CN109460995B - Financial certification method, device, computer equipment and storage medium - Google Patents

Financial certification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109460995B
CN109460995B CN201811118142.2A CN201811118142A CN109460995B CN 109460995 B CN109460995 B CN 109460995B CN 201811118142 A CN201811118142 A CN 201811118142A CN 109460995 B CN109460995 B CN 109460995B
Authority
CN
China
Prior art keywords
data
credential
voucher
preset
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811118142.2A
Other languages
Chinese (zh)
Other versions
CN109460995A (en
Inventor
宗卫琴
钟文辉
林少杰
张亚蔚
徐晏君
甘泽泉
周琦
唐晓燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An International Financial Leasing Co Ltd
Original Assignee
Ping An International Financial Leasing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An International Financial Leasing Co Ltd filed Critical Ping An International Financial Leasing Co Ltd
Priority to CN201811118142.2A priority Critical patent/CN109460995B/en
Publication of CN109460995A publication Critical patent/CN109460995A/en
Application granted granted Critical
Publication of CN109460995B publication Critical patent/CN109460995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to a financial certification method, a financial certification device, computer equipment and a storage medium based on data resources. The method comprises the following steps: the server receives a credential generation request sent by the terminal and acquires a corresponding financial service type according to the credential generation request. And acquiring the credential data from the service database according to the financial service type, transmitting the plurality of credential data to a credential pool, generating a credential file according to the credential data, performing anomaly detection on the credential file, and transmitting the credential file to the terminal when the anomaly detection is passed. By adopting the method, the abnormal problem of certificate making can be timely processed by carrying out abnormal detection before the certificate file is sent to the terminal, so that a great deal of manpower is consumed to repeatedly carry out manual certificate making, and the resource consumption is reduced.

Description

Financial certification method, device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a financial certification method, a financial certification device, a computer device, and a storage medium.
Background
With the development of computer technology, various electronic certificates for different services appear, and conventionally, service data are collected manually, and are subjected to auditing treatment and added into related certificate making information. In the process of preparing the financial evidence according to the financial data, the financial data is mainly operated by manual operation so as to realize financial evidence, but along with the increase of the quantity of various financial businesses, the workload of manually preparing the financial evidence is greatly increased, and a great amount of human resources are wasted.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a financial certification method, apparatus, computer device, and storage medium that can reduce human resource consumption.
A financial certification method, the method comprising:
receiving a credential generation request sent by a terminal, and acquiring a corresponding financial service type according to the credential generation request;
acquiring credential data from a service database according to the financial service type;
transmitting the credential data to a credential pool, and generating a credential file according to the credential data;
performing anomaly detection on the voucher file;
and when passing the abnormality detection, sending the credential file to a terminal.
In one embodiment, the method further comprises:
classifying the voucher data according to the financial service type;
newly establishing a corresponding storage folder in a service database according to the financial service type;
and storing the credential data into a corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
In one embodiment, the transmitting the credential data to a credential pool and generating a credential file from the credential data includes:
Comparing the credential data with preset credential data corresponding to the financial service type;
when the credential data is consistent with the preset credential data, the credential data passes an initial verification;
acquiring attribute information corresponding to the initially verified credential data, and comparing the attribute information of the credential data with a preset attribute rule;
when the attribute information of the credential data is consistent with the preset attribute rule, the credential data passes through integrity verification;
and acquiring the credential data passing the integrity check, and generating a credential file according to the credential data passing the integrity check.
In one embodiment, the anomaly detection of the credential file includes:
extracting attribute information corresponding to the voucher file;
acquiring a voucher rule corresponding to a financial service type according to a corresponding relation between the preset financial service type and the voucher rule;
performing preliminary anomaly detection on the attribute information according to the credential rules;
and when the attribute information is consistent with the credential rules, the credential file passes the preliminary anomaly detection.
In one embodiment, the method further comprises:
Acquiring current flow data corresponding to the credential file through preliminary anomaly detection;
acquiring preset streaming data corresponding to a preset voucher file according to the corresponding relation between the preset voucher file and the preset streaming data;
and when the current stream data is consistent with the preset stream data, the credential file passes through anomaly detection.
In one embodiment, the method further comprises:
receiving a plurality of transaction flow data, and acquiring repeated flow data from the transaction flow data;
extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data;
and generating credential data according to the representative stream data.
A financial evidence-making device, the device comprising:
the receiving module is used for receiving a credential generation request sent by the terminal and acquiring a corresponding financial service type according to the credential generation request;
the credential data acquisition module is used for acquiring credential data from a service database according to the financial service type;
the credential file generation module is used for transmitting the credential data to a credential pool and generating a credential file according to the credential data;
The abnormality detection module is used for detecting the abnormality of the certificate file;
and the sending module is used for sending the credential file to the terminal when the abnormality detection is passed.
In one embodiment, the method further comprises a credential data generation module for:
classifying the voucher data according to the financial service type; newly establishing a corresponding storage folder in a service database according to the financial service type; and storing the credential data into a corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
receiving a credential generation request sent by a terminal, and acquiring a corresponding financial service type according to the credential generation request;
acquiring credential data from a service database according to the financial service type;
transmitting the credential data to a credential pool, and generating a credential file according to the credential data;
performing anomaly detection on the voucher file;
and when passing the abnormality detection, sending the credential file to a terminal.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
receiving a credential generation request sent by a terminal, and acquiring a corresponding financial service type according to the credential generation request;
acquiring credential data from a service database according to the financial service type;
transmitting the credential data to a credential pool, and generating a credential file according to the credential data;
performing anomaly detection on the voucher file;
and when passing the abnormality detection, sending the credential file to a terminal.
