CN109636553A - Credential management method, apparatus, computer equipment and storage medium - Google Patents

Credential management method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN109636553A
CN109636553A CN201811348221.2A CN201811348221A CN109636553A CN 109636553 A CN109636553 A CN 109636553A CN 201811348221 A CN201811348221 A CN 201811348221A CN 109636553 A CN109636553 A CN 109636553A
Authority
CN
China
Prior art keywords
credential
information
credential information
transaction log
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811348221.2A
Other languages
Chinese (zh)
Other versions
CN109636553B (en
Inventor
孙江涛
黄晓敏
林宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811348221.2A priority Critical patent/CN109636553B/en
Publication of CN109636553A publication Critical patent/CN109636553A/en
Application granted granted Critical
Publication of CN109636553B publication Critical patent/CN109636553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a kind of credential management method, apparatus, computer equipment and storage mediums, it include: to obtain credential information to be uploaded, wherein, the credential information includes the temporal information for the trading activity time of origin for having mapping relations with the credential information;The transaction log of the trading activity details is called according to the temporal information;The Credential parameters recorded in the credential information are compared with parameter transaction corresponding in transaction log according to the transaction log;When the Credential parameters are consistent with the parameter transaction, the credential information is uploaded to preset general ledger system.When passing credential information at the terminal, by obtaining the temporal information that with the credential information there is the trading activity of corresponding relationship to occur recorded in credential information, calls the transaction log for recording the trading activity to be checked, can be improved the accuracy rate of verification.

Description

Credential management method, apparatus, computer equipment and storage medium
Technical field
The present embodiments relate to data management field, especially a kind of credential management method, apparatus, computer equipment and Storage medium.
Background technique
The function of general ledger system mainly has accounting voucher processing, cashier's management, account book management, auxiliary accounting management and the end of term Processing etc..Contents, the main tasks such as voucher processing generally comprises and fills and presents voucher, audit voucher, voucher summarize and keep accounts are logical Input and processing bookkeeping voucher are crossed, recording work is completed, inquires and export various account books;Account book management includes general ledger, detail account Etc. the output of basic accounting account book, and the various auxiliary kernels such as personal contact, unit contact are done accounts the inquiry output of book;Phase End reason include transfer accounts, reconciliation, checkout work.
In the prior art, with the expansion of company management scale, for part group company or trans-corporation, point Cloth, will be by manually entering monthly closing entry voucher, then in the account day in the branch company and subsidiary of different geographical in EXCEL table It is uploaded in the general ledger system of group and carries out audit verification.
The inventor of the invention, has found under study for action, and monthly closing entry voucher in the prior art uploads the side of general ledger system Method is required to by being manually entered and checking, and needs to expend the thing that a large amount of human resources carry out input nucleus pair during this , until make entire voucher upload procedure inefficiency, it is time-consuming and laborious.
Summary of the invention
The embodiment of the present invention provide a kind of credential management method, apparatus that automatic checking can be carried out when uploading voucher, Computer equipment and storage medium.
In order to solve the above technical problems, the technical solution that the embodiment of the invention uses is: provide it is a kind of with Demonstrate,prove management method, comprising:
Obtain credential information to be uploaded, wherein the credential information includes having mapping relations with the credential information Trading activity time of origin temporal information;
The transaction log of the trading activity details is called according to the temporal information;
According to the transaction log by the Credential parameters recorded in the credential information and transaction corresponding in transaction log Parameter is compared;
When the Credential parameters are consistent with the parameter transaction, the credential information is uploaded to preset general ledger system.
Optionally, before acquisition credential information to be uploaded, further includes:
It records Transaction Information when trading activity occurs and generates transaction log;
Voucher needed for calling preset voucher create-rule to extract the generation credential information in the transaction log Parameter;
The Credential parameters are written in preset voucher templates and generate the credential information.
Optionally, it is described the Credential parameters are written to generate the credential information in preset voucher templates after, Further include:
Record the store path of the credential information;
The timed task of the credential information is uploaded according to preset upload date establish delay;
When the timed task is reached, confirmation calls the credential information by the store path.
Optionally, it is described the Credential parameters are written to generate the credential information in preset voucher templates after, Further include:
It obtains and preset sets close rule;
It sets close rule according to preset at least one mode of operation of the credential information is carried out setting privacy protection.
Optionally, described to set close rule include dynamic password, and described obtain preset sets close rule, comprising:
Hash operations are carried out to the transaction log and generate hashed value;
Any one units greater than 1 is chosen in the hashed value to the hashed value memory modulo operation;
It is close that the designated position that the remainder that the modulo operation is sought is added to preset solid-state password is generated into the dynamic Code.
Optionally, it is described the Credential parameters are written to generate the credential information in preset voucher templates after, Further include:
Screenshot is carried out to the credential information and generates the first screenshot picture;
The first screenshot picture is associated with the credential information, makes the first screenshot picture and the voucher Information establishes mapping relations.
Optionally, described when the Credential parameters are consistent with the parameter transaction, the credential information is uploaded to default General ledger system after, further includes:
Obtain the verification information that the general ledger system is sent;
The first screenshot picture is uploaded to the general ledger system according to the verification information, so that the general ledger system According to preset image comparison model, the credential information intercepted in the first screenshot picture and the general ledger system is verified The second screenshot picture it is whether consistent;
When getting the first screenshot picture that the general ledger system is sent and the second screenshot picture inconsistently When message, Xiang Suoshu general ledger system uploads the transaction log.
