CN108288224A - A kind of finicial administration of enterprise system - Google Patents
A kind of finicial administration of enterprise system Download PDFInfo
- Publication number
- CN108288224A CN108288224A CN201810338197.8A CN201810338197A CN108288224A CN 108288224 A CN108288224 A CN 108288224A CN 201810338197 A CN201810338197 A CN 201810338197A CN 108288224 A CN108288224 A CN 108288224A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- database
- access
- client modules
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
- G06Q40/125—Finance or payroll
Abstract
The invention discloses a kind of finicial administration of enterprise systems, including client modules, client modules are connected with conversion module, conversion module is connected with database module, database module is connected with data processing module, financial computing module and module for financial statement generation, client modules, an encrypting module is each provided in conversion module and database module, authentication module there are one being also set up in conversion module, firewall module is provided between conversion module and database module, mutually independent binary channels link block is provided between client modules and conversion module;Further include that mode of operation records module and operation data identification monitoring modular.The typing of each data carries the identity information of typing person in the present invention;Realize the trackability of data and operation data;The access in encryption storage, encrypted transmission and the permission of database is realized, system carries safety monitoring function, substantially increases the safety of data.
Description
Technical field
The present invention relates to financial system fields, and in particular to a kind of finicial administration of enterprise system.
Background technology
With the continuous development of IT application in enterprises, enterprise is by building Financial Information System system, convenient for enterprise customer
A large amount of financial data is provided, wherein include the sensitive information data of corporate client finance, when using these sensitive datas,
User can obtain the financial data in financial database by terminal computer access Financial Information System system, meanwhile, user
The financial data for being shown in and accessing on terminal screen can also be obtained by print screen, or downloads work(by legal data
Can, financial data is downloaded to and accesses storage etc. in terminal, therefore, when carrying out financial data acquisition operation, it is possible that
Senior enterprise leader or financial staff falsify accounts, appropriate public funds for personal use and phenomena such as financial data is stolen, causes the financial losses of enterprise, directly
Connecing influences the normal operation of entire enterprise.Meanwhile in current financial system most typing financial data and system operatio
Trackability is not present in data, is difficult to find relevant responsible person once problem occurs.
Invention content
To solve the above problems, the present invention provides a kind of finicial administration of enterprise system, the typing of each data carries
The identity information of typing person;Realize the trackability of data and operation data;Encryption storage, the encryption for realizing database pass
Access in defeated and permission, system carry safety monitoring function, substantially increase the safety of data.
To achieve the above object, the technical solution that the present invention takes is:
A kind of finicial administration of enterprise system, including client modules, client modules are connected with conversion module, conversion module connection
There are database module, database module to be connected with data processing module, financial computing module and module for financial statement generation, client
It is each provided with an encrypting module in end module, conversion module and database module, is also set up in conversion module there are one identity
Authentication module is provided with firewall module, is set between client modules and conversion module between conversion module and database module
It is equipped with mutually independent binary channels link block;
A data markers module is additionally provided in the database module, for by its corresponding authentication of the data received
The encryption that data encryption module carries out data is sent to after result information label;
Further include
Mode of operation records module, is deployed on each server in the form of static jar packets, for recording mode by script
The operation data for recording user, is sent to corresponding data storage module by the operation data of recording and stores, and be sent to
Operation data identifies that monitoring modular completes the monitoring identification of data;
Operation data identifies monitoring modular, and the operation that module is sent is recorded to operation data based on the support vector machines of genetic algorithm
Data are identified, and the keying for warning module being carried out according to recognition result.
Preferably, the authentication module carries out identification using biological characteristic model, which adopts
Use voice print database.
Preferably, the data processing module is used to excavate the type of received financial data, corresponding occurrence value
Type and corresponding specific occurrence value, and the result of excavation is sent to financial computing module and financial statement and is given birth to automatically
At module.
Preferably, imputation method editor module in the financial computing module, for carrying out corresponding wealth by various algorithms
The operational analysis for data of being engaged in.
Preferably, the financial statement automatically-generating module, the control command for being inputted according to client are reported in finance
The calling of financial statement template is carried out in table template database, and data are carried out according to the type of the data and data received
Automatic filling, to realize automatically generating for financial statement.