According to the financial evidence manufacturing method, the financial evidence manufacturing device, the computer equipment and the storage medium, the server receives the evidence generation request sent by the terminal, obtains the corresponding financial business type according to the evidence generation request, obtains the evidence data from the business database according to the financial business type, transmits a plurality of evidence data to the evidence pool, generates the evidence file according to the evidence data, performs abnormality detection on the evidence file, and sends the evidence file to the terminal when the abnormality detection is passed. By carrying out anomaly detection before sending the voucher file to the terminal, the problem of abnormal certificate making can be timely handled, repeated manual certificate making with a large amount of manpower consumption is avoided, and resource consumption is reduced.
Drawings
FIG. 1 is an application scenario diagram of a financial certification method in one embodiment;
FIG. 2 is a flow chart of a financial certification method in one embodiment;
FIG. 3 is a flow chart of transmitting credential data to a credential pool and generating a credential file based on the credential data in one embodiment;
FIG. 4 is a block diagram of a financial certification device in one embodiment;
fig. 5 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The financial certification method provided by the application can be applied to an application environment shown in figure 1. Wherein the terminal 102 communicates with the server 104 via a network. The server 104 receives the credential generation request sent by the terminal 102, and obtains the corresponding financial service type according to the credential generation request. And acquiring the credential data from the service database according to the financial service type, transmitting the credential data to the credential pool, and generating a credential file according to the credential data. Anomaly detection is performed on the credential file, and when passing anomaly detection, the server 104 sends the credential file to the terminal 102. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, and tablet computers, and the server 104 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a financial certification method is provided, and the method is applied to the server in fig. 1 for illustration, and includes the following steps:
s202, the server receives a certificate generation request sent by the terminal, and obtains a corresponding financial service type according to the certificate generation request.
Specifically, there is a correspondence between different credential identifiers and different financial service types, and the server may obtain a financial service type corresponding to the credential identifier according to a correspondence between a preset credential identifier and a financial service type.
The voucher identification comprises a receipt voucher identification, a payment voucher identification, a refund voucher identification, an invoicing voucher identification, a contract lease voucher identification, an early clearing voucher identification, an asset change voucher identification, a receipt and payment deduction voucher identification and the like, and the corresponding financial service types are respectively receipt, payment, refund, invoicing, contract lease, early clearing, asset change and receipt and payment deduction.
Taking a receipt generation request with a receipt identification sent by a server receiving terminal as an example, the server obtains a receipt service corresponding to the receipt identification from a database according to the receipt identification carried by the receipt generation request sent by the terminal. Similarly, for the voucher generation request carrying other voucher identifications, such as a payment voucher mark refund voucher identification, an invoicing voucher identification and the like, the server can acquire corresponding payment service, refund service and invoicing service from the database.
S204, the server acquires the credential data from the service database according to the financial service type.
Specifically, different financial service types correspond to different credential data, that is, there is a correspondence between the financial service type and the credential data. The server can acquire the credential data corresponding to the financial service type from the service database according to the corresponding relation between the preset financial service type and the credential data.
The electronic data file obtained by performing the vouching operation on the voucher data can also be said to be an electronic data file used for proving that the transaction has occurred or completed when paperless transaction is performed through the management information system, defining legal responsibility of both parties of the transaction, recording the original form and content of the transaction and being used for subsequent information processing. The credentialing means a process of organizing and implementing the entry data of the management information system in the form of an electronic file with legal effectiveness, which is a precondition of realizing paperless transaction, and the electronic data file generated by the process, namely, an electronic original credential.
Further, the financial business types are respectively collection, payment, refund, billing, contract renting, advanced clearing, asset changing, receipt and payment deduction, and the corresponding voucher data comprises collection voucher data, payment voucher data, refund voucher data, billing voucher data, contract renting voucher data, advanced clearing voucher data, asset changing voucher data and receipt and payment deduction voucher data. The server can acquire the billing voucher data corresponding to the billing service according to the corresponding relation between the billing service and the billing voucher data. Similarly, the server may also obtain corresponding receipt data, payment data, and refund data according to the receipt service, the payment service, and the refund service.
S206, the server transmits the credential data to the credential pool and generates a credential file according to the credential data.
The credential pool is used for verifying the credential data, including initial checksum integrity verification of the credential data, and generating a credential file according to the credential data passing the initial checksum integrity verification.
Specifically, the server acquires preset credential data corresponding to the financial service type, compares the credential data with preset credential data corresponding to the financial service type, and indicates that the credential data passes initial verification when the credential data is consistent with the preset credential data. After the initial verification is passed, the server acquires attribute information corresponding to the credential data passing the initial verification, compares the attribute information of the credential data with a preset attribute rule, and indicates that the credential data passes the integrity verification when the attribute information of the credential data is consistent with the preset attribute rule. The server obtains the credential data that passes the integrity check and generates a credential file based on the credential data that passes the integrity check.
Further, taking the example that the server obtains the payment receipt data and generates the payment receipt file according to the payment receipt data. The server acquires payment voucher data and preset payment voucher data corresponding to the payment service, the voucher pool compares the payment voucher data with the preset payment voucher data, and when the payment voucher data is consistent with the preset payment voucher data, the payment voucher data is indicated to pass through initial verification. After the initial verification is passed, the server acquires the attribute information corresponding to the payment voucher data passing the initial verification, compares the attribute information of the payment voucher data with the preset attribute rule, and when the attribute information of the payment voucher data is consistent with the preset attribute rule, the server indicates that the payment voucher data passes the integrity verification. The server obtains the payment receipt data passing the integrity check and generates a payment receipt file based on the payment receipt data passing the integrity check.