In order to solve the above technical problems, the embodiment of the present invention also provides a kind of credential management devices, comprising:
Module is obtained, for obtaining credential information to be uploaded, wherein the credential information includes and the credential information The temporal information of trading activity time of origin with mapping relations;
Processing module, for calling the transaction log of the trading activity details according to the temporal information;
Comparison module, Credential parameters and transaction log for will be recorded in the credential information according to the transaction log In corresponding parameter transaction be compared;
Execution module uploads the credential information to pre- for when the Credential parameters are consistent with the parameter transaction If general ledger system.
Optionally, the credential management devices further include:
First record sub module, for recording Transaction Information when trading activity occurs and generating transaction log;
First calls submodule, for calling preset voucher create-rule to be extracted described in generation in the transaction log Credential parameters needed for credential information;
First generates submodule, generates the voucher letter for the Credential parameters to be written in preset voucher templates Breath.
Optionally, the credential management devices further include:
Second record sub module, for recording the store path of the credential information;
First processing submodule, the timing for uploading the credential information according to preset upload date establish delay are appointed Business;
First implementation sub-module, for when the timed task is reached, confirmation by the store path call it is described with Demonstrate,prove information.
Optionally, the credential management devices further include:
First acquisition submodule preset sets close rule for obtaining;
Second processing submodule, for setting close rule at least one mode of operation of the credential information according to preset It carries out setting privacy protection.
Optionally, it is described set it is close rule include dynamic password, the credential management devices further include:
First computational submodule generates hashed value for carrying out hash operations to the transaction log;
Second computational submodule, for choosing any one units greater than 1 in the hashed value to the hashed value Memory modulo operation;
Second implementation sub-module, the remainder for seeking the modulo operation are added to the specified of preset solid-state password Position generates the dynamic password.
Optionally, the credential management devices further include:
First screenshot submodule generates the first screenshot picture for carrying out screenshot to the credential information;
Third implementation sub-module makes described for the first screenshot picture to be associated with the credential information One screenshot picture and the credential information establish mapping relations.
Optionally, the credential management devices further include:
Second acquisition submodule, the verification information sent for obtaining the general ledger system;
Third handles submodule, for the first screenshot picture to be uploaded to the general ledger system according to the verification information System, so that the general ledger system verifies the first screenshot picture and the general ledger system according to preset image comparison model Whether the second screenshot picture of the credential information of middle interception is consistent;
4th implementation sub-module, for when getting the first screenshot picture that the general ledger system is sent and described the Two screenshot pictures inconsistently message when, Xiang Suoshu general ledger system uploads the transaction log.
In order to solve the above technical problems, the embodiment of the present invention also provides a kind of computer equipment, including memory and processing Device is stored with computer-readable instruction in the memory, when the computer-readable instruction is executed by the processor, so that The processor executes the step of credential management method described above.
In order to solve the above technical problems, the embodiment of the present invention also provides a kind of storage Jie for being stored with computer-readable instruction Matter, when the computer-readable instruction is executed by one or more processors, so that one or more processors execute above-mentioned institute The step of stating credential management method.
The beneficial effect of the embodiment of the present invention is: when passing credential information at the terminal, being recorded by obtaining in credential information The temporal information that with the credential information there is the trading activity of corresponding relationship to occur, call and record day of trade of the trading activity Will, since each Credential parameters in credential information are taken from the content in transaction log, therefore, after calling transaction log Can whether correct by the data recorded in transaction log checking voucher information, and upload credential information after confirmation is correct Into general ledger system.Credential information is checked by transaction log, can be improved the accuracy rate of verification, meanwhile, it is entire on It is transmitted through journey and audit process to participate in without artificial, so that the efficiency for entirely uploading audit process is greatly improved, saved people Power cost.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the basic procedure schematic diagram of credential management of embodiment of the present invention method;
Fig. 2 is a kind of flow diagram that the embodiment of the present invention generates credential information by transaction log;
Fig. 3 is a kind of flow diagram that timed task of the embodiment of the present invention uploads credential information;
Fig. 4 is a kind of flow diagram that the embodiment of the present invention carries out that part sets privacy protection to credential information;
Fig. 5 is a kind of flow diagram that the embodiment of the present invention generates dynamic password according to journal file;
Fig. 6 is the flow diagram that the embodiment of the present invention generates the first screenshot picture;
Fig. 7 is the flow diagram that the embodiment of the present invention passes through image comparison credential information;
Fig. 8 is credential management devices of embodiment of the present invention basic structure schematic diagram;
Fig. 9 is computer equipment of embodiment of the present invention basic structure block diagram.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.
In some processes of the description in description and claims of this specification and above-mentioned attached drawing, contain according to Multiple operations that particular order occurs, but it should be clearly understood that these operations can not be what appears in this article suitable according to its Sequence is executed or is executed parallel, and serial number of operation such as 101,102 etc. is only used for distinguishing each different operation, serial number It itself does not represent and any executes sequence.In addition, these processes may include more or fewer operations, and these operations can To execute or execute parallel in order.It should be noted that the description such as " first " herein, " second ", is for distinguishing not Same message, equipment, module etc., does not represent sequencing, does not also limit " first " and " second " and be different type.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
It is the basic procedure schematic diagram of the present embodiment credential management method referring specifically to Fig. 1, Fig. 1.
As shown in Figure 1, a kind of credential management method characterized by comprising
S1100, credential information to be uploaded is obtained, wherein the credential information includes having to reflect with the credential information Penetrate the temporal information of the trading activity time of origin of relationship;
The branch company or subsidiary of group company or trans-corporation in present embodiment, in the general ledger system to group company System uploads the credential information for being used for monthly closing entry.But it is not limited to this, the system that any need uploads credential information is able to use Credential management method in the present embodiment.
Credential information refers to accounting voucher, refers to be used to prove the generation of economic work item, clear financial responsibility And account book, the written document with legal effect are registered accordingly.
Terminal can generate a record Transaction Information when often carrying on a deal behavior or book Capital Flow Credential information.
After credential information generates, which is stored in the specified folder of terminal, is needing to upload voucher letter When breath or monthly closing entry day arrive, need to read corresponding credential information in this document folder and uploaded.
For convenience of the specific temporal information that corresponding trading activity occurs is recorded in inquiry credential information, trade in terminal Or when transferring accounts, record the task and generate the time, and the time is recorded in credential information, or using the time as correspondence with Demonstrate,prove the label of information.
S1200, the transaction log that the trading activity details are called according to the temporal information;
After obtaining the temporal information in credential information, needing to search by temporal information has mapping with credential information The transaction log of relationship.
Transaction log refer to terminal it is every once traded or transferred accounts behavior when, can all generate the thing for being log Part record;Every a line transaction log all recite trade date, exchange hour, transaction to other side, transaction amount, transaction And hand over the information such as incident operator.
Transaction log is usually to hand over the incident time as the title of the transaction log file of file.Therefore, by with The temporal information of transaction is search condition, it will be able to directly inquire to have with the trading activity in transaction log database and reflect Penetrate the transaction log of relationship.
It is S1300, according to the transaction log that the Credential parameters recorded in the credential information are corresponding with transaction log Parameter transaction be compared;
Recorded in transaction log in present embodiment trade date, exchange hour, transaction to other side, transaction amount, friendship The parameter transactions such as easy item and the incident operator of friendship.
Record name in credential information, date, number, synopsis, accounting item and book keeping operation involved in economic work The Credential parameters such as direction, the amount of money, billing flags, attachment number, relevant personnel's stamped signature.It should be pointed out that remembering in transaction log The content information of load more and in further detail than the range recorded in credential information, and in some embodiments, credential information When generation, the related content by extracting in transaction log is needed to generate.Therefore, the content in transaction log is believed relative to voucher Content in breath belongs to initial data.
It is whether consistent with corresponding parameter transaction by comparing Credential parameters, it will be able to determine whether Credential parameters are accurate.
S1400, when the Credential parameters are consistent with the parameter transaction, upload the credential information to preset general ledger System.
When confirming that Credential parameters are consistent with parameter transaction by comparing, that is, show the accurate nothing of the content recorded in credential information Accidentally, which is sent to the corresponding server end of general ledger system by terminal.If by comparing, confirmation Credential parameters and transaction When parameter is inconsistent, terminal sends information warning to operation user, while sending abnormal conditions record to general ledger system, by voucher Between parameter and parameter transaction there is the item entered and left to notify to general ledger system.
When above embodiment passes credential information at the terminal, by obtain credential information in record with the credential information The temporal information that trading activity with corresponding relationship occurs calls the transaction log for recording the trading activity, due to voucher letter Each Credential parameters in breath are taken from the content in transaction log, therefore, can pass through the day of trade after calling transaction log Whether the data recorded in will checking voucher information are correct, and credential information is uploaded in general ledger system after confirmation is correct. Credential information is checked by transaction log, can be improved the accuracy rate of verification, meanwhile, it entire upload procedure and checked Cheng Wuxu is artificially participated in, and so that the efficiency for entirely uploading audit process is greatly improved, has been saved human cost.
In some embodiments, it before carrying out transaction log upload, needs to generate credential information according to transaction log. Referring to Fig. 2, Fig. 2 is a kind of flow diagram that the present embodiment generates credential information by transaction log.
As shown in Fig. 2, before S1100 further include:
S1011, it records Transaction Information when trading activity occurs and generates transaction log;
When carrying out trading activity, all information in the trading activity can be all collected terminal, and be written to corresponding In transaction log, it therefore, in transaction log is stored with the initial data of trading activity.
S1012, preset voucher create-rule is called to be extracted needed for generating the credential information in the transaction log Credential parameters;
Credential information needs to extract corresponding Credential parameters in transaction log during generation.Such as it extracts (no It is limited to) Transaction Name, date, number, synopsis, accounting item involved in economic work and book keeping operation direction, the amount of money, book keeping operation The Credential parameters such as label, attachment number, relevant personnel's stamped signature.But Credential parameters are not limited to this, according to concrete application scene Difference, additionally it is possible to extract other parameter transactions in transaction log as Credential parameters.
S1013, it the Credential parameters is written in preset voucher templates generates the credential information.
After being extracted corresponding Credential parameters in transaction log, Credential parameters are brought into preset voucher templates In, wherein voucher templates are the clear data table for being filled with gauge outfit.The parameter that Credential parameters are respectively written into corresponding gauge outfit is filled out It writes in column, completes the write-in of Credential parameters.After the completion of all Credential parameters write-ins, respective operations are written in the Credential data table After the stamped signature of personnel, credential information is generated.
By the data of transaction log, credential information is automatically extracted and generated, the step of artificially filling in is eliminated, mentions significantly The high formation efficiency of credential information, has saved human cost.
In some embodiments, credential information is not generated in real time and is uploaded in real time, usually sets middle of the month Some day is monthly closing entry day, unified on the day of monthly closing entry day to upload of that month all credential informations.Referring to Fig. 3, Fig. 3 is the present embodiment A kind of flow diagram of credential information is uploaded by timed task.
As shown in figure 3, after S1013, further includes:
S1021, the store path for recording the credential information;
When credential information generates, credential information is stored in and is appointed as storing in file, and records this document The store path of the coordinates measurement credential information of folder.But not limited to this, in some selective embodiments, the storage of credential information Without specified storage folder, but credential information has unique naming rule, such as wraps in the title of credential information The peculiar mark for including "-pingzheng- " can get the store path of credential information by retrieval and be recorded.
S1022, the timed task that the credential information is uploaded according to preset upload date establish delay;
A delayed tasks are established according to the upload date of setting, the time point of delayed tasks triggering is defined monthly closing entry On the day of day sometime, for example, monthly closing entry day 9:00 uploads credential information.In some embodiments, to prevent numerous terminals Synchronization uploads credential information to general ledger system, high concurrent pressure is caused to the server of general ledger system, in different terminals The time for passing credential information is configured to different time.
For example, uploading timing credential information by Kettle (kettle) in some selective embodiments.Kettle It is the ETL tool of a external open source, pure java writes, can run on Window, Linux, Unix, data pick-up is efficient Stablize.There are two types of script file, transformation and job, transformation to complete for data in Kettle Basis conversion, job then complete the control of entire workflow.The monthly closing entry date of every month is set in the job project of ETL tool, And the corresponding upload task of the monthly closing entry task needs to read the store path of file.When the monthly closing entry day of setting arrives, setting Timed task be triggered, the file for the storage location that system calls corresponding store path to be directed toward, and this document is uploaded to finger In fixed general ledger system, the task that management uploads voucher is completed.
S1023, when the timed task is reached, confirmation calls the credential information by the store path.
When timed task is reached, i.e., delayed tasks are zeroed.Terminal check by access record store path, call with Card information is uploaded.
By way of timed task, it can be realized the automatic upload of monthly closing entry day credential information, improve transfer efficiency, together When, it can effectively avoid the problem that operation user is previous or other factors are caused to omit and be uploaded.
In some embodiments, for avoid credential information generate after artificially distorted or deleted, terminal is targetedly The part operation behavior of operation user is protected.Referring to Fig. 4, Fig. 4 is that the present embodiment carries out local set to credential information A kind of flow diagram of privacy protection.
As shown in figure 4, after S1013 further include:
S1031, it obtains and preset sets close rule;
In present embodiment, in order to protect credential information distorting or deleting by task, presets and set close rule.If Close rule sets a reading mode for the file of credential information including terminal, i.e. user can not modify to credential information. And setting close rule further includes user when opening the edit pattern of credential information or deleting, and needs to input corresponding close Code.In some selective embodiments, to prevent leaking for credential information, if close rule further includes when user executes replication When, it is also desirable to carry out password authentification.
S1032, it sets close rule according to preset at least one mode of operation of the credential information is carried out setting privacy protection.
Local cypher protection is carried out to credential information according to close rule is set, local cypher protection is in order to facilitate the operation of personnel It carries out daily checking account and facilitates browsing when verifying, and the modification for user, deletion, shearing or duplication etc. operate, then carry out If privacy protection, operator does not have corresponding password that can not then make corresponding modification to credential information.
Specifically, terminal identifies operational order table after getting operation user to the operational order of credential information first The user behavior of sign, then in operating list search the behavior whether set it is close forbid, if so, prompt operation user input Corresponding password, if it is not, then directly executing operation of the user to credential information.
In some embodiments, to reinforce the protection to credential information, if including a set of according to log text in close rule The method of part generation dynamic password.Referring to Fig. 5, Fig. 5 is a kind of stream that the present embodiment generates dynamic password according to journal file Journey schematic diagram.
As shown in figure 5, S1031 includes:
S1041, hash operations generation hashed value is carried out to the transaction log;
In present embodiment, the first step of dynamic password is generated are as follows: carry out by content of the hash operations to transaction log Hash operations obtain corresponding hashed value.
Hash operations are by the function of the eap-message digest of the message compression of random length to a certain regular length.Therefore, energy Enough hashed values for converting different transaction logs to uniform length.Metric number is converted by the hashed value, in order to rear It is continuous to calculate.