Preferably, the database module is made of safe storage space, the storage for carrying out data, and passes through biology
Characteristic and specific Encryption Algorithm control the access rights in the safe storage space, each two safe storage space it
Between there is emergency data transmission channel, for data emergent transfer transmit.
Preferably, a data preparation module is equipped in the safe storage space, which includes
Data record extraction module is formed corresponding for extracting the corresponding information of reduced data according to the field of setting
Data record;
Data locating module is that corresponding data are found properly for being recorded in safe storage space according to the data extracted
Position, and find similarity number strong point for it, establish its relationship between similarity number strong point.
Preferably, the encrypting module completes the encryption of data by following steps:
1), extract an Encryption Algorithm at random from Encryption Algorithm;
2), using the extraction operation rule in key a specific plaintext section is selected from identification result information, use
Operation is encrypted to selected specific plaintext section in the Encryption Algorithm extracted, and obtains final ciphertext.
Preferably, the access of database module is carried out by following steps:
S1, in conversion module in store access data library module disparate databases configuration file;
S2, user input user name and identification information by client modules, after encrypting module is encrypted, are transmitted to
It is decrypted in conversion module, authentication is carried out by authentication module;
If authentication mistake in S3, step S2, denied access;If authentication is correct, according to user right, modulus of conversion
Block is connect with addressable Database in database module;
S4, access request is sent by client modules by the user of authentication, access request is encrypted by encrypting module
After be transmitted to conversion module decryption, conversion module by call configuration file access to the database with access rights,
After access result is encrypted by encrypting module, it is sent to client modules decryption, is checked for user;Conversion module will access every time
Record stored;
It is communicated using binary channels link block between S5, client modules and conversion module, is carried out in any one channel
When communication, another alternate channel carries out key updating.
Preferably, after often once being accessed, that is, a key updating is carried out;The action statement of access request deposits in visitor
Family end module;The action statement of access request deposits in database module;It accesses record to store using data link table form, works as nothing
When memory space, old access record is preferentially deleted;The configuration file uses XML format.
The invention has the advantages that:
The typing of each data carries the identity information of typing person;Realize the trackability of data and operation data;It realizes
Access in the encryption storage of database, encrypted transmission and permission, system carry safety monitoring function, substantially increase data
Safety.
Description of the drawings
Fig. 1 is a kind of system block diagram of finicial administration of enterprise system of the embodiment of the present invention.
Specific implementation mode
In order to make objects and advantages of the present invention be more clearly understood, the present invention is carried out with reference to embodiments further detailed
Explanation.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, an embodiment of the present invention provides a kind of finicial administration of enterprise systems, which is characterized in that including client
End module, client modules are connected with conversion module, and conversion module is connected with database module, and database module is connected with data
Processing module, financial computing module and module for financial statement generation are respectively set in client modules, conversion module and database module
It sets there are one encrypting module, also sets up that there are one authentication modules in conversion module, between conversion module and database module
It is provided with firewall module, mutually independent binary channels link block is provided between client modules and conversion module;
A data markers module is additionally provided in the database module, for by its corresponding authentication of the data received
The encryption that data encryption module carries out data is sent to after result information label;
Further include
Mode of operation records module, is deployed on each server in the form of static jar packets, for recording mode by script
The operation data for recording user, is sent to corresponding data storage module by the operation data of recording and stores, and be sent to
Operation data identifies that monitoring modular completes the monitoring identification of data;
Operation data identifies monitoring modular, and the operation that module is sent is recorded to operation data based on the support vector machines of genetic algorithm
Data are identified, and the keying for warning module being carried out according to recognition result.
The authentication module carries out identification using biological characteristic model, which uses vocal print number
According to;The voice print database is the vocal print feature and lip of the user obtained from the voice that the user of typing reads aloud specific authentication text
Dynamic interval time data.
The data processing module be used to excavate the type of received financial data, the type of corresponding occurrence value with
And corresponding specific occurrence value, and the result of excavation is sent to financial computing module and financial statement automatically-generating module.
Imputation method editor module in the finance computing module, for carrying out corresponding financial data by various algorithms
Operational analysis.
The financial statement automatically-generating module, the control command for being inputted according to client is in financial statement template number
According to the calling for carrying out financial statement template in library, and the automatic of data is carried out according to the type of the data and data that receive and is filled out
It fills, to realize automatically generating for financial statement.
The database module is made of safe storage space, the storage for carrying out data, and passes through biological characteristic number
Encryption Algorithm controls the access rights in the safe storage space according to this and specifically, and each two safe storage is deposited between space
In emergency data transmission channel, the emergent transfer for data is transmitted.
A data preparation module is equipped in the safe storage space, which includes
Data record extraction module is formed corresponding for extracting the corresponding information of reduced data according to the field of setting
Data record;
Data locating module is that corresponding data are found properly for being recorded in safe storage space according to the data extracted
Position, and find similarity number strong point for it, establish its relationship between similarity number strong point.
The encrypting module completes the encryption of data by following steps:
1), extract an Encryption Algorithm at random from Encryption Algorithm;
2), using the extraction operation rule in key a specific plaintext section is selected from identification result information, use
Operation is encrypted to selected specific plaintext section in the Encryption Algorithm extracted, and obtains final ciphertext.
This specific implementation carries out the access of database module by following steps:
S1, in conversion module in store access data library module disparate databases configuration file;
S2, user input user name and identification information by client modules, after encrypting module is encrypted, are transmitted to
It is decrypted in conversion module, authentication is carried out by authentication module;
If authentication mistake in S3, step S2, denied access;If authentication is correct, according to user right, modulus of conversion
Block is connect with addressable Database in database module;
S4, access request is sent by client modules by the user of authentication, access request is encrypted by encrypting module
After be transmitted to conversion module decryption, conversion module by call configuration file access to the database with access rights,
After access result is encrypted by encrypting module, it is sent to client modules decryption, is checked for user;Conversion module will access every time
Record stored;
It is communicated using binary channels link block between S5, client modules and conversion module, is carried out in any one channel
When communication, another alternate channel carries out key updating.
After often once being accessed, that is, carry out a key updating;The action statement of access request deposits in client mould
Block;The action statement of access request deposits in database module;It accesses record to store using data link table form, when empty without storage
Between when, preferentially delete old access record;The configuration file uses XML format.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of finicial administration of enterprise system, which is characterized in that including client modules, client modules are connected with modulus of conversion
Block, conversion module are connected with database module, and database module is connected with data processing module, financial computing module and finance report
Table generation module, is each provided with an encrypting module in client modules, conversion module and database module, in conversion module also
Setting is provided with firewall module there are one authentication module between conversion module and database module, client modules with
Mutually independent binary channels link block is provided between conversion module;
A data markers module is additionally provided in the database module, for by its corresponding authentication of the data received
The encryption that data encryption module carries out data is sent to after result information label;
Further include
Mode of operation records module, is deployed on each server in the form of static jar packets, for recording mode by script
The operation data for recording user, is sent to corresponding data storage module by the operation data of recording and stores, and be sent to
Operation data identifies that monitoring modular completes the monitoring identification of data;
Operation data identifies monitoring modular, and the operation that module is sent is recorded to operation data based on the support vector machines of genetic algorithm
Data are identified, and the keying for warning module being carried out according to recognition result.
2. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that the authentication module is using life
Object characteristic model carries out identification, which uses voice print database.
3. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that the data processing module is for digging
The pick received type of financial data, the type of corresponding occurrence value and corresponding specific occurrence value, and will excavate
Result be sent to financial computing module and financial statement automatically-generating module.
4. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that imputation in the finance computing module
Method editor module, the operational analysis for carrying out corresponding financial data by various algorithms.
5. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that the financial statement automatically generates mould
Block, the control command for being inputted according to client carry out the calling of financial statement template in financial statement template database,
And the automatic filling of data is carried out according to the type of the data and data received, to realize the automatic life of financial statement
At.
6. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that the database module is by storing up safely
Space composition, the storage for carrying out data are deposited, and the peace is controlled by biological attribute data and specific Encryption Algorithm
There is emergency data transmission channel in the access rights of full storage space, each two safe storage, between space for data
Emergent transfer transmission.
7. a kind of finicial administration of enterprise system as claimed in claim 6, which is characterized in that be equipped in the safe storage space
One data preparation module, the data preparation module include
Data record extraction module is formed corresponding for extracting the corresponding information of reduced data according to the field of setting
Data record;
Data locating module is that corresponding data are found properly for being recorded in safe storage space according to the data extracted
Position, and find similarity number strong point for it, establish its relationship between similarity number strong point.
8. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that the encrypting module passes through following step
The rapid encryption for completing data:
1), extract an Encryption Algorithm at random from Encryption Algorithm;
2), using the extraction operation rule in key a specific plaintext section is selected from identification result information, use
Operation is encrypted to selected specific plaintext section in the Encryption Algorithm extracted, and obtains final ciphertext.
9. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that carry out database by following steps
The access of module:
S1, in conversion module in store access data library module disparate databases configuration file;
S2, user input user name and identification information by client modules, after encrypting module is encrypted, are transmitted to
It is decrypted in conversion module, authentication is carried out by authentication module;
If authentication mistake in S3, step S2, denied access;If authentication is correct, according to user right, modulus of conversion
Block is connect with addressable Database in database module;
S4, access request is sent by client modules by the user of authentication, access request is encrypted by encrypting module
After be transmitted to conversion module decryption, conversion module by call configuration file access to the database with access rights,
After access result is encrypted by encrypting module, it is sent to client modules decryption, is checked for user;Conversion module will access every time
Record stored;
It is communicated using binary channels link block between S5, client modules and conversion module, is carried out in any one channel
When communication, another alternate channel carries out key updating.
10. a kind of finicial administration of enterprise system as described in claim 1, which is characterized in that after often once being accessed, i.e., into
Key updating of row;The action statement of access request deposits in client modules;The action statement of access request deposits in number
According to library module;It accesses record to store using data link table form, when no memory space, preferentially deletes old access record;Institute
It states configuration file and uses XML format.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810338197.8A CN108288224A (en) | 2018-04-16 | 2018-04-16 | A kind of finicial administration of enterprise system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810338197.8A CN108288224A (en) | 2018-04-16 | 2018-04-16 | A kind of finicial administration of enterprise system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108288224A true CN108288224A (en) | 2018-07-17 |
Family
ID=62834355
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810338197.8A Pending CN108288224A (en) | 2018-04-16 | 2018-04-16 | A kind of finicial administration of enterprise system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108288224A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109101588A (en) * | 2018-07-25 | 2018-12-28 | 西安航空职业技术学院 | A kind of electronic commerce data inquiry system |
CN109145557A (en) * | 2018-07-31 | 2019-01-04 | 西安航空职业技术学院 | A kind of computer data protection system |
CN109558441A (en) * | 2018-10-25 | 2019-04-02 | 平安科技(深圳)有限公司 | Financial index automatic monitoring method, device, computer equipment and storage medium |
CN109948319A (en) * | 2019-03-22 | 2019-06-28 | 衡水学院 | Financial accounting can be regarded as account system with pre- |
CN110288315A (en) * | 2019-06-18 | 2019-09-27 | 浙江无极互联科技有限公司 | A kind of financial management computer system |
CN110930234A (en) * | 2019-11-18 | 2020-03-27 | 河南城建学院 | Financial management method with remote access function |
CN112150264A (en) * | 2020-10-13 | 2020-12-29 | 信阳农林学院 | Enterprise financial balance analysis system based on cloud platform |
CN112950343A (en) * | 2021-02-25 | 2021-06-11 | 重庆维知达科技有限公司 | Enterprise financial data acquisition and processing method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104966026A (en) * | 2015-06-03 | 2015-10-07 | 西安科技大学 | Arithmetical operation system |
CN106209366A (en) * | 2016-06-25 | 2016-12-07 | 郑州财经学院 | A kind of data guard method of fail-safe computer |
CN106228080A (en) * | 2016-06-25 | 2016-12-14 | 郑州财经学院 | A kind of computer data enciphering system |
CN107203502A (en) * | 2016-12-03 | 2017-09-26 | 河南职业技术学院 | A kind of financial statement processing system |
CN107274281A (en) * | 2017-06-10 | 2017-10-20 | 杨建慧 | A kind of Accounting network system |