S208, the server detects the abnormality of the certificate file.
S210, when passing the anomaly detection, the server sends the credential file to the terminal.
Specifically, the anomaly detection of the credential file by the server includes: the server acquires a corresponding relation between a preset financial service type and a voucher rule, and acquires the voucher rule corresponding to the financial service type according to the corresponding relation between the preset financial service type and the voucher rule. The server extracts attribute information corresponding to the voucher file, performs preliminary abnormality detection on the attribute information according to the voucher rule, and when the attribute information is consistent with the voucher rule, the voucher file passes the preliminary abnormality detection.
The server acquires preset streaming data corresponding to the voucher file according to the corresponding relation between the preset voucher file and the preset streaming data, and when the current streaming data is consistent with the preset streaming data, the voucher file is indicated to pass through the anomaly detection. After the credential file passes the anomaly detection, the server sends the credential file passing the anomaly detection to the terminal.
The voucher rules are preset voucher file attribute rules corresponding to the financial service types, and are used for comparing attribute information of the voucher files and judging whether the voucher files accord with the preset voucher file attribute rules according to comparison results.
In the financial evidence manufacturing method, the server obtains the corresponding financial business type through receiving the evidence generation request sent by the terminal, obtains the evidence data from the business database according to the financial business type, transmits a plurality of evidence data to the evidence pool, generates the evidence file according to the evidence data, carries out abnormality detection on the evidence file, and sends the evidence file to the terminal when the abnormality detection is carried out. By carrying out anomaly detection before sending the voucher file to the terminal, the problem of abnormal certificate making can be timely handled, repeated manual certificate making with a large amount of manpower consumption is avoided, and resource consumption is reduced.
In one embodiment, there is provided a method of transferring credential data into a credential pool and generating a credential file from the credential data, comprising:
s302, the server compares the credential data with preset credential data corresponding to the financial service type.
Specifically, different financial service types correspond to different preset credential data, and the server acquires the credential data corresponding to the financial service type according to the corresponding relation between the preset credential data and the financial service type and compares the credential data with the preset credential data. For example, the server may obtain the contract rental certificate data corresponding to the contract rental service according to a preset correspondence between the contract rental certificate data and the contract rental service. Comparing the contract renting certificate data with preset contract renting certificate data.
S304, when the credential data is consistent with the preset credential data, the credential data passes the initial verification.
Specifically, taking the receipt credential data as an example, the server compares the receipt credential data with the preset receipt credential data to obtain a result that the receipt credential data is consistent with the preset receipt credential data, which indicates that the receipt credential data passes the initial verification.
When the credential data is inconsistent with the preset credential data, the credential data is not verified initially, and the credential pool cannot generate a credential file according to the existing credential data.
S306, the server acquires the attribute information corresponding to the credential data through initial verification, and compares the attribute information of the credential data with a preset attribute rule.
The server acquires attribute information corresponding to the credential data through initial verification, wherein the attribute information comprises content corresponding to the credential data and the type of the credential. The preset attribute rules include preset requirements for the credential data content and credential data class decisions. The server compares the content corresponding to the voucher data with a preset attribute rule, judges whether the content corresponding to the voucher data is consistent with a preset requirement for the content of the voucher data in the preset attribute rule, compares the voucher type of the voucher data with the voucher data type in the preset attribute rule, and judges whether the voucher type of the voucher data is consistent with the voucher data type in the preset attribute rule.
Further, taking the payment receipt data passing the initial verification as an example, the server compares the payment item corresponding to the payment receipt data and the account corresponding to each item with the preset requirement for the payment receipt data content in the preset rule attribute rule, and judges whether the payment item corresponding to the payment receipt data and the account corresponding to each item are consistent with the preset requirement for the payment receipt data content in the preset rule attribute rule.
Comparing the payment voucher type to which the payment voucher data belongs with the voucher data type in the preset attribute rule, and judging whether the payment voucher type to which the payment voucher data belongs is consistent with the voucher data type in the preset attribute rule.
S308, when the attribute information of the credential data is consistent with a preset attribute rule, the credential data passes the integrity check.
Specifically, when the content corresponding to the credential data is consistent with the preset requirement for the content of the credential data in the preset attribute rule, and the credential type of the credential data is consistent with the credential data type in the preset attribute rule, the credential data is indicated to pass the integrity check.
For example, the refund entry corresponding to the refund voucher data and the refund account corresponding to each entry are consistent with the preset requirements for the refund voucher data content in the preset attribute rule, and the voucher type of the refund voucher data is consistent with the voucher data type in the preset attribute rule, so that the refund voucher data passes the integrity check.
S310, the server acquires the credential data passing the integrity check and generates a credential file according to the credential data passing the integrity check.
Specifically, in this embodiment, the server acquires refund credential data that passes the integrity check, and generates a refund credential file from the refund credential data that passes the integrity check. Similarly, the server may also generate corresponding collection, payment, billing, and contract lease voucher files based on the collection, payment, billing, and contract lease voucher data that passes the integrity check.
The step of transmitting the credential data to the credential pool and generating the credential file according to the credential data can obtain the credential file conforming to the preset credential data and the preset attribute rule by carrying out the initial check and the integrity check on the credential data, and generating the credential file according to the credential data passing the initial check and the integrity check. By checking and screening the credential data, the credential data meeting the requirements is obtained, and the credential file is generated according to the credential data meeting the requirements, so that the operation on the credential data not meeting the requirements can be avoided, and the generation efficiency of the credential file is improved.
In one embodiment, a financial certification method is provided, further comprising:
the server classifies the credential data according to the financial business type; newly establishing a corresponding storage folder in a service database according to the financial service type; and storing the credential data into the corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
Specifically, the server classifies the voucher data according to a preset corresponding relation between the financial service type and the voucher data, wherein the financial service type comprises collection, payment, refund, billing, contract renting, early clearing, asset changing, receipt and payment deduction service and the like, and the voucher data can be correspondingly classified into collection, payment, refund, billing, contract renting, early clearing, asset changing and receipt deduction voucher data.
The server establishes corresponding collection, payment, refund, billing, contract lease, early clearing, asset change and receipt and payment deduction storage folders in a database according to the financial business types, and stores the collection, payment, refund, billing, contract lease, early clearing, asset change and receipt and payment deduction voucher data in the corresponding collection, payment, refund, billing, contract lease, early clearing, asset change and receipt and payment deduction storage folders according to the corresponding relation between the preset financial business types and the storage folders.
The financial evidence making method provides a storage method for storing the evidence data in the storage folder corresponding to the financial business type, and different evidence data are stored in a classified mode, so that the acquisition of the different evidence data according to requirements is facilitated, and the acquisition efficiency of the evidence data is improved.
In one embodiment, there is provided a method of anomaly detection of a credential file, comprising:
the server extracts attribute information corresponding to the credential file; acquiring a voucher rule corresponding to the financial service type according to a corresponding relation between the preset financial service type and the voucher rule; performing preliminary anomaly detection on the attribute information according to the credential rules; when the attribute information is consistent with the voucher rules, the voucher file passes preliminary anomaly detection.
Specifically, the attribute information corresponding to the credential file acquired by the server includes the type of the credential file and the location of the credential file. And acquiring the voucher rules corresponding to the financial service types according to the corresponding relation between the preset financial service types and the voucher rules, wherein the voucher rules comprise preset voucher types and preset storage folders.
The server compares the category of the voucher file with the preset voucher category included in the voucher rule, and judges whether the category of the voucher file is consistent with the preset voucher category included in the voucher rule. And comparing the position of the voucher file with a preset storage folder, and judging whether the position of the voucher file is consistent with the preset storage folder. When the category of the credential file is consistent with the preset credential category included in the credential rule and the position of the credential file is consistent with the preset storage folder, the credential file is indicated to pass the preliminary anomaly detection.
And the server performs preliminary abnormality detection on the attribute information of the voucher file according to the voucher rule, and when the attribute information of the voucher file is consistent with the voucher rule, the server indicates that the corresponding voucher file passes the preliminary abnormality detection. By carrying out preliminary abnormality detection on the voucher file, the abnormal situation of the voucher file can be obtained in time according to the voucher rule, the abnormal situation can be found as early as possible, further measures are taken on the abnormal situation, the abnormal voucher file is prevented from being sent to the terminal, and the accuracy of the voucher file is ensured.
In one embodiment, there is provided a method for anomaly detection of a credential file, further comprising:
the server acquires current flow data corresponding to the certificate file detected through preliminary abnormality; acquiring preset streaming data corresponding to the voucher file according to the corresponding relation between the preset voucher file and the preset streaming data; when the current stream data is consistent with the preset stream data, the voucher file passes through anomaly detection.
Specifically, the server obtains current flow data corresponding to the voucher files detected through the preliminary abnormal part, wherein the voucher files comprise receipt, payment, refund, billing, contract renting, advanced clearing, asset changing and receipt and payment deduction voucher files, and the flow data corresponding to the different voucher files are respectively divided into receipt, payment, refund, billing, contract renting, advanced clearing, asset changing and receipt and payment deduction voucher flow data.
And respectively acquiring preset flow data corresponding to different voucher files according to the corresponding relation between the preset voucher files and the preset flow data, wherein the preset flow data comprises preset collection, payment, refund, billing, contract renting, advanced clearing, asset changing and receipt and payment deduction voucher flow data. And comparing the different current stream data with corresponding preset stream data respectively, and when the current stream data is consistent with the preset stream data, indicating that the corresponding credential file passes the anomaly detection.
And comparing the current stream data corresponding to the credential data detected through preliminary abnormality with preset stream data by the server, judging whether the current stream data is consistent with the preset stream data, and indicating that abnormality occurs when the current stream data is inconsistent with the preset stream data and indicating that the credential file passes through the abnormality detection when the current stream data is consistent with the preset stream data. By comparing the current stream data with the preset stream data, whether the voucher file is abnormal or not can be judged, when the abnormality occurs, the abnormality can be timely positioned, corresponding processing is carried out, and the abnormality rate of the voucher file sent to the terminal is reduced.
In one embodiment, a financial certification method is provided, further comprising:
The server receives a plurality of transaction stream data and acquires repeated stream data from the transaction stream data; extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data; credential data is generated from the representative pipeline data.
Specifically, the server receives a plurality of transaction streamlines corresponding to the receipt voucher file, analyzes and processes the transaction streamlines to obtain repeated receipt streamlines data therein, extracts representative receipt streamlines data from the repeated receipt streamlines data, deletes other redundant repeated receipt streamlines data, and generates receipt voucher data according to the representative receipt streamlines data. Similarly, the server may also generate corresponding payment, refund, billing, contract renting, advance clearing, asset change, and receipt deduction voucher data based on payment, refund, billing, contract renting, advance clearing, asset change, and receipt deduction representative aggregate data, respectively.
According to the financial evidence making method, the step of generating the corresponding evidence data according to the flow data is provided, and the repeated processing of the same flow data by the server is avoided by processing the repeated flow data, so that the repeated evidence data is generated, the generation efficiency of the evidence data is improved, and further the working efficiency is improved.
It should be understood that, although the steps in the flowcharts of fig. 2-3 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-3 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily occur sequentially, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or steps.
In one embodiment, as shown in FIG. 4, there is provided a financial certification device comprising: wherein:
and the receiving module 402 is configured to receive a credential generation request sent by the terminal, and obtain a corresponding financial service type according to the credential generation request.
The credential data obtaining module 404 is configured to obtain credential data from the service database according to the financial service type.
The credential file generation module 406 is configured to transmit credential data to the credential pool and generate a credential file according to the credential data.
The anomaly detection module 408 is configured to perform anomaly detection on the credential file.
And a transmitting module 410 for transmitting the credential file to the terminal when passing the anomaly detection.
According to the financial evidence manufacturing device, the server receives the evidence generation request sent by the terminal, obtains the corresponding financial business type according to the evidence generation request, obtains evidence data from the business database according to the financial business type, transmits a plurality of evidence data to the evidence pool, generates the evidence file according to the evidence data, performs abnormality detection on the evidence file, and sends the evidence file to the terminal when the abnormality detection is passed. By carrying out anomaly detection before sending the voucher file to the terminal, the problem of abnormal certificate making can be timely handled, repeated manual certificate making with a large amount of manpower consumption is avoided, and resource consumption is reduced.
In one embodiment, a financial certification device is provided, further comprising a credential data generation module for:
classifying the voucher data according to the financial service type; newly establishing a corresponding storage folder in a service database according to the financial service type; and storing the credential data into the corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
According to the financial evidence manufacturing device, the storage method for storing the evidence data in the storage folder corresponding to the financial business type is provided, different evidence data are stored in a classified mode, the different evidence data can be acquired according to requirements, and the acquiring efficiency of the evidence data is improved.
In one embodiment, a financial certification device is provided, wherein the credential file generation module is further configured to:
comparing the voucher data with preset voucher data corresponding to the financial service type; when the credential data is consistent with the preset credential data, the credential data passes the initial verification; acquiring attribute information corresponding to the credential data through initial verification, and comparing the attribute information of the credential data with a preset attribute rule; when the attribute information of the credential data is consistent with a preset attribute rule, the credential data passes through integrity verification; and acquiring the credential data passing the integrity check, and generating a credential file according to the credential data passing the integrity check.
The credential file generation module can obtain the credential file conforming to the preset credential data and the preset attribute rule by carrying out initial verification and integrity verification on the credential data, and generates the credential file according to the credential data passing the initial verification and the integrity verification. By checking and screening the credential data, the credential data meeting the requirements is obtained, and the credential file is generated according to the credential data meeting the requirements, so that the operation on the credential data not meeting the requirements can be avoided, and the generation efficiency of the credential file is improved.
In one embodiment, a financial certification device is provided, wherein the anomaly detection module is further configured to:
extracting attribute information corresponding to the voucher file; acquiring a voucher rule corresponding to the financial service type according to a corresponding relation between the preset financial service type and the voucher rule; performing preliminary anomaly detection on the attribute information according to the credential rules; when the attribute information is consistent with the voucher rules, the voucher file passes preliminary anomaly detection.
And the abnormality detection module is used for carrying out preliminary abnormality detection on the attribute information of the voucher file by the server according to the voucher rule, and when the attribute information of the voucher file is consistent with the voucher rule, the corresponding voucher file is indicated to pass the preliminary abnormality detection. By carrying out preliminary abnormality detection on the voucher file, the abnormal situation of the voucher file can be obtained in time according to the voucher rule, the abnormal situation can be found as early as possible, further measures are taken on the abnormal situation, the abnormal voucher file is prevented from being sent to the terminal, and the accuracy of the voucher file is ensured.
In one embodiment, a financial certification device is provided, wherein the anomaly detection module is further configured to:
acquiring current stream data corresponding to the voucher file through preliminary anomaly detection; acquiring preset streaming data corresponding to the voucher file according to the corresponding relation between the preset voucher file and the preset streaming data; when the current stream data is consistent with the preset stream data, the voucher file passes through anomaly detection.
And the abnormality detection module is used for comparing the current flow data corresponding to the credential data detected through preliminary abnormality with the preset flow data by the server, judging whether the current flow data is consistent with the preset flow data or not, and indicating that abnormality occurs when the current flow data is inconsistent with the preset flow data and indicating that the credential file passes through abnormality detection when the current flow data is inconsistent with the preset flow data. By comparing the current stream data with the preset stream data, whether the voucher file is abnormal or not can be judged, when the abnormality occurs, the abnormality can be timely positioned, corresponding processing is carried out, and the abnormality rate of the voucher file sent to the terminal is reduced.
In one embodiment, a financial certification device is provided, further comprising a credential data generation module for:
receiving a plurality of transaction flow data, and acquiring repeated flow data from the transaction flow data; extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data; credential data is generated from the representative pipeline data.
The credential data generation module provides the step of generating the corresponding credential data according to the stream data, and the server is prevented from repeatedly processing the same stream data by processing a plurality of pieces of repeated stream data to generate the repeated credential data, so that the generation efficiency of the credential data is improved, and the working efficiency is further improved.