S1042, any one units for being greater than 1 is chosen in the hashed value to the hashed value memory modulo operation;
A units greater than 1 is chosen in metric hashed value, value has regularity in this step.Example As, it is specified that the numerical value in hash for 1 and 0 is removed, then, the numerical value of the fixed namely hundreds for extracting third position is to take The parameter of modular arithmetic.But not limited to this, in some selective embodiments, by setting duty roster, setting value every month It arranges digit and carries out value.
It is that modulo operation is carried out to hashed value with the units, modulo operation is exactly after extracting the units greater than 1 Seek the hashed value remainder countless divided by this.
Described in S1043, the designated position that the remainder that the modulo operation is sought is added to preset solid-state password generate Dynamic password.
In present embodiment, in addition to the remainder sought is dynamic password, it is also necessary to set a fixed password, such as set The solid-state password of one 6 digit.
For the safety for enhancing dynamic password, the remainder that modulo operation obtains will be added into solid-state password, such as will Modulo operation obtain remainder be added to solid-state password third position and the 4th password before or substitution solid-state password in the Three as final dynamic password.Or duty roster is set, the position in duty roster in record remainder insertion solid-state password Or replacement solid-state password in who.
Due to there is gap, therefore, also one not according to the hashed value that transaction log generates between transaction log Determining random number, and 0 and 1 numerical value in hashed value is uncertain, and the numerical value nor specified value of the units that extract, because This, the remainder sought is also a stochastic variable, according to transaction log and extracts the variation of mode and changes, finally inserts remainder The number for entering or replacing in solid-state password generates dynamic password.Since stochastic variable diversification causes dynamic password to be difficult to brokenly Solution, and since the overwhelming majority in the dynamic password needs artificially to be remembered, only individual characters generate at random, and can be square Just user remembers, and is easy to use.
In some embodiments, to prevent credential information to be tampered, when credential information generates, credential information is carried out Screenshot saves, as reconciliation authority.Referring to Fig. 6, Fig. 6 is the flow diagram for generating the first screenshot picture.
As shown in fig. 6, after S1013 further include:
S1051, screenshot the first screenshot picture of generation is carried out to the credential information;
When credential information generates, terminal carries out screenshot to credential information, generates the first screenshot picture.
S1052, the first screenshot picture is associated with the credential information, makes the first screenshot picture and institute It states credential information and establishes mapping relations.
After first screenshot picture generates, the first screenshot picture and credential information are subjected to mapping association, in order to by with Card information calls directly the first screenshot picture.In some selective embodiments, the first screenshot picture is deposited with credential information Storage is in same file folder.
In some embodiments, credential information will appear error in data or data transmission in network transmission process In the process, it is intercepted by hacker and modifies the risk of wherein data.To prevent above-mentioned risk, when generating credential information terminal to It demonstrate,proves information and carries out screenshot preservation.General ledger system extracted by way of randomly selecting one or more credential information of upload into Row verifying, and according to the source of credential information, the credential information, which is sent, to the terminal where the credential information of extraction needs to verify Checking request, corresponding first screenshot picture is sent to the service of general ledger system by terminal after receiving the checking request Device.Referring to Fig. 7, Fig. 7 is the flow diagram that the present embodiment passes through image comparison credential information.
As shown in fig. 7, after S1400 further include:
S1511, the verification information that the general ledger system is sent is obtained;
To prevent above-mentioned risk, when generating credential information, terminal carries out screenshot preservation to credential information.General ledger system is logical It crosses the mode randomly selected and extracts one or more credential information of upload and verified, and according to the source of credential information, The verification information that the credential information needs to verify is sent to the terminal where the credential information of extraction.
S1512, the first screenshot picture is uploaded to by the general ledger system according to the verification information, so that described total Account system according to preset image comparison model, verify intercepted in the first screenshot picture and the general ledger system it is described with Whether the second screenshot picture for demonstrate,proving information is consistent;
First screenshot picture is uploaded to general ledger system after receiving verifying message by terminal.General ledger system is receiving When credential information, screenshot also equally is carried out to credential information, generates the second screenshot picture.
General ledger system compares the first screenshot picture by image comparison model and whether the second screenshot picture is consistent.Specifically Ground, image comparison model are trained to convergence state, seem no identical neural network model for comparison chart.Image ratio It can be the trained convolutional neural networks model (CNN) to convergence state to model, but image comparison model can also It is: the distorted pattern of deep neural network model (DNN), Recognition with Recurrent Neural Network model (RNN) or above-mentioned three kinds of network models.
S1513, when getting the first screenshot picture that the general ledger system is sent and the second screenshot picture not Consistently when message, Xiang Suoshu general ledger system uploads the transaction log.
When terminal receives the first screenshot picture and the second screenshot picture inconsistently message of general ledger system transmission, eventually End need to be uploaded to transaction log in general ledger system, in order to general ledger system further confirm credential information whether mistake, Mistake occurs in information such as that Credential parameters.
Can rapidly and accurately judge whether the first screenshot picture and the second screenshot picture are consistent by neural network model, The efficiency for improving verification enhances the ability for billing and accounting system risk control.
In order to solve the above technical problems, the embodiment of the present invention also provides a kind of credential management devices.
It is the present embodiment credential management devices basic structure schematic diagram referring specifically to Fig. 8, Fig. 8.
As shown in figure 8, a kind of credential management devices, comprising: obtain module 2100, processing module 2200, comparison module 2300 and execution module 2400.Wherein, module 2100 is obtained for obtaining credential information to be uploaded, wherein credential information packet Include the temporal information for the trading activity time of origin that there are mapping relations with credential information;Processing module 2200 was used for according to the time The transaction log of information calling trading activity details;Comparison module 2300 according to transaction log in credential information for will remember The Credential parameters of record are compared with parameter transaction corresponding in transaction log;Execution module 2400 is used for when Credential parameters and hands over When easily parameter is consistent, credential information is uploaded to preset general ledger system.
When above embodiment passes credential information at the terminal, by obtain credential information in record with the credential information The temporal information that trading activity with corresponding relationship occurs calls the transaction log for recording the trading activity, due to voucher letter Each Credential parameters in breath are taken from the content in transaction log, therefore, can pass through the day of trade after calling transaction log Whether the data recorded in will checking voucher information are correct, and credential information is uploaded in general ledger system after confirmation is correct. Credential information is checked by transaction log, can be improved the accuracy rate of verification, meanwhile, it entire upload procedure and checked Cheng Wuxu is artificially participated in, and so that the efficiency for entirely uploading audit process is greatly improved, has been saved human cost.
In some embodiments, credential management devices further include: the first record sub module, first call submodule and the One generates submodule.Wherein, the first record sub module is used to record Transaction Information when trading activity occurs and generates the day of trade Will;First calling submodule is for calling preset voucher create-rule to be extracted needed for generating credential information in transaction log Credential parameters;First generation submodule generates credential information for Credential parameters to be written in preset voucher templates.
In some embodiments, credential management devices further include: the second record sub module, the first processing submodule and the One implementation sub-module.Wherein, the second record sub module is used to record the store path of credential information;First processing submodule is used for The timed task of credential information is uploaded according to preset upload date establish delay;First implementation sub-module is for working as timed task When reaching, confirmation calls credential information by store path.
In some embodiments, credential management devices further include: the first acquisition submodule and second processing submodule.Its In, the first acquisition submodule preset sets close rule for obtaining;Second processing submodule is used to set close rule according to preset At least one mode of operation of credential information is carried out setting privacy protection.
In some embodiments, if close rule includes dynamic password, credential management devices further include: first calculates submodule Block, the second computational submodule and the second implementation sub-module.Wherein, the first computational submodule is for carrying out hash fortune to transaction log It calculates and generates hashed value;Second computational submodule in hashed value for choosing any one units greater than 1 to hashed value memory Modulo operation;The remainder that second implementation sub-module is used to seek modulo operation is added to the designated position of preset solid-state password Generate dynamic password.
In some embodiments, credential management devices further include: the first screenshot submodule and third implementation sub-module.Its In, the first screenshot submodule is used to carry out screenshot to credential information to generate the first screenshot picture;Third implementation sub-module is used for will First screenshot picture is associated with credential information, and the first screenshot picture and credential information is made to establish mapping relations.
In some embodiments, credential management devices further include: the second acquisition submodule, third processing submodule and the Four implementation sub-modules.Wherein, the second acquisition submodule is used to obtain the verification information of general ledger system transmission;Third handles submodule For the first screenshot picture to be uploaded to general ledger system according to verification information, so that general ledger system compares mould according to preset image Whether type, the second screenshot picture for verifying the credential information intercepted in the first screenshot picture and general ledger system are consistent;4th executes Submodule is used for when the first screenshot picture for getting the transmission of general ledger system and when the second screenshot picture inconsistently message, to total Account system uploads transaction log.
In order to solve the above technical problems, the embodiment of the present invention also provides computer equipment.It is this referring specifically to Fig. 9, Fig. 9 Embodiment computer equipment basic structure block diagram.
As shown in figure 9, the schematic diagram of internal structure of computer equipment.The computer equipment includes being connected by system bus Processor, non-volatile memory medium, memory and network interface.Wherein, the non-volatile memories of the computer equipment are situated between Matter is stored with operating system, database and computer-readable instruction, can be stored with control information sequence in database, the computer When readable instruction is executed by processor, processor may make to realize a kind of credential management method.The processor of the computer equipment For providing calculating and control ability, the operation of entire computer equipment is supported.It can be stored in the memory of the computer equipment There is computer-readable instruction, when which is executed by processor, processor may make to execute a kind of credential management Method.The network interface of the computer equipment is used for and terminal connection communication.It will be understood by those skilled in the art that showing in Fig. 9 Structure out, only the block diagram of part-structure relevant to application scheme, does not constitute and is applied to application scheme The restriction of computer equipment thereon, specific computer equipment may include than more or fewer components as shown in the figure, or Person combines certain components, or with different component layouts.
Processor is for executing acquisition module 2100, processing module 2200, comparison module 2300 in Fig. 8 in present embodiment With the concrete function of execution module 2400, program code and Various types of data needed for memory is stored with the above-mentioned module of execution.Net Network interface is used for the data transmission between user terminal or server.Memory in present embodiment is stored with facial image Program code needed for executing all submodules in critical point detection device and data, server are capable of the program of invoking server Code and data execute the function of all submodules.
When computer equipment uploads credential information, by being recorded in acquisition credential information with the credential information with corresponding The temporal information that the trading activity of relationship occurs calls the transaction log for recording the trading activity, due to each in credential information A Credential parameters are taken from the content in transaction log, therefore, call transaction log after can by transaction log check with Whether the data recorded in card information are correct, and credential information is uploaded in general ledger system after confirmation is correct.Pass through transaction Credential information is checked in log, can be improved the accuracy rate of verification, meanwhile, entire upload procedure and audit process are not necessarily to people To participate in, so that the efficiency for entirely uploading audit process is greatly improved, saved human cost.
The present invention also provides a kind of storage medium for being stored with computer-readable instruction, computer-readable instruction by one or When multiple processors execute, so that the step of one or more processors execute any of the above-described embodiment credential management method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note Recall body (Random Access Memory, RAM) etc..
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.

Claims (10)

1. a kind of credential management method characterized by comprising
Obtain credential information to be uploaded, wherein the credential information includes the friendship for having mapping relations with the credential information The easy temporal information for time of origin;
The transaction log of the trading activity details is called according to the temporal information;
According to the transaction log by the Credential parameters recorded in the credential information and parameter transaction corresponding in transaction log It is compared;
When the Credential parameters are consistent with the parameter transaction, the credential information is uploaded to preset general ledger system.
2. credential management method according to claim 1, which is characterized in that it is described obtain credential information to be uploaded it Before, further includes:
It records Transaction Information when trading activity occurs and generates transaction log;
Credential parameters needed for calling preset voucher create-rule to extract the generation credential information in the transaction log;
The Credential parameters are written in preset voucher templates and generate the credential information.
3. credential management method according to claim 2, which is characterized in that it is described the Credential parameters are written to it is default Voucher templates in generate the credential information after, further includes:
Record the store path of the credential information;
The timed task of the credential information is uploaded according to preset upload date establish delay;
When the timed task is reached, confirmation calls the credential information by the store path.
4. credential management method according to claim 2, which is characterized in that it is described the Credential parameters are written to it is default Voucher templates in generate the credential information after, further includes:
It obtains and preset sets close rule;
It sets close rule according to preset at least one mode of operation of the credential information is carried out setting privacy protection.
5. credential management method according to claim 4, which is characterized in that it is described set it is close rule include dynamic password, institute It states to obtain and preset sets close rule, comprising:
Hash operations are carried out to the transaction log and generate hashed value;
Any one units greater than 1 is chosen in the hashed value to the hashed value memory modulo operation;
The designated position that the remainder that the modulo operation is sought is added to preset solid-state password is generated into the dynamic password.
6. credential management method according to claim 2, which is characterized in that it is described the Credential parameters are written to it is default Voucher templates in generate the credential information after, further includes:
Screenshot is carried out to the credential information and generates the first screenshot picture;
The first screenshot picture is associated with the credential information, makes the first screenshot picture and the credential information Establish mapping relations.
7. credential management method according to claim 6, which is characterized in that described to work as the Credential parameters and the transaction When parameter is consistent, after uploading the credential information to preset general ledger system, further includes:
Obtain the verification information that the general ledger system is sent;
The first screenshot picture is uploaded to the general ledger system according to the verification information so that the general ledger system according to Preset image comparison model verifies the of the credential information intercepted in the first screenshot picture and the general ledger system Whether two screenshot pictures are consistent;
When getting the first screenshot picture that the general ledger system is sent and the second screenshot picture inconsistently message When, Xiang Suoshu general ledger system uploads the transaction log.
8. a kind of credential management devices characterized by comprising
Module is obtained, for obtaining credential information to be uploaded, wherein the credential information includes having with the credential information The temporal information of the trading activity time of origin of mapping relations;
Processing module, for calling the transaction log of the trading activity details according to the temporal information;
Comparison module, for will be right in the Credential parameters and transaction log that are recorded in the credential information according to the transaction log The parameter transaction answered is compared;
Execution module uploads the credential information to preset for when the Credential parameters are consistent with the parameter transaction General ledger system.
9. a kind of computer equipment, including memory and processor, it is stored with computer-readable instruction in the memory, it is described When computer-readable instruction is executed by the processor, so that the processor executes such as any one of claims 1 to 7 right It is required that the step of credential management method.
10. a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction is handled by one or more When device executes, so that one or more processors execute the credential management side as described in any one of claims 1 to 7 claim The step of method.
CN201811348221.2A 2018-11-13 2018-11-13 Credential management method, apparatus, computer device and storage medium Active CN109636553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811348221.2A CN109636553B (en) 2018-11-13 2018-11-13 Credential management method, apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811348221.2A CN109636553B (en) 2018-11-13 2018-11-13 Credential management method, apparatus, computer device and storage medium

Publications (2)

Publication Number Publication Date
CN109636553A true CN109636553A (en) 2019-04-16
CN109636553B CN109636553B (en) 2024-05-07

Family

ID=66067901

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811348221.2A Active CN109636553B (en) 2018-11-13 2018-11-13 Credential management method, apparatus, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN109636553B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111078714A (en) * 2019-11-25 2020-04-28 泰康保险集团股份有限公司 Data processing method and device
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
CN112598505A (en) * 2020-12-25 2021-04-02 无锡航吴科技有限公司 System and method for supervising nationally-owned financing platform based on comparison rule
CN111506927B (en) * 2020-04-16 2023-04-18 中国银行股份有限公司 Electronic certificate storage method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000132095A (en) * 1998-03-26 2000-05-12 Nippon Telegr & Teleph Corp <Ntt> Encryption method, decryption method, authentication method, encryption apparatus, decryption apparatus, authentication apparatus, authentication text transmitter apparatus, encryption text receiver apparatus, cipher communication system and authentication system
CN101710410A (en) * 2009-10-28 2010-05-19 金蝶软件(中国)有限公司 Method and system for checking accounting data
CN102752110A (en) * 2011-04-19 2012-10-24 中国银行股份有限公司 Dynamic password generating method and system
CN103106607A (en) * 2012-08-22 2013-05-15 杨磊 Financial certificate processing system and method thereof
CN107248244A (en) * 2017-05-23 2017-10-13 深圳怡化电脑股份有限公司 The acquisition methods and system of financial terminal transaction voucher
CN107368833A (en) * 2017-09-01 2017-11-21 许军 A kind of original certificate processing method, device, accepting terminal and system
CN107993137A (en) * 2017-11-15 2018-05-04 浪潮金融信息技术有限公司 Account checking method and device, computer-readable storage medium and terminal
CN108460262A (en) * 2018-01-08 2018-08-28 平安科技(深圳)有限公司 Cipher management method, device, terminal device and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000132095A (en) * 1998-03-26 2000-05-12 Nippon Telegr & Teleph Corp <Ntt> Encryption method, decryption method, authentication method, encryption apparatus, decryption apparatus, authentication apparatus, authentication text transmitter apparatus, encryption text receiver apparatus, cipher communication system and authentication system
CN101710410A (en) * 2009-10-28 2010-05-19 金蝶软件(中国)有限公司 Method and system for checking accounting data
CN102752110A (en) * 2011-04-19 2012-10-24 中国银行股份有限公司 Dynamic password generating method and system
CN103106607A (en) * 2012-08-22 2013-05-15 杨磊 Financial certificate processing system and method thereof
CN107248244A (en) * 2017-05-23 2017-10-13 深圳怡化电脑股份有限公司 The acquisition methods and system of financial terminal transaction voucher
CN107368833A (en) * 2017-09-01 2017-11-21 许军 A kind of original certificate processing method, device, accepting terminal and system
CN107993137A (en) * 2017-11-15 2018-05-04 浪潮金融信息技术有限公司 Account checking method and device, computer-readable storage medium and terminal
CN108460262A (en) * 2018-01-08 2018-08-28 平安科技(深圳)有限公司 Cipher management method, device, terminal device and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111078714A (en) * 2019-11-25 2020-04-28 泰康保险集团股份有限公司 Data processing method and device
CN111078714B (en) * 2019-11-25 2023-08-15 泰康保险集团股份有限公司 Data processing method and device
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
CN111506927B (en) * 2020-04-16 2023-04-18 中国银行股份有限公司 Electronic certificate storage method and device, electronic equipment and storage medium
CN112598505A (en) * 2020-12-25 2021-04-02 无锡航吴科技有限公司 System and method for supervising nationally-owned financing platform based on comparison rule

Also Published As

Publication number Publication date
CN109636553B (en) 2024-05-07

Similar Documents

Publication Publication Date Title
US10063548B1 (en) System, method, and program product for processing secure transactions within a cloud computing system
CN109636553A (en) Credential management method, apparatus, computer equipment and storage medium
CN111259070B (en) Method and related device for storing and acquiring service data
CN108809932B (en) Block chain-based deposit certificate system, method and readable medium
CN107888672A (en) Billing data processing method, device, storage medium and computer equipment
KR20200108513A (en) Data verification methods and systems using a hash tree, such as a time-oriented Merkle hash tree
CN110233823A (en) Block chain implementation method, system and storage medium
CN107481072A (en) Portable network billing system and method
CN108696511A (en) A kind of public notification of information method, apparatus and relevant device based on block chain
CN108512666A (en) Encryption method, data interactive method and the system of API request
CN108537314A (en) Product marketing system and method based on Quick Response Code
CN105516133A (en) User identity verification method, server and client
CN110430288A (en) Node visit method, apparatus, computer equipment and storage medium
CN109359994A (en) Method for processing business, apparatus and system based on block chain
CN113326165B (en) Data processing method and device based on block chain and computer readable storage medium
CN105022789A (en) Plant species authentication method and system based on geographic position and feature image
CN112883117A (en) Data synchronization method, equipment and computer readable storage medium
CN110597864A (en) Block chain-based personal information management method and device
CN101567110A (en) Consumer socialization zero-cash payment method and system
CN110175316B (en) Media number interaction method, system and storage medium based on blockchain
CN104539636A (en) Video evidence service system
Dogo et al. Blockchain 3.0: Towards a secure ballotcoin democracy through a digitized public ledger in developing countries
CN106230880B (en) A kind of storage method and application server of data
CN109299173A (en) Data transmission method, device and storage medium
CN117294482A (en) Data verification method and device based on multiparty security privacy calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant