
Authentication: adopt digital certificate to verify that the both sides of transaction are that they state.
Selective encryption: native system adopts XML to encrypt the data division of appointment.XML encrypts and both can adopt the mode of symmetric key also can adopt the mode of unsymmetrical key, and this can determine as the case may be.
Safety end to end: native system can be realized safety end to end, therefore, even if there are multiple intermediate stations also can not decipher the information through encrypting between from source point to point of destination, thereby has guaranteed the fail safe that information is transmitted between multiple end points.
In many ways guarantee: native system has adopted XARL technology and XML signature technology.To having multiple auditors to audit with a XBRL document, they sign to the part of audit separately, and do not interfere with each other.
The fail safe of heterogeneous platform: native system has been applied WSSA, the main purpose of WSSA is exactly to realize the safety of heterogeneous platform, and different WEB services can adopt different technical tactics, still can communicate at that time and be independent of each other between them.
The XBRL document verification of XBRL trusted data storage system and data cleansing function, by business and technical assurance, have improved the quality of XBRL document, have guaranteed correctness and the integrality of XBRL data.
Accompanying drawing explanation
Accompanying drawing 1 is embodiment of the present invention block diagram.
Accompanying drawing 2 is structure charts of checker of the present invention.
Embodiment
In the present embodiment, data-storage system comprises three parts respectively: XBRL safe storage transmission system, XBRL document data checker, XBRL Web Cleaning instrument.As shown in Figure 1, respectively these three modules are further detailed below.
The safe storage transfer function of XBRL trusted data storage system mainly comprises five modules, be respectively basic security module, access control module, signature blocks, encrypting module and message safety module, in concrete application, can select needed module to realize according to actual conditions, and each module implementation also can be selected as the case may be.
Basis security module mainly adopt traditional safe practice, such as fire compartment wall, SSL/TLS(Transport Layer Security), the message-oriented communication protocol of S-HTTP() etc. technology most basic safeguard protection is provided.
Access control module mainly adopts extensible access control markup language (XACML) and security assertion markup language (SAML) that access control is provided.Extensible access control markup language is a kind of policy language, allows keeper to define access control demand, to obtain required application resource; Security assertion markup language is safe access control frame system and the agreement that realizes interoperability between WEB service safe product based on XBRL, by authorizing the information realization access control in specified data storehouse.
Signature blocks mainly adopts signature to realize the fail safes such as authentication, and it is signed after first the content of signature being standardized again.By just judging to the checking of signature whether document was modified, thereby guarantee the integrality of document, and realize authentication and non repudiation.
Encrypting module mainly adopts encryption technology to guarantee the confidentiality of document, and encryption can adopt symmetrical secret key to encrypt, and also can adopt asymmetric secret key to encrypt, and can carry out selective encryption.
Message safety module mainly adopts utilizes WEB to serve relevant safety standard and framework, realizes with WEB service form and issues the needed fail safe of XBRL document as WSSA, encryption, signature etc.
The safe storage function of XBRL trusted data storage system provides the access control of XBRL document and WEB service form to issue the needed fail safe of XBRL document by above five modules, has met the requirement of XBRL document to fail safes such as integrality, confidentiality, authentication and non repudiations itself simultaneously.
In the present embodiment, a part and parcel is the verification of XBRL document data
The XBRL document verifying function of XBRL trusted data storage system carries out automatically by system, verification according to being XBRL standard, FRTA, distribution XBRL criteria for classification and the corresponding standard of industry.
XBRL checker meets the technical specifications such as XBRL2.1 standard, FRTA1.0 standard, Dimension standard, can be suitable for the criteria for classification and the instance document that generate according to them.
XBRL document is verified according to the DTS information of being excavated, and is roughly summarized as following main checking content:
The verification of factual data self;
The verification of factual data internal relation;
The verification of data refers to automatic Verification XBRL instance document being carried out by checker instrument here, and verification can be provided by instance document manufacturing system, carries out in example of making document process for XBRL producer, checks in time error correction.Also should be provided by the receiving system of reporting and submitting of instance document, in order to filter out wrong instance document.
The verification of instance document has pair instance document itself whether to close the inspection of rule, also has the inspection of the solid data of explaining in pair instance document, in general, mainly comprises the following aspects:
The verification of XML rule
From syntactic structure, XBRL instance document is an XML file, and therefore, it must be in accordance with the dependency rule of XML.Such as, the closure of element tags, the statement mode of name space, the statement of XML version etc.
The verification of XBRL2.1 rule
XBRL2.1 is the basic norm of XBRL, specified in more detail the rule that must observe of criteria for classification and instance document.Comprise file structure aspect from these rules of angle of instance document verification, such as root element must be " XBRL ", at least comprise the daughter element of " SchemaRef " conduct " XBRL ", and must in order, come other types element before.Comprise the definition aspect of element, such as, must clear and definite assigned I D attribute in contextual definition, the value of period and entity daughter element etc.In addition, also comprise judgment rule that Different Rule, element and the tuple of service regeulations, the different types of data of element property repeat etc.
The verification of FRIS1.0 rule
FRIS1.0 is on the basis of XBRL2.1, for special ask for something and the restriction proposing of instance document, in order to guarantee the quality of instance document, improves the reusability of instance document.This cover rule degree as requested classifies, and has to observe, such as " forbid in instance document comprise structural equivalence contextual definition "; Have and observe, such as " should use the name space prefix of the acquiescence of recommendation in instance document "; Have and can observe, such as " instance document can comprise XML annotation, but should not suppose that instance document user necessarily uses them ".
The verification of Formula1.0 rule
This rule is the optional extension element of XBRL2.1, and it has supplemented the deficiency of calculating chained library in XBRL2.1 standard, and the agreement of various complex relationships can be provided.Comprise: plain filter standard, concept filter specification, period filter specification, entity filter specification, unit filter specification, value filter specification, dimension filter specification, tuple filter specification, segment and scene filter specification etc.If adopted Formula in criteria for classification corresponding to instance document, the verification of instance document should comprise defining an inspection for rule in Formula.
If the business rule of Formula is formulated very in detail, in an instance document, the inspection of body of the report business datum quality may mainly depend on it greatly so.
The verification of FRTA1.0 rule
FRTA1.0 makes upper a whole set of relatively complete constraint proposing for financial report criteria for classification, comparatively strict, and even part rule has been the definition of having done for the reasonability of value.FRTA itself is not a peremptory norm, but in the concrete application of XBRL project, the authorized personnel of criteria for classification, in order to improve the accuracy of criteria for classification, generally can go initiatively to observe such rule.Therefore the in the situation that of, there is self-defined element in instance document, suggestion is carried out the verification of FRTA rule to self-defining criteria for classification.
The verification of custom rule
If the rule that criteria for classification itself provides can not meet the needs of service observation completely, in the time developing software instrument, can provide the verification rule of some expansions.The verification of custom rule, is generally provided by manufacturing system, and these rules are not suitable for receiving system in the face of carrying out open checking in whole market.
Data check instrument: checker
Checker be make according to aforesaid verification rule for instance document being carried out to the general Software tool of automation inspection.Can, in order to the problem existing in test case document, improve make efficiency, reduce error probability.Can also be applied to recipient and the user of instance document, before collection and use-case document, it be carried out to necessary verification, guarantee that the data of collecting and using are correctly complete, avoid because the problem in the subsequent applications that the mistake of instance document own causes.
By an XML schema file and in this schema file inside, whole chained libraries that comprise or that directly quoted by this schema file form XBRL criteria for classification.According to the standard of the XML1.0 specifications of W3C, XML file must form complete (Well-formed).Because XBRL criteria for classification has the particularity in financial accounting field, and the XBRL specification complexity next far beyond general XML specification itself, cannot use general XML software to verify, XBRL criteria for classification validator that need be special completes this task.XBRL criteria for classification validator is as the core application of XBRL processor (processor), realize the checking of grammer, semanteme and applied logic to XBRL file, whether simultaneous verification criteria for classification meets XML1.0, XBRL2.1, FRTA1.0, DIM1.0, Formula1.0 technical specification, supports self-defined verification rule parsing, automatically loads.
XBRL criteria for classification validator is a set of XBRL tool software of realizing based on JAVA language, and XML treatment technology is integrated and collected, by separating of application model and basic framework, meet the multifarious demand of platform flexibility, extensibility and interface service, support free selection sort standard to mate verification.
The technology that Figure 2 shows that XBRL criteria for classification validator realizes Organization Chart:
As shown in the figure, comprised import file (input file) by the file of verification, Xlink href, schema file, chained library file and other entrance file enter from the input interface of this validator, in operation model, process 4 processors of service in conjunction with XBRL checking: dimension 1.0 specification handles devices, formula 1.0 specification handles devices, XBRL2.1 specification handles device and XML1.0 specification handles device, resolve by XBRL, load and restructuring generate pattern file, through five large chained libraries: definition, calculate, show, label and Reference-links storehouse formation base sort file, under XBRL dispatch service, export authorization information by output bus, the result such as abnormal information and report.
In checker, the rule of XML, XBRL2.1, FRIS1.0 belongs to the international essential rule of following, and just must carry out respective rule and checks as long as carry out instance document verification.FRTA1.0, Formula1.0 and custom rule can determine whether that the result of the inspection verification of carrying out these rules can preserve with Word file according to actual conditions.
For check results, this instrument can provide verification conclusion, and the detailed description of each rule is provided simultaneously, if wrong, provide the details of the concrete element making a mistake, the prompting of the prompting of contextual definition mistake, the prompting of definition error and calculated relationship mistake.
Another part and parcel of the present embodiment is to carry out the cleaning of XBRL document data
The XBRL data cleansing function of XBRL trusted data storage system is that the XBRL document to reporting carries out a series of arrangement, verification, avoid the data of mistake externally to announce on information announcing website, also can improve the data accuracy in regulator's supervision application.
The work of XBRL data cleansing does not judge false data itself.If false data can meet cleaning rule, regard normal data as.
XBRL document content in principle should be consistent with original text, unless obviously mistake is not generally revised easily.And there is certain relation in instance document data considerable part.As self-consistentency, total component is consistent, and the front and back phase is consistent etc.List change relation as cleaning standard, contribute to improve cleaning quality.
XBRL data cleansing comprises automatic cleaning and Manual-cleaning.
The data of instance document, also can or can not be wrong after verification, and answer is inevitable.Such as, computer can carry out the automatic inspection of data according to the verification rule of setting, but cannot guarantee the accuracy of content of text.If therefore checking routine has only checked out the mistake of a part of data, the inspection of textual portions has just been given cleaning procedure so.Cleaning refers to that the instance document to reporting and submitting up carries out the process that further close inspection, content are checked, misarrangement is cleared up, store warehouse-in.
General step, the flow process that in the present embodiment, off-the-shelf item is cleaned below
The stricter proving program of step 1 setting is verified (not only for technical specification, needing in addition to add more detailed business rule verification);
Step 2 is carried out content auditing by computer comparison instrument;
Step 3 is resolved Cass collection data and is stored database (ORACLE etc.) (program realizes automatically) into;
Step 4, by database, is further carried out hook and is checked (can carry out misarrangement by query statement, find out some query data) such as inspections;
Step 5 is write and is cleaned report (the cleaning report and the interim cleaning task that comprise every a instance document are summed up, and type of error is added up to report);
Step 6 is sent to the side of reporting and submitting and is cleaned report;
Step 7 is organized again and is reported and submitted for the unsanctioned instance document of cleaning, then cleans;
Step 8 consolidation database data, instance document are paid, and clean to sum up and report.
Data cleansing instrument
Instance document cleaning means is in fact a kind of instrument of semi-intelligent, has artificial participation because also need.The main purpose of instrument is naked eyes are failed to understand or at least seemed that instance document is reduced into general service form report laboriously, be conducive to be checked by artificial bound fraction automatic comparison program, check accurately instance document by entering library write into Databasce.In the present embodiment, cleaning means is mainly by following module compositions:
Instance document and WORD comparing module---automatic comparison
The data of reporting and submitting in instance document can be extracted in WORD and check, can find partly to fail to report many reports, but due to too much with the element subject of value, therefore cause result very inaccurate;
WORD and WORD comparing module---automatic comparison
The prerequisite of this module is to convert instance document reduction to WORD, can utilize different editions comparison function or other third party WORD comparison instruments that WORD itself has to compare, but be reduced into the process more complicated of WORD, such as the type of form just has multiple, although irrelevant with comparing of value, but in order restoring closer to original text, to need very intactly to carry out the conclusion of various complicated types, separately to need to carry out template configuration by the mode of XML in advance.
Instance document authentication module---automatic Verification
Authentication module in cleaning process is dispensable, if had, is stricter proving program, it not take authentication denial by as object, but in order to find out some abnormal datas, such as not meeting the data of universal law.Such as ACCNAV is in Formula business rule, its value approximately fixes on 0-100 or in theory can only >0, and during to the checking of cleaning module, its value can be adjusted to 0-20 according to our usual micro-judgment value, if the value that has so fund to report and submit is 21, the instance document that receiving terminal passes through so, prompting will have a question in the time cleaning.
Instance document enters library module---warehouse-in automatically
Through the instance document of checking, comparison, should enter and clean storehouse, provide interface to read for downstream application system, if necessary, enter the storage of relevant database, the process of storage is exactly the process that the data pick-up in instance document is out deposited in to relevant database, as long as list structure arranges rationally, warehouse-in process is very smoothly substantially.The logic discrimination extracting is mainly context and the element substitution type of sets etc. of element, when certain dimension instance document data loading, can select to write multiple fields simultaneously, also can select first to deposit dimension data, carry out data partition by other programs again, this depends on the design of relevant database table afterwards.In the time that data verification is put in storage, can carry out timely message notifying, auxiliary which element of further inspection does not extract, and which is put in storage unsuccessfully, can help to find out the mistake in instance document.When warehouse-in, should carry out in batches.

Claims (9)

1. an XBRL trust data storage means, is characterized in that:
At least one secured fashion below adopting in the time carrying out data storage and transmission in five kinds of modes:
(1) adopt fire compartment wall, Transport Layer Security, message-oriented communication protocol so that most basic safeguard protection to be provided;
(2) adopt extensible access control markup language (XACML) and security assertion markup language (SAML) that access control is provided;
(3) adopt signature to realize authentication;
(4) document is encrypted to guarantee the confidentiality of document;
(5) adopt web portal security audit (WSSA), encrypt, sign to realize with WEB service form and issue the needed fail safe of XBRL document;
Guarantee that document reliability adopts as Documents verification mode:
Adopt the verification of XML rule;
Adopt the verification of XBRL2.1 rule;
Adopt the verification of FRTA1.0 rule;
Adopt the verification of FRIS1.0 rule;
Follow these steps to document data to clean:
Step 1 arranges proving program for technical specification and verifies;
Step 2 is carried out content auditing by computer comparison instrument;
Step 3 is resolved Cass collection data and is stored database into;
Step 4, by database, is further carried out hook and is checked inspection;
If step 5 clean by; write and clean report, send described cleaning report to the side of reporting and submitting; Otherwise turn to step 1.
2. a kind of XBRL trust data storage means according to claim 1, is characterized in that: described extensible access control markup language is that a kind of keeper of permission defines access control demand, to obtain the policy language of required application resource; Described security assertion markup language is safe access control frame system and the agreement that realizes interoperability between WEB service safe product based on XBRL, by authorizing the information realization access control in specified data storehouse.
3. a kind of XBRL trust data storage means according to claim 1, is characterized in that: the content of described XML rule verification comprises: the closure to element tags, the statement mode to name space and the statement of XML version.
4. a kind of XBRL trust data storage means according to claim 1, is characterized in that: the verification of described XBRL2.1 rule comprises the judgment rule verification that the regular verification of service regeulations verification, data type of verification, the element property of the definition aspect of verification, the element of file structure aspect and element and tuple repeat.
5. an XBRL trusted data storage system, is characterized in that: comprise XBRL safe storage transmission system, XBRL document data checker, XBRL Web Cleaning instrument;
Described XBRL safe storage transmission system comprises: at least one module in basic security module, access control module, signature blocks, encrypting module and message safety module;
Described XBRL document data checker comprises input interface, disaggregated model, operation model, XBRL checking processing service module, output interface and XBRL dispatch service module;
Described input interface comprises input bus;
Described operation model is connected with described input interface, comprises the XBRL parsing module, XBRL load-on module and the XBRL recombination module that connect successively;
Described disaggregated model is connected with described operation model, comprises the definition chained library, calculating linking storehouse, displaying chained library, tag link storehouse and the Reference-links storehouse that connect successively;
Described XBRL checking is processed service module and is connected with described operation model through described input interface, comprises dimension specification handles device, formula specification handles device, XBRL specification handles device and XML specification handles device;
Described output interface comprises output bus;
XBRL dispatch service module is processed service module with input interface, disaggregated model, operation model, XBRL checking respectively, output interface is connected;
Described XBRL Web Cleaning instrument comprises that instance document and WORD comparing module, WORD and WORD comparing module, instance document authentication module and instance document enter library module.
6. a kind of XBRL trusted data storage system according to claim 5, is characterized in that: described basic security module comprises FWSM, Transport Layer Security module and message-oriented communication protocol module.
7. a kind of XBRL trusted data storage system according to claim 5, is characterized in that: described access control module comprises extensible access control markup language module and security assertion markup language module.
8. a kind of XBRL trusted data storage system according to claim 7, it is characterized in that: described extensible access control markup language module is that a kind of keeper of permission defines access control demand, to obtain the policy language module of required application resource; Described security assertion markup language module is to realize safe access control frame system and the agreement of interoperability between WEB service safe product based on XBRL, by authorizing the module of the information realization access control in specified data storehouse.
9. a kind of XBRL trusted data storage system according to claim 5, is characterized in that: described signature blocks comprises fingerprint verification system.
CN201110300928.8A 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system Active CN102355461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110300928.8A CN102355461B (en) 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110300928.8A CN102355461B (en) 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system

Publications (2)

Publication Number Publication Date
CN102355461A CN102355461A (en) 2012-02-15
CN102355461B true CN102355461B (en) 2014-05-28

Family

ID=45578956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110300928.8A Active CN102355461B (en) 2011-09-29 2011-09-29 XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system

Country Status (1)

Country Link
CN (1) CN102355461B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3979177A4 (en) * 2019-05-31 2022-06-15 Fujitsu Limited Verification method, information processing device, and verification program
RU2794162C1 (en) * 2019-05-31 2023-04-12 Фудзицу Лимитед Verification method, information processing device and long-term computer readable storage medium for storing verification program

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577905B (en) * 2012-07-23 2018-06-19 深圳中兴网信科技有限公司 The auditing method and system of a kind of information security
CN103984702A (en) * 2014-04-21 2014-08-13 浪潮通用软件有限公司 XBRL (extensible business reporting language) reporting data-based system and XBRL reporting data-based method for constructing business intelligence industry analysis cloud
CN105608063B (en) * 2014-11-14 2018-07-27 金蝶软件(中国)有限公司 XBRL instance documents method of calibration and system
CN105260298A (en) * 2015-09-17 2016-01-20 四川长虹电器股份有限公司 XBRL classification standard verification method based on FRTA verification platform
CN105224514A (en) * 2015-09-24 2016-01-06 四川长虹电器股份有限公司 The method of XBRL criteria for classification is expanded based on Flex
CN105227551A (en) * 2015-09-24 2016-01-06 四川长虹电器股份有限公司 The uniform permission administration method of XBRL application platform
CN105354181A (en) * 2015-09-24 2016-02-24 四川长虹电器股份有限公司 XBRL document checking and error correction positioning method
CN106649305A (en) * 2015-10-28 2017-05-10 北京国双科技有限公司 Data processing method and device
CN106127080B (en) * 2016-07-18 2019-05-14 合肥赑歌数据科技有限公司 A kind of guard method of big data resource
US10514854B2 (en) * 2016-11-04 2019-12-24 Microsoft Technology Licensing, Llc Conditional authorization for isolated collections
CN108228688B (en) * 2017-06-20 2022-05-06 上海吉贝克信息技术有限公司 Template generation method, system and server based on XBRL
CN107317819A (en) * 2017-07-13 2017-11-03 北京邮电大学 Encryption method, decryption method and its device of conventional data based on trust data form
CN107577743A (en) * 2017-08-28 2018-01-12 武汉奇米网络科技有限公司 Financial settlement data processing method and device based on ETL
CN107492032A (en) * 2017-09-18 2017-12-19 发贵科技(贵州)有限公司 A kind of business financial auditing reports management system and its database platform
CN110263221A (en) * 2019-06-21 2019-09-20 福建南威软件有限公司 A kind of method and system based on xml operation word document
CN110716719B (en) * 2019-10-09 2023-05-09 民生科技有限责任公司 Method for realizing dynamic endorsement policy of financial block chain alliance platform transaction
CN115687538B (en) * 2022-11-14 2023-04-25 深圳标普云科技有限公司 Enterprise information acquisition and analysis method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101652774A (en) * 2007-04-03 2010-02-17 微软公司 System for financial documentation conversion

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101652774A (en) * 2007-04-03 2010-02-17 微软公司 System for financial documentation conversion

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
.XBRL财务数据转换与存储流程探讨.《财会通讯》.2010,(第19期),全文. *
杨文黎 *
贾明琪 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3979177A4 (en) * 2019-05-31 2022-06-15 Fujitsu Limited Verification method, information processing device, and verification program
RU2794162C1 (en) * 2019-05-31 2023-04-12 Фудзицу Лимитед Verification method, information processing device and long-term computer readable storage medium for storing verification program

Also Published As

Publication number Publication date
CN102355461A (en) 2012-02-15

Similar Documents

Publication Publication Date Title
CN102355461B (en) XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system
Shahid et al. Blockchain-based agri-food supply chain: A complete solution
Alam et al. Blockchain-based Initiatives: Current state and challenges
Accorsi et al. Automated certification for compliant cloud-based business processes
Franqueira et al. Risk and argument: A risk-based argumentation method for practical security
CN108305075A (en) A kind of trade document file management system and management method based on block chain
US20180018738A1 (en) Digital asset platform
Zhang et al. Construction site information decentralized management using blockchain and smart contracts
EA007089B1 (en) System and method for the transmission, storage and retrieval of authenticated documents
CN111639914A (en) Block chain case information management method and device, electronic equipment and storage medium
CN102243748A (en) Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN112488778A (en) Bill processing method and related device
CN106650495A (en) File verification method and device
Faßbender et al. Functional requirements under security pressure
Schönle et al. Industry use cases on blockchain technology
CN117314424B (en) Block chain transaction system and method for big financial data
EP3472779A1 (en) Digital asset platform
Zhe et al. Blockchain and Logistics
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN113709098B (en) Data transmission method and device
Hu Application Analysis of Block Technology Based on Block Chain Computer Model in the False Identification of the Catalog List of the Financial Department of Multinational Companies
CN111652726A (en) Information processing method and system based on block chain
Supakkul et al. Capturing, organizing, and reusing knowledge of NFRs: An NFR pattern approach
Wang Block Chain+ Accounting: Applications, Challenges and Countermeasures Research

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhang Hao

Inventor after: Li Junxue

Inventor after: Duan Xin

Inventor after: Wang Yangui

Inventor after: Yin Jinchun

Inventor after: Wang Lin

Inventor after: Huang Kangpei

Inventor before: Zhang Hao

Inventor before: Li Junxue

Inventor before: Duanxin

Inventor before: Wang Yangui

Inventor before: Yin Jinchun

Inventor before: Wang Lin

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170705

Address after: 510032, No. 2 Xiangshan Road, Yongning Street, Zengcheng District, Guangdong, Guangzhou (the core area of Zengcheng economic and Technological Development Zone)

Patentee after: Guangzhou haoan Electrical Equipment Co., Ltd.

Address before: 510070, Guangdong, Guangzhou, Yuexiu District martyrs Road 100, one of 15 compound

Patentee before: Guangzhou C.H Control Technology Co., Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510032 No. 2 Xiangshan Avenue, Yongning Street, Zengcheng District, Guangzhou, Guangdong (Zengcheng economic and Technological Development Zone core area)

Patentee after: Guangzhou Haoan Intelligent Technology Co., Ltd.

Address before: 510032 No. 2 Xiangshan Avenue, Yongning Street, Zengcheng District, Guangzhou, Guangdong (Zengcheng economic and Technological Development Zone core area)

Patentee before: Guangzhou haoan Electrical Equipment Co., Ltd.