CN107609081A (en) * | 2017-08-29 | 2018-01-19 | 河南职业技术学院 | A kind of Financial Information audit management system |
CN107818261A (en) * | 2017-09-12 | 2018-03-20 | 王振铎 | A kind of computer information safe stocking system |
-
2018
- 2018-04-16 CN CN201810338197.8A patent/CN108288224A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104966026A (en) * | 2015-06-03 | 2015-10-07 | 西安科技大学 | Arithmetical operation system |
CN106209366A (en) * | 2016-06-25 | 2016-12-07 | 郑州财经学院 | A kind of data guard method of fail-safe computer |
CN106228080A (en) * | 2016-06-25 | 2016-12-14 | 郑州财经学院 | A kind of computer data enciphering system |
CN107203502A (en) * | 2016-12-03 | 2017-09-26 | 河南职业技术学院 | A kind of financial statement processing system |
CN107274281A (en) * | 2017-06-10 | 2017-10-20 | 杨建慧 | A kind of Accounting network system |
CN107609081A (en) * | 2017-08-29 | 2018-01-19 | 河南职业技术学院 | A kind of Financial Information audit management system |
CN107818261A (en) * | 2017-09-12 | 2018-03-20 | 王振铎 | A kind of computer information safe stocking system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109101588A (en) * | 2018-07-25 | 2018-12-28 | 西安航空职业技术学院 | A kind of electronic commerce data inquiry system |
CN109145557A (en) * | 2018-07-31 | 2019-01-04 | 西安航空职业技术学院 | A kind of computer data protection system |
CN109558441A (en) * | 2018-10-25 | 2019-04-02 | 平安科技(深圳)有限公司 | Financial index automatic monitoring method, device, computer equipment and storage medium |
CN109948319A (en) * | 2019-03-22 | 2019-06-28 | 衡水学院 | Financial accounting can be regarded as account system with pre- |
CN110288315A (en) * | 2019-06-18 | 2019-09-27 | 浙江无极互联科技有限公司 | A kind of financial management computer system |
CN110930234A (en) * | 2019-11-18 | 2020-03-27 | 河南城建学院 | Financial management method with remote access function |
CN110930234B (en) * | 2019-11-18 | 2024-03-12 | 河南城建学院 | Financial management method with remote access function |
CN112150264A (en) * | 2020-10-13 | 2020-12-29 | 信阳农林学院 | Enterprise financial balance analysis system based on cloud platform |
CN112950343A (en) * | 2021-02-25 | 2021-06-11 | 重庆维知达科技有限公司 | Enterprise financial data acquisition and processing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108288224A (en) | A kind of finicial administration of enterprise system | |
EP3788533B1 (en) | Protecting personally identifiable information (pii) using tagging and persistence of pii | |
US7346769B2 (en) | Method for selective encryption within documents | |
CN101238434B (en) | Communication system of encapsulating information in a database | |
US20070226791A1 (en) | Method for securely supporting password change | |
CN107004080A (en) | Environment sensing security token | |
US9986433B2 (en) | Wireless application protocol gateway | |
US11550957B2 (en) | Securing user-entered text in-transit | |
CN108540449A (en) | Management-control method and system, the computer storage media of intelligent seal | |
CN112365001B (en) | Model generation method, device and server | |
CN106992851A (en) | TrustZone-based database file password encryption and decryption method and device and terminal equipment | |
CN106980793A (en) | TrustZone-based universal password storage and reading method, device and terminal equipment | |
US20210044573A1 (en) | Identifying and Securing Unencrypted Data in a Production Environment | |
CN108282484B (en) | Password acquisition method and device, computer equipment and storage medium | |
CN110175316B (en) | Media number interaction method, system and storage medium based on blockchain | |
CA3066701A1 (en) | Controlling access to data | |
CN115795538A (en) | Desensitization document anti-desensitization method, apparatus, computer device and storage medium | |
CN117332453B (en) | Safety management system for product database | |
CN110445757A (en) | Personnel information encryption method, device, computer equipment and storage medium | |
CN108399341A (en) | A kind of Windows dualized file managing and control systems based on mobile terminal | |
CN102640166B (en) | Electronic security device for validation adopting biometrics information and using method thereof | |
CN114822796A (en) | Vaccine distribution management system and method based on intelligent contract and contract platform | |
CN110717078A (en) | Beauty shop business data monitoring method, device, equipment and medium | |
CN110795726A (en) | Password protection method and system based on artificial neural network | |
CN100410922C (en) | User information managing system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180717 |
|
RJ01 | Rejection of invention patent application after publication |