For specific limitations of the financial certification device, reference may be made to the above limitations of the financial certification method, and no further description is given here. The various modules in the financial certification device described above may be implemented in whole or in part in software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing financial data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a financial certification method.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program performs the steps of:
receiving a credential generation request sent by a terminal, and acquiring a corresponding financial service type according to the credential generation request;
acquiring credential data from a service database according to the financial service type;
transmitting the credential data to a credential pool, and generating a credential file according to the credential data;
performing anomaly detection on the voucher file;
and when passing the anomaly detection, sending the credential file to the terminal.
In one embodiment, the processor when executing the computer program further performs the steps of:
classifying the voucher data according to the financial service type;
newly establishing a corresponding storage folder in a service database according to the financial service type;
And storing the credential data into the corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
In one embodiment, the processor when executing the computer program further performs the steps of:
comparing the voucher data with preset voucher data corresponding to the financial service type;
when the credential data is consistent with the preset credential data, the credential data passes the initial verification;
acquiring attribute information corresponding to the credential data through initial verification, and comparing the attribute information of the credential data with a preset attribute rule;
when the attribute information of the credential data is consistent with a preset attribute rule, the credential data passes through integrity verification;
and acquiring the credential data passing the integrity check, and generating a credential file according to the credential data passing the integrity check.
In one embodiment, the processor when executing the computer program further performs the steps of:
extracting attribute information corresponding to the voucher file;
acquiring a voucher rule corresponding to the financial service type according to a corresponding relation between the preset financial service type and the voucher rule;
performing preliminary anomaly detection on the attribute information according to the credential rules;
when the attribute information is consistent with the voucher rules, the voucher file passes preliminary anomaly detection.
In one embodiment, the processor when executing the computer program further performs the steps of:
acquiring current stream data corresponding to the voucher file through preliminary anomaly detection;
acquiring preset streaming data corresponding to the voucher file according to the corresponding relation between the preset voucher file and the preset streaming data;
when the current stream data is consistent with the preset stream data, the voucher file passes through anomaly detection.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a plurality of transaction flow data, and acquiring repeated flow data from the transaction flow data;
extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data;
credential data is generated from the representative pipeline data.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a credential generation request sent by a terminal, and acquiring a corresponding financial service type according to the credential generation request;
acquiring credential data from a service database according to the financial service type;
transmitting the credential data to a credential pool, and generating a credential file according to the credential data;
Performing anomaly detection on the voucher file;
and when passing the anomaly detection, sending the credential file to the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
classifying the voucher data according to the financial service type;
newly establishing a corresponding storage folder in a service database according to the financial service type;
and storing the credential data into the corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
In one embodiment, the computer program when executed by the processor further performs the steps of:
comparing the voucher data with preset voucher data corresponding to the financial service type;
when the credential data is consistent with the preset credential data, the credential data passes the initial verification;
acquiring attribute information corresponding to the credential data through initial verification, and comparing the attribute information of the credential data with a preset attribute rule;
when the attribute information of the credential data is consistent with a preset attribute rule, the credential data passes through integrity verification;
and acquiring the credential data passing the integrity check, and generating a credential file according to the credential data passing the integrity check.
In one embodiment, the computer program when executed by the processor further performs the steps of:
extracting attribute information corresponding to the voucher file;
acquiring a voucher rule corresponding to the financial service type according to a corresponding relation between the preset financial service type and the voucher rule;
performing preliminary anomaly detection on the attribute information according to the credential rules;
when the attribute information is consistent with the voucher rules, the voucher file passes preliminary anomaly detection.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring current stream data corresponding to the voucher file through preliminary anomaly detection;
acquiring preset streaming data corresponding to the voucher file according to the corresponding relation between the preset voucher file and the preset streaming data;
when the current stream data is consistent with the preset stream data, the voucher file passes through anomaly detection.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a plurality of transaction flow data, and acquiring repeated flow data from the transaction flow data;
extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data;
Credential data is generated from the representative pipeline data.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A financial certification method, the method comprising:
receiving a credential generation request sent by a terminal, and acquiring a corresponding financial service type according to the credential generation request; the financial business types include: collection, payment, refund, billing, contract renting, clearing ahead of time, asset change, and pay deduction;
acquiring credential data from a service database according to the financial service type; the voucher data comprises receipt voucher data, payment voucher data, refund voucher data, billing voucher data, contract lease voucher data, advance clearing voucher data, asset change voucher data and receipt and payment deduction voucher data;
Transmitting the credential data to a credential pool, and generating a credential file according to the credential data;
the transmitting the credential data to a credential pool and generating a credential file according to the credential data includes:
comparing the credential data with preset credential data corresponding to the financial service type; when the credential data is consistent with the preset credential data, the credential data passes an initial verification; acquiring attribute information corresponding to the initially verified credential data, and comparing the attribute information of the credential data with a preset attribute rule; the voucher data comprises voucher data content and a voucher category, and the preset attribute rules comprise preset requirements on the voucher data content and voucher data category judgment; judging whether the voucher data content is consistent with the preset requirement on the voucher data content in the preset attribute rule or not, and judging whether the voucher type of the voucher data is consistent with the voucher data type in the preset attribute rule or not; when the attribute information of the credential data is consistent with the preset attribute rule, the credential data passes through integrity verification; acquiring the credential data passing the integrity check, and generating a credential file according to the credential data passing the integrity check; the credential file is an electronic data file obtained by performing a credential operation on the data; if the initially checked voucher data is payment voucher data, comparing the payment items corresponding to the payment voucher data with the accounts corresponding to the items, and comparing the payment items corresponding to the payment voucher data with preset requirements for the content of the payment voucher data in preset rule attribute rules, judging whether the payment items corresponding to the payment voucher data and the accounts corresponding to the items are consistent with the preset requirements for the content of the payment voucher data in the preset rule attribute rules, and comparing the payment voucher type to which the payment voucher data belongs with the voucher data type in the preset attribute rules when the payment voucher data is consistent with the preset requirements for the content of the payment voucher data, and judging whether the payment voucher type to which the payment voucher data belongs is consistent with the voucher data type in the preset attribute rules;
Performing anomaly detection on the voucher file; when passing the anomaly detection, sending the credential file to a terminal;
the anomaly detection of the credential file includes:
extracting attribute information corresponding to the voucher file; the attribute information corresponding to the voucher file comprises the category of the voucher file and the position of the voucher file; acquiring a voucher rule corresponding to a financial service type according to a corresponding relation between the preset financial service type and the voucher rule; the voucher rules corresponding to the financial business types comprise preset voucher categories and preset storage folders; performing preliminary anomaly detection on the attribute information according to the credential rules; the method comprises the steps of comparing the affiliated certificate type of the certificate file with preset certificate types included in the certificate rule, judging whether the affiliated type of the certificate file is consistent with the preset certificate types included in the certificate rule, comparing the position of the certificate file with the preset storage folder, and judging whether the position of the certificate file is consistent with the preset storage folder; and when the attribute information is consistent with the credential rules, the credential file passes the preliminary anomaly detection.
2. The method according to claim 1, wherein the method further comprises:
classifying the voucher data according to the financial service type;
newly establishing a corresponding storage folder in a service database according to the financial service type;
and storing the credential data into a corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
3. The method according to claim 1, wherein the method further comprises:
acquiring current flow data corresponding to the credential file through preliminary anomaly detection;
acquiring preset streaming data corresponding to a preset voucher file according to the corresponding relation between the preset voucher file and the preset streaming data;
and when the current stream data is consistent with the preset stream data, the credential file passes through anomaly detection.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
receiving a plurality of transaction flow data, and acquiring repeated flow data from the transaction flow data;
extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data;
And generating credential data according to the representative stream data.
5. A financial certification device, the device comprising:
the receiving module is used for receiving a credential generation request sent by the terminal and acquiring a corresponding financial service type according to the credential generation request; the financial business types include: collection, payment, refund, billing, contract renting, clearing ahead of time, asset change, and pay deduction;
the credential data acquisition module is used for acquiring credential data from a service database according to the financial service type; the voucher data comprises receipt voucher data, payment voucher data, refund voucher data, billing voucher data, contract lease voucher data, advance clearing voucher data, asset change voucher data and receipt and payment deduction voucher data;
the credential file generation module is used for transmitting the credential data to a credential pool and generating a credential file according to the credential data;
the abnormality detection module is used for detecting the abnormality of the certificate file;
the sending module is used for sending the certificate file to the terminal when the abnormality detection is passed;
the credential file generation module is further configured to: comparing the credential data with preset credential data corresponding to the financial service type; when the credential data is consistent with the preset credential data, the credential data passes an initial verification; acquiring attribute information corresponding to the initially verified credential data, and comparing the attribute information of the credential data with a preset attribute rule; the voucher data comprises voucher data content and a voucher category, and the preset attribute rules comprise preset requirements on the voucher data content and voucher data category judgment; judging whether the voucher data content is consistent with the preset requirement on the voucher data content in the preset attribute rule or not, and judging whether the voucher type of the voucher data is consistent with the voucher data type in the preset attribute rule or not; when the attribute information of the credential data is consistent with the preset attribute rule, the credential data passes through integrity verification; acquiring the credential data passing the integrity check, and generating a credential file according to the credential data passing the integrity check; the credential file is an electronic data file obtained by performing a credential operation on the data; if the initially checked voucher data is payment voucher data, comparing the payment items corresponding to the payment voucher data with the accounts corresponding to the items, and comparing the payment items corresponding to the payment voucher data with preset requirements for the content of the payment voucher data in preset rule attribute rules, judging whether the payment items corresponding to the payment voucher data and the accounts corresponding to the items are consistent with the preset requirements for the content of the payment voucher data in the preset rule attribute rules, and comparing the payment voucher type to which the payment voucher data belongs with the voucher data type in the preset attribute rules when the payment voucher data is consistent with the preset requirements for the content of the payment voucher data, and judging whether the payment voucher type to which the payment voucher data belongs is consistent with the voucher data type in the preset attribute rules;
The abnormality detection module is further configured to: extracting attribute information corresponding to the voucher file; the attribute information corresponding to the voucher file comprises the category of the voucher file and the position of the voucher file; acquiring a voucher rule corresponding to a financial service type according to a corresponding relation between the preset financial service type and the voucher rule; the voucher rules corresponding to the financial business types comprise preset voucher categories and preset storage folders; performing preliminary anomaly detection on the attribute information according to the credential rules; the method comprises the steps of comparing the affiliated certificate type of the certificate file with preset certificate types included in the certificate rule, judging whether the affiliated type of the certificate file is consistent with the preset certificate types included in the certificate rule, comparing the position of the certificate file with the preset storage folder, and judging whether the position of the certificate file is consistent with the preset storage folder; and when the attribute information is consistent with the credential rules, the credential file passes the preliminary anomaly detection.
6. The apparatus of claim 5, further comprising a credential data generation module to: classifying the voucher data according to the financial service type; newly establishing a corresponding storage folder in a service database according to the financial service type; and storing the credential data into a corresponding storage folder according to the corresponding relation between the preset financial business type and the storage folder.
7. The apparatus of claim 5, wherein the anomaly detection module is further to:
acquiring current flow data corresponding to the credential file through preliminary anomaly detection; acquiring preset streaming data corresponding to a preset voucher file according to the corresponding relation between the preset voucher file and the preset streaming data; and when the current stream data is consistent with the preset stream data, the credential file passes through anomaly detection.
8. The apparatus of claim 5 or 6, further comprising a credential data generation module to:
receiving a plurality of transaction flow data, and acquiring repeated flow data from the transaction flow data; extracting representative pipelining data from the repeated pipelining data, and deleting redundant repeated pipelining data; and generating credential data according to the representative stream data.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
CN201811118142.2A 2018-09-26 2018-09-26 Financial certification method, device, computer equipment and storage medium Active CN109460995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811118142.2A CN109460995B (en) 2018-09-26 2018-09-26 Financial certification method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811118142.2A CN109460995B (en) 2018-09-26 2018-09-26 Financial certification method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109460995A CN109460995A (en) 2019-03-12
CN109460995B true CN109460995B (en) 2024-02-06

Family

ID=65606967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811118142.2A Active CN109460995B (en) 2018-09-26 2018-09-26 Financial certification method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109460995B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009471A (en) * 2019-04-03 2019-07-12 平安信托有限责任公司 Financial affairs receipt generation method, device, computer equipment and storage medium
CN111199147A (en) * 2019-12-30 2020-05-26 航天信息股份有限公司 Method and system for generating composite electronic certificate
CN112199441B (en) * 2020-09-28 2023-11-24 中国平安人寿保险股份有限公司 Data synchronous processing method, device, equipment and medium based on big data platform
CN113435990B (en) * 2021-06-28 2022-09-30 平安科技(深圳)有限公司 Certificate generation method and device based on rule engine and computer equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049563A (en) * 2012-12-31 2013-04-17 深圳中兴网信科技有限公司 Server, accounting document generating system and accounting document generating method
CN107403329A (en) * 2016-05-18 2017-11-28 苏宁云商集团股份有限公司 A kind of business voucher collocation method and device
CN107657516A (en) * 2016-07-24 2018-02-02 平安科技(深圳)有限公司 Generate the method and financial server of voucher
CN107679146A (en) * 2017-09-25 2018-02-09 南方电网科学研究院有限责任公司 The method of calibration and system of electric network data quality
CN107784579A (en) * 2017-08-30 2018-03-09 平安科技(深圳)有限公司 Accreditation method, apparatus, storage medium and computer equipment
CN107918910A (en) * 2017-09-28 2018-04-17 平安普惠企业管理有限公司 Financial affairs receipt generation method, device, equipment and computer-readable recording medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049563A (en) * 2012-12-31 2013-04-17 深圳中兴网信科技有限公司 Server, accounting document generating system and accounting document generating method
CN107403329A (en) * 2016-05-18 2017-11-28 苏宁云商集团股份有限公司 A kind of business voucher collocation method and device
CN107657516A (en) * 2016-07-24 2018-02-02 平安科技(深圳)有限公司 Generate the method and financial server of voucher
CN107784579A (en) * 2017-08-30 2018-03-09 平安科技(深圳)有限公司 Accreditation method, apparatus, storage medium and computer equipment
CN107679146A (en) * 2017-09-25 2018-02-09 南方电网科学研究院有限责任公司 The method of calibration and system of electric network data quality
CN107918910A (en) * 2017-09-28 2018-04-17 平安普惠企业管理有限公司 Financial affairs receipt generation method, device, equipment and computer-readable recording medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王玉宝."记帐凭证的自动校验".《浙江财经学院学报》.1996,(第4期),第64-66页. *

Also Published As

Publication number Publication date
CN109460995A (en) 2019-03-12

Similar Documents

Publication Publication Date Title
CN109460995B (en) Financial certification method, device, computer equipment and storage medium
CN110245186B (en) Service processing method based on block chain and related equipment
CN109783338B (en) Recording processing method and device based on service information and computer equipment
CN109191272B (en) Data processing method, device, storage medium and equipment for electronic bill
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
CN110597837B (en) Service data processing method, device, storage medium and computer equipment
WO2020259308A1 (en) Method and device for employing blockchain system to turn over asset
CN111125773B (en) Method, device, equipment and medium for processing customs declaration information based on block chain
CN111506584B (en) Block chain-based service data processing method and device and computer equipment
CN111709718A (en) Intelligent warranty asset service platform, method and storage medium based on artificial intelligence
CN110929879A (en) Business decision logic updating method based on decision engine and model platform
CN110866289B (en) Block chain-based data processing method, device, server and storage medium
CN110084600B (en) Processing and verifying method, device, equipment and medium for resolution transaction request
CN111241161A (en) Invoice information mining method and device, computer equipment and storage medium
CN113570479B (en) Block chain transmission method, system and storage medium for real estate transaction data
CN112184426A (en) Data sharing method, system, server and computer readable storage medium
CN112862587A (en) Block chain-based credit data processing method, block chain-based credit data processing device, computer and medium
WO2021120760A1 (en) Method and device for issuing electronic invoice employing blockchain
CN112598502A (en) Evidence obtaining method, device, equipment and storage medium
CN111709709A (en) Information processing method, system and computer equipment based on warranty service
CN116346362A (en) Electronic fidelity verification method and system based on blockchain technology
Parlak Blockchain-based Immutable Evidence and Decentralized Loss Adjustment for Autonomous Vehicle Accidents in Insurance
CN107483210B (en) Data verification method and system
CN110598374A (en) Block chain-based work registration method, device and computer-readable storage medium
CN111861476B (en) Malicious associated transaction monitoring method and device based on blockchain and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant