CN110618873A - Data locking method, equipment and system based on information system - Google Patents

Data locking method, equipment and system based on information system Download PDF

Info

Publication number
CN110618873A
CN110618873A CN201910890688.8A CN201910890688A CN110618873A CN 110618873 A CN110618873 A CN 110618873A CN 201910890688 A CN201910890688 A CN 201910890688A CN 110618873 A CN110618873 A CN 110618873A
Authority
CN
China
Prior art keywords
data
message
service data
unlocking
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910890688.8A
Other languages
Chinese (zh)
Inventor
胡飞跃
陆颖华
陆玥全
卢蕴琦
章媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201910890688.8A priority Critical patent/CN110618873A/en
Publication of CN110618873A publication Critical patent/CN110618873A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Program synchronisation; Mutual exclusion, e.g. by means of semaphores
    • G06F9/524Deadlock detection or avoidance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a data locking method based on an information system, data locking equipment based on the information system, a system, computer equipment and a computer readable storage medium, and relates to the technical field of data processing. The method comprises the following steps: reporting a message corresponding to the service data to a supervision organization; locking the service data; receiving a receipt message returned by the monitoring mechanism; and unlocking the service data. The invention can ensure that the service data in the submission information system is not falsified in the time period of waiting for submission feedback, thereby ensuring the consistency of the service data and the submission data.

Description

Data locking method, equipment and system based on information system
Technical Field
The present invention relates to the field of data processing technology, and more particularly to a data processing technology for information systems, and more particularly to a data locking method based on an information system, a data locking device based on an information system, a computer device, and a computer-readable storage medium.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
At present, with the increasingly complex supervision environment of the financial industry, in order to meet the requirements of business compliance, each financial institution successively develops a collection and delivery system for client information, transaction information and account information. This information is in the hundreds of millions, as each customer may have multiple bank accounts, and each bank account may have tens or even hundreds of transactions during the delivery period.
In the prior art, in each delivery period, a bank practitioner first performs additional recording on customer information, transaction information and account information, then assembles the information into a message according to a specified interface format, and then reports the message to a monitoring mechanism. Before receiving the receipt of the supervision organization, the system needs to wait for a period of time, and in the period of waiting for the submission feedback, the submission data in the system has the risk of being tampered, and the stability of the submission data is low.
Therefore, how to provide a new solution, which can solve the above technical defects, is a technical problem to be solved in the art.
Disclosure of Invention
In view of the above, the present invention provides an information system-based data locking method, an information system-based data locking device, an information system, a computer device, and a computer-readable storage medium, wherein during a period of waiting for a supervision mechanism to feed back a receipt message, a locking operation is performed on service data, no user is allowed to tamper data, and after the receipt message is received and introduced into a delivery system, the service data is unlocked, so that it can be ensured that the service data in the delivery-type information system is not tampered in a time period of waiting for delivery feedback, and consistency between the service data and the delivery data is ensured.
In order to achieve the above object, the present invention provides a data locking method based on an information system, the method comprising:
reporting a message corresponding to the service data to a supervision organization;
locking the service data;
receiving a receipt message returned by the monitoring mechanism;
and unlocking the service data.
In a preferred embodiment of the present invention, the additional recording operation includes adding and/or deleting and/or modifying at least one of the customer information, the account information, and the transaction information.
In a preferred embodiment of the present invention, the service data includes customer information, account information, and transaction information.
In a preferred embodiment of the present invention, reporting a message corresponding to the service data to a monitoring authority includes:
performing supplementary recording operation on the service data;
assembling the service data after the additional recording operation into a message according to a preset interface format;
and reporting the assembled message to a supervision organization.
In a preferred embodiment of the present invention, the unlocking the business data includes unlocking the business data according to a pre-established entry plan.
In a preferred embodiment of the present invention, the unlocking operation on the service data includes automatically triggering the unlocking operation on the service data when the receipt message is received and the message sent on the receipt message display needs to be corrected. In a preferred embodiment of the invention, the method comprises:
when the response piece message fails to display the report, acquiring an exception report corresponding to the response piece message;
and correcting the service data according to the exception report.
One of the objects of the present invention is to provide a data locking device based on an information system, comprising:
the message reporting module is used for reporting the message corresponding to the service data to a supervision mechanism;
the data locking module is used for locking the service data;
the message receiving module is used for receiving the receipt message returned by the monitoring mechanism;
and the data unlocking module is used for unlocking the service data.
In a preferred embodiment of the present invention, the message reporting module includes:
the additional recording operation module is used for performing additional recording operation on the service data;
the message assembly module is used for assembling the service data subjected to the additional recording operation into a message according to a preset interface format;
and the data reporting module is used for reporting the assembled message to a monitoring mechanism.
In a preferred embodiment of the present invention, the data unlocking module includes an entry-supplement plan unlocking module, configured to unlock the service data according to a pre-made entry-supplement plan.
In a preferred embodiment of the present invention, the data unlocking module includes an automatic unlocking module, and is configured to automatically trigger an unlocking operation on the service data when the receipt message is received and a message sent on the receipt message display needs to be corrected.
In a preferred embodiment of the present invention, the apparatus further comprises:
an exception report acquisition module, configured to acquire an exception report corresponding to the receipt message when the receipt message shows that the delivery fails;
and the data correction module is used for correcting the service data according to the exception report.
One of the objects of the present invention is to provide an information system comprising an information system based data locking device.
One of the objects of the present invention is to provide a computer apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method for data locking based on an information system when executing the computer program.
It is an object of the present invention to provide a computer-readable storage medium storing a program for executing a method for data locking based on an information system.
The invention has the advantages that the invention provides the data locking method based on the information system, the data locking equipment based on the information system, the computer equipment and the computer readable storage medium, the locking operation is carried out on the service data during the period of waiting for the feedback of the receipt message by a supervision mechanism, no user is allowed to tamper the data, the service data is unlocked after the receipt message is received and the report system is introduced, the service data in the report information system can be ensured not to be tampered in the period of waiting for the feedback of the report, and the consistency of the service data and the report data is ensured.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a data locking device based on an information system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a message reporting module in a data locking device based on an information system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data unlocking module in an information system-based data locking device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a third implementation manner of a data locking device based on an information system according to an embodiment of the present invention;
FIG. 5 is a flowchart of a data locking method based on an information system according to an embodiment of the present invention;
fig. 6 is a detailed flowchart of step S101 in fig. 5;
FIG. 7 is a detailed flowchart of step S104 in FIG. 5;
fig. 8 is a flowchart of a second implementation manner of a data locking method based on an information system according to an embodiment of the present invention;
FIG. 9 is a flowchart illustrating locking of data according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, method or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
With the increasing complexity of banking supervision environments, in order to meet the requirements of business compliance, financial institutions have developed acquisition and delivery systems for customer information, transaction information, and account information in succession. This information is in the hundreds of millions, as each customer may have multiple bank accounts, and each bank account may have tens or even hundreds of transactions during the delivery period.
In the prior art, in each delivery period, a bank practitioner first performs additional recording on customer information, transaction information and account information, then assembles the information into a message according to a specified interface format, and then reports the message to a monitoring mechanism. Before receiving the receipt of the supervision organization, the system needs to wait for a period of time, and in the period of waiting for the submission feedback, the submission data in the system has the risk of being tampered, and the stability of the submission data is low.
Based on the information system, the invention provides an information system which comprises an information system body and a data locking device based on the information system. In the present invention, the information system body refers to all the components of the information system in the prior art. The following description focuses on an information system based data locking device included in an information system provided by the present invention, which provides a mechanism to control the stability of the reported data in the system, i.e. the reported data cannot be tampered during the time period waiting for the reported feedback.
Fig. 1 is a schematic structural diagram of a data locking device based on an information system according to an embodiment of the present invention, referring to fig. 1, the device includes:
and a message reporting module 100, configured to report a message corresponding to the service data to a monitoring authority.
Fig. 2 is a schematic structural diagram of the message reporting module 100, please refer to fig. 2, where the message reporting module 100 includes:
the additional recording operation module 210 is configured to perform an additional recording operation on the service data;
a message assembling module 220, configured to assemble the service data after the supplementary recording operation into a message according to a preset interface format;
and a data reporting module 230, configured to report the assembled message to a monitoring authority.
That is, in an embodiment of the present invention, a practitioner performs an additional entry operation on business data, where the business data includes customer information, account information, and transaction information, and the additional entry operation includes an addition operation and/or a deletion operation and/or a modification operation on at least one of the customer information, the account information, and the transaction information. And after the completion of the additional recording, assembling the service data subjected to the additional recording operation into a message according to a specified interface format and reporting to a supervision mechanism.
Referring to fig. 1, the data locking apparatus further includes:
and a data locking module 200, configured to perform a locking operation on the service data.
In an embodiment of the present invention, after the report is completed by the message reporting module 100, the service data is locked, and before the receipt message of the monitoring mechanism is received, the data cannot be tampered, so that the stability of the reported service data is ensured.
In an embodiment of the present invention, the locking operation on the service data may be implemented as follows: the state of the batch change business data is a locked state, and the business data in the state can only be viewed and cannot be edited.
And the message receiving module 300 is configured to receive a receipt message returned by the monitoring authority.
In an embodiment of the present invention, after receiving the message reported by the message reporting module 100, the monitoring authority checks the integrity and accuracy of the data according to the agreed checking rule. Loading the checked data to a data warehouse of a supervision organization, and feeding back a response piece message which is successfully reported; and generating an exception report by the data which fails to pass the inspection, and feeding back a response piece message which fails to be reported.
And the data unlocking module 400 is configured to unlock the service data.
Fig. 3 is a schematic structural diagram of a data unlocking module 400 according to an embodiment of the present invention, please refer to fig. 3, where the data unlocking module 400 includes:
and an entry-supplement plan unlocking module 410, configured to unlock the service data according to a pre-made entry-supplement plan.
That is, in an embodiment of the present invention, after receiving the receipt message of the monitoring authority, the manual unlocking is performed according to the formulated entry plan as needed. The manual unlocking of the service data can be realized by the following modes: and changing the state of the business data in batches according to the established entry plan and the requirement into an unlocked state, wherein the business data in the state can be viewed or edited. And the automatic unlocking module 420 is configured to automatically trigger an unlocking operation on the service data when the receipt message is received and the message sent on the receipt message display needs to be corrected.
In an embodiment of the present invention, after receiving the receipt message from the monitoring authority, the service data may be automatically unlocked. The automatic unlocking operation of the service data can be realized by the following modes: when the receipt message displays that the message sent in the previous time needs to be corrected, the unlocking of the service data is automatically triggered after the receipt message is received by the system, namely, the state of the batch change service data is unlocked. Fig. 4 is a schematic structural diagram of a second embodiment of a data locking device based on an information system according to an embodiment of the present invention, referring to fig. 4, in the second embodiment of the present invention, the data locking device further includes:
an exception report obtaining module 500, configured to obtain an exception report corresponding to the receipt message when the receipt message shows that the delivery fails;
and a data modification module 600, configured to modify the service data according to the exception report.
That is, in the present invention, when the supervision agency receives the reported data and checks the integrity and accuracy of the data according to the agreed check rule, the data that fails the check will generate an exception report, feed back the receipt message that failed in reporting, and correct the service data according to the exception report.
As described above, the data locking system and device based on the information system provided by the present invention lock the service data during the period of waiting for the receipt message fed back by the monitoring mechanism, do not allow any user to tamper with the data, unlock the service data after receiving the receipt message and importing the receipt message into the reporting system, can ensure that the service data in the reporting information system is not tampered in the period of waiting for the report feedback, and ensure the consistency between the service data and the reporting data.
Furthermore, although in the above detailed description several unit modules of the system are mentioned, this division is not mandatory only. Indeed, the features and functions of two or more of the units described above may be embodied in one unit, according to embodiments of the invention. Also, the features and functions of one unit described above may be further divided into embodiments by a plurality of units. The terms "module" and "unit" used above may be software and/or hardware that realizes a predetermined function. While the modules described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
Having described the system, apparatus and method for information system based data locking in accordance with exemplary embodiments of the present invention, a method in accordance with exemplary embodiments of the present invention will now be described with reference to the accompanying drawings. The implementation of the method can be referred to the above overall implementation, and repeated details are not repeated.
With the increasing complexity of banking supervision environments, in order to meet the requirements of business compliance, financial institutions have developed acquisition and delivery systems for customer information, transaction information, and account information in succession. This information is in the hundreds of millions, as each customer may have multiple bank accounts, and each bank account may have tens or even hundreds of transactions during the delivery period.
In the prior art, in each delivery period, a bank practitioner first performs additional recording on customer information, transaction information and account information, then assembles the information into a message according to a specified interface format, and then reports the message to a monitoring mechanism. Before receiving the receipt of the supervision organization, the system needs to wait for a period of time, and in the period of waiting for the submission feedback, the submission data in the system has the risk of being tampered, and the stability of the submission data is low.
Based on the above, the invention provides a data locking method based on an information system, and provides a locking mechanism, wherein the reported data is locked during the period of waiting for the report result fed back by a supervision mechanism, and any user is not allowed to tamper the data; after receiving the message receipt and importing the message receipt into the reporting system, the system automatically or manually unlocks the data as required by a practitioner, and informs a client manager to correct the data according to the exceptional condition of the message receipt.
Fig. 5 is a schematic flowchart of a data locking method based on an information system according to an embodiment of the present invention, referring to fig. 5, the method includes:
s101: and reporting the message corresponding to the service data to a supervision organization.
Fig. 6 is a schematic flowchart of step S101, please refer to fig. 6, which includes the following steps:
s201: performing supplementary recording operation on the service data;
s202: assembling the service data after the additional recording operation into a message according to a preset interface format;
s203: and reporting the assembled message to a supervision organization.
That is, in an embodiment of the present invention, a practitioner performs an additional entry operation on business data, where the business data includes customer information, account information, and transaction information, and the additional entry operation includes an addition operation and/or a deletion operation and/or a modification operation on at least one of the customer information, the account information, and the transaction information. And after the completion of the additional recording, assembling the service data subjected to the additional recording operation into a message according to a specified interface format and reporting to a supervision mechanism.
Referring to fig. 5, the data locking method further includes:
s102: and locking the service data.
In an embodiment of the present invention, after the reporting is completed in step S101, that is, the service data is locked, and before the receipt message of the monitoring mechanism is received, the data cannot be tampered, so that the stability of reporting the service data is ensured.
In an embodiment of the present invention, the locking operation on the service data may be implemented as follows: the state of the business data changed by the system administrator in batches is a locked state, and the business data in the state can only be viewed and cannot be edited.
S103: and receiving a response piece message returned by the supervision mechanism.
In an embodiment of the present invention, after receiving the message reported in step S101, the monitoring authority checks the integrity and accuracy of the data according to an agreed check rule. Loading the checked data to a data warehouse of a supervision organization, and feeding back a response piece message which is successfully reported; and generating an exception report by the data which fails to pass the inspection, and feeding back a response piece message which fails to be reported.
S104: and unlocking the service data.
Fig. 7 is a flowchart illustrating a specific process of step S104 according to an embodiment of the present invention, please refer to fig. 7, which includes:
s301: when the receipt message is received, judging whether the message sent on the receipt message display needs to be corrected or not;
s302: and when the judgment result is yes, automatically triggering the unlocking operation of the service data.
That is, in an embodiment of the present invention, after receiving the receipt message from the monitoring authority, the service data may be automatically unlocked. The automatic unlocking operation of the service data can be realized by the following modes: when the receipt message displays that the message sent in the previous time needs to be corrected, the unlocking of the service data is automatically triggered after the receipt message is received by the system, namely, the state of the batch change service data is unlocked.
In other embodiments of the present invention, step S104 can also be implemented by:
and unlocking the service data according to a pre-made entry plan.
That is, in an embodiment of the present invention, after receiving the receipt message of the monitoring authority, the manual unlocking is performed according to the formulated entry plan as needed. The manual unlocking of the service data can be realized by the following modes: and the system administrator changes the state of the business data in batches as required into an unlocked state according to the formulated entry plan, and the business data in the state can be viewed or edited. Fig. 8 is a flowchart illustrating a second implementation manner of a data locking method based on an information system according to an embodiment of the present invention, referring to fig. 8, in the second implementation manner of the present invention, the data locking method further includes:
s105: when the response piece message fails to display the report, acquiring an exception report corresponding to the response piece message;
s106: and correcting the service data according to the exception report.
That is, in the present invention, when the supervision agency receives the reported data and checks the integrity and accuracy of the data according to the agreed check rule, the data that fails the check will generate an exception report, feed back the receipt message that failed in reporting, and correct the service data according to the exception report.
As described above, in the data locking method based on the information system provided by the present invention, during the period of waiting for the receipt message to be fed back by the supervisory authority, the service data is locked, and no user is allowed to tamper with the data, after the receipt message is received and introduced into the reporting system, the service data is unlocked, so that it can be ensured that the service data in the reporting information system is not tampered in the time period of waiting for the reporting feedback, and the consistency between the service data and the reporting data is ensured.
The invention also provides computer equipment which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the data locking method based on the information system.
The present invention also provides a computer-readable storage medium storing a program for executing a data locking method based on an information system.
It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions. Having described exemplary embodiments of the present invention, a system of exemplary embodiments of the present invention will now be described with reference to the accompanying drawings. The implementation of the system can be referred to the above overall implementation, and repeated details are not repeated.
The technical solution of the present invention will be described in detail with reference to specific examples.
In this embodiment, the present invention provides a locking mechanism for the system administrator to lock the posted data while waiting for the reporting results to be fed back by the supervisory authority, without allowing any user to tamper with the data; and after receiving the message receipt and importing the message receipt into the reporting system, the system administrator automatically or manually unlocks the data as required by the system administrator and informs a client manager to correct the data according to the exceptional condition of the message receipt.
Fig. 9 is a schematic flow chart illustrating data locking according to an embodiment of the present invention, please refer to fig. 9, in which the data locking flow includes:
s1: the lock status is queried.
The client manager logs in the system to inquire the submission data, and the system judges whether the current data is in a locked state: if so, additional recording operations such as adding, deleting, modifying and the like cannot be carried out on the data; if not, the next operation can be carried out.
S2: and (5) supplementary recording by a customer manager.
And the client manager performs additional recording operations such as adding, deleting, modifying and the like on the data.
S3: and the administrator exports data to report to the supervision agency.
The administrator exports the data reporting administration in the system according to a specified interface format.
S4: the data is locked.
After the submission is completed, the administrator locks the data, and the data cannot be tampered before the receipt of the supervision authority is received.
S5: and judging whether a receipt of a supervision agency is received.
After receiving the reported data of the financial institution, the supervising agency checks the integrity and accuracy of the data according to the agreed checking rule. Loading the checked data to a data warehouse of a supervision institution, and feeding back a successful receipt; data that fails inspection will generate an exception report, feeding back a failure receipt.
S6: unlocking the data.
And after receiving the receipt message of the supervision mechanism, the system automatically unlocks the data or the administrator manually unlocks the data according to the formulated additional recording plan.
The invention can ensure the stability of the reported data through full branch investigation and demonstration, namely the reported data in the reporting system can not be falsified in the time period of waiting for the feedback of the reporting.
In summary, the present invention provides an information system-based data locking method, an information system-based data locking device, an information system, a computer device, and a computer-readable storage medium, in which during a period of waiting for a supervision mechanism to feed back a receipt message, a locking operation is performed on service data, no user is allowed to tamper data, and after the receipt message is received and introduced into a delivery system, the service data is unlocked, so that it can be ensured that the service data in the delivery-type information system is not tampered in a period of waiting for delivery feedback, and consistency between the service data and the delivery data is ensured.
Improvements to a technology can clearly be distinguished between hardware improvements (e.g. improvements to the circuit structure of diodes, transistors, switches, etc.) and software improvements (improvements to the process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit.
Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardsradware (Hardware Description Language), vhjhd (Hardware Description Language), and vhigh-Language, which are currently used in most popular applications.
It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of software products, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and include instructions for causing a computer system (which may be a personal computer, a server, or a network system, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable systems, tablet-type systems, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics systems, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or systems, and the like.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing systems that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage systems.
While the present application has been described with examples, those skilled in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and modifications as fall within the true spirit of the application.

Claims (17)

1. A method for data locking based on an information system, the method comprising:
reporting a message corresponding to the service data to a supervision organization;
locking the service data;
receiving a receipt message returned by the monitoring mechanism;
and unlocking the service data.
2. The method of claim 1, wherein the business data includes customer information, account information, and transaction information.
3. The method of claim 2, wherein reporting the message corresponding to the service data to a regulatory body comprises:
performing supplementary recording operation on the service data;
assembling the service data after the additional recording operation into a message according to a preset interface format;
and reporting the assembled message to a supervision organization.
4. The method of claim 3, wherein the additional recording operation comprises an adding operation and/or a deleting operation and/or a modifying operation on at least one of the customer information, the account information, and the transaction information.
5. The method of claim 4, wherein unlocking the business data comprises unlocking the business data according to a pre-established entry plan.
6. The method of claim 4, wherein unlocking the service data comprises automatically triggering an unlocking operation on the service data when the receipt message is received and a message sent on the receipt message display needs to be modified.
7. The method of claim 5 or 6, further comprising:
when the response piece message fails to display the report, acquiring an exception report corresponding to the response piece message;
and correcting the service data according to the exception report.
8. An information system based data locking device, the device comprising:
the message reporting module is used for reporting the message corresponding to the service data to a supervision mechanism;
the data locking module is used for locking the service data;
the message receiving module is used for receiving the receipt message returned by the monitoring mechanism;
and the data unlocking module is used for unlocking the service data.
9. The apparatus of claim 8, wherein the business data comprises customer information, account information, and transaction information.
10. The device of claim 9, wherein the message reporting module comprises:
the additional recording operation module is used for performing additional recording operation on the service data;
the message assembly module is used for assembling the service data subjected to the additional recording operation into a message according to a preset interface format;
and the data reporting module is used for reporting the assembled message to a monitoring mechanism.
11. The apparatus of claim 10, wherein the subsidy operation comprises an add operation and/or a delete operation and/or a modify operation on at least one of the customer information, account information, and transaction information.
12. The apparatus of claim 11, wherein the data unlocking module comprises an entry plan unlocking module configured to unlock the business data according to a pre-established entry plan.
13. The device according to claim 11, wherein the data unlocking module comprises an automatic unlocking module configured to automatically trigger an unlocking operation on the service data when the receipt message is received and a message sent on the receipt message display needs to be modified.
14. The apparatus according to claim 12 or 13, characterized in that it further comprises:
an exception report acquisition module, configured to acquire an exception report corresponding to the receipt message when the receipt message shows that the delivery fails;
and the data correction module is used for correcting the service data according to the exception report.
15. An information system, characterized in that the information system comprises an information system based data locking device according to any of claims 8 to 14.
16. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the information system based data locking method of any one of claims 1 to 7 when executing the computer program.
17. A computer-readable storage medium storing a data locking method for performing the information system-based data locking method according to any one of claims 1 to 7.
CN201910890688.8A 2019-09-20 2019-09-20 Data locking method, equipment and system based on information system Pending CN110618873A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910890688.8A CN110618873A (en) 2019-09-20 2019-09-20 Data locking method, equipment and system based on information system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910890688.8A CN110618873A (en) 2019-09-20 2019-09-20 Data locking method, equipment and system based on information system

Publications (1)

Publication Number Publication Date
CN110618873A true CN110618873A (en) 2019-12-27

Family

ID=68923654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910890688.8A Pending CN110618873A (en) 2019-09-20 2019-09-20 Data locking method, equipment and system based on information system

Country Status (1)

Country Link
CN (1) CN110618873A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112669151A (en) * 2020-12-25 2021-04-16 深圳市金证科技股份有限公司 Method and equipment for processing multi-system cooperative service
CN112699137A (en) * 2021-01-04 2021-04-23 远光软件股份有限公司 Cross-system financial data processing method and device
CN114022031A (en) * 2021-11-23 2022-02-08 中国工商银行股份有限公司 Data processing method, data processing apparatus, electronic device, medium, and computer program product

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110251947A1 (en) * 2007-05-23 2011-10-13 Scott Metzger Credit report locking/unlocking via telephone interface
CN103778503A (en) * 2013-12-29 2014-05-07 远光软件股份有限公司 Report data locking method and device thereof
CN103957241A (en) * 2014-04-16 2014-07-30 中国工商银行股份有限公司 Communication method and device based on message data
CN105577808A (en) * 2015-12-29 2016-05-11 中国建设银行股份有限公司 Supervision reporting method and system
CN106254045A (en) * 2016-08-09 2016-12-21 中国银行股份有限公司 A kind of data verification method and device
CN106339365A (en) * 2016-08-26 2017-01-18 深圳市永兴元科技有限公司 Report form management method
CN107784578A (en) * 2017-11-22 2018-03-09 中国银行股份有限公司 Bank's foreign exchange data monitoring and managing method and device
CN110232094A (en) * 2019-05-06 2019-09-13 深圳壹账通智能科技有限公司 Device, method and storage medium across chain transaction

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110251947A1 (en) * 2007-05-23 2011-10-13 Scott Metzger Credit report locking/unlocking via telephone interface
CN103778503A (en) * 2013-12-29 2014-05-07 远光软件股份有限公司 Report data locking method and device thereof
CN103957241A (en) * 2014-04-16 2014-07-30 中国工商银行股份有限公司 Communication method and device based on message data
CN105577808A (en) * 2015-12-29 2016-05-11 中国建设银行股份有限公司 Supervision reporting method and system
CN106254045A (en) * 2016-08-09 2016-12-21 中国银行股份有限公司 A kind of data verification method and device
CN106339365A (en) * 2016-08-26 2017-01-18 深圳市永兴元科技有限公司 Report form management method
CN107784578A (en) * 2017-11-22 2018-03-09 中国银行股份有限公司 Bank's foreign exchange data monitoring and managing method and device
CN110232094A (en) * 2019-05-06 2019-09-13 深圳壹账通智能科技有限公司 Device, method and storage medium across chain transaction

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MADRIA, SANJAY KUMAR: "A transaction model and multiversion concurrency control for mobile database systems", 《DISTRIBUTED AND PARALLEL DATABASES》 *
秦雷: "龙江银行报表数据处理及报送系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112669151A (en) * 2020-12-25 2021-04-16 深圳市金证科技股份有限公司 Method and equipment for processing multi-system cooperative service
CN112699137A (en) * 2021-01-04 2021-04-23 远光软件股份有限公司 Cross-system financial data processing method and device
CN112699137B (en) * 2021-01-04 2023-09-12 远光软件股份有限公司 Cross-system financial data processing method and device
CN114022031A (en) * 2021-11-23 2022-02-08 中国工商银行股份有限公司 Data processing method, data processing apparatus, electronic device, medium, and computer program product

Similar Documents

Publication Publication Date Title
US7343364B2 (en) Rules-based system architecture and systems using the same
CN110618873A (en) Data locking method, equipment and system based on information system
US20060179058A1 (en) Methods and systems for licensing computer software
JP7289334B2 (en) Methods and apparatus, electronic devices, storage media and computer programs for testing code
US9785418B2 (en) Maintaining consistency amongst data structures that are referenced within different programs
AU2021206497B2 (en) Method and apparatus for authority control, computer device and storage medium
CN106371953B (en) Compact binary event log generation method and system
CA2701969A1 (en) Systems and methods for identifying a relationship between multiple interrelated applications in a mainframe environment
US20160306864A1 (en) Method and system for data synchronization
US20110078499A1 (en) Business process error handling through process instance backup and recovery
US10657028B2 (en) Method for replicating production behaviours in a development environment
EP2199905A1 (en) Lifecycle management and consistency checking of object models using application platform tools
CN110032515B (en) Interface test case generation method and device and storage medium
US11086706B2 (en) System and method of input validation
Day A model checker for statecharts
CN113760491A (en) Task scheduling system, method, equipment and storage medium
US8380729B2 (en) Systems and methods for first data capture through generic message monitoring
CN116541068A (en) Java item audit log realization method and device based on annotation
CN110597862A (en) Data entry method, equipment and system based on information system
CN115080449A (en) Test method, device, equipment, medium and program product
CN111984246A (en) Enterprise-level system automatic deployment method and device in distributed environment
US11360882B2 (en) Method and apparatus for calculating a software stability index
Schneider et al. Formal verification of abstract system and protocol specifications
CN112766829A (en) Service processing method, device and equipment
CN117971975A (en) Cross-table transaction supporting method and device for distributed database and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191227