CN110889763A - Financial management system based on big data - Google Patents

Financial management system based on big data Download PDF

Info

Publication number
CN110889763A
CN110889763A CN201911146249.2A CN201911146249A CN110889763A CN 110889763 A CN110889763 A CN 110889763A CN 201911146249 A CN201911146249 A CN 201911146249A CN 110889763 A CN110889763 A CN 110889763A
Authority
CN
China
Prior art keywords
user
current area
financial
information
account information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911146249.2A
Other languages
Chinese (zh)
Other versions
CN110889763B (en
Inventor
邵素军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan College of Bussiness Management
Original Assignee
Yunnan College of Bussiness Management
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan College of Bussiness Management filed Critical Yunnan College of Bussiness Management
Priority to CN201911146249.2A priority Critical patent/CN110889763B/en
Publication of CN110889763A publication Critical patent/CN110889763A/en
Application granted granted Critical
Publication of CN110889763B publication Critical patent/CN110889763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Data Mining & Analysis (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a financial management system based on big data, comprising: the receiving module is used for receiving financial transaction data of all target devices in the current area; the establishing module is used for establishing a current region storage path of each target device in a current region, storing financial transaction data and constructing a current region node according to the current region storage path; the server is used for determining the transaction type of the received financial transaction data of each target device based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node; and when receiving an inquiry instruction input by a manager and transmitted by the management terminal, acquiring financial transaction data related to the inquiry instruction based on the current region node, and transmitting the financial transaction data to the management terminal for display. The effective management of the financial system is realized by carrying out layer-by-layer management on financial transaction data.

Description

Financial management system based on big data
Technical Field
The invention relates to the technical field of financial management, in particular to a financial management system based on big data.
Background
The financial management informatization is an important component of national informatization, and is inseparable from and promotes the informatization of each enterprise and all people. The modern information construction is effectively used in the financial management process, so that the content of financial management work can be optimized in many aspects, the efficiency of financial business is improved, and the proper application information technology is also the requirement of the financial market.
Disclosure of Invention
The invention provides a financial management system based on big data, which is used for realizing effective management of the financial system by carrying out layer-by-layer management on financial transaction data.
The embodiment of the invention provides a financial management system based on big data, which comprises:
the receiving module is used for receiving financial transaction data of all target devices in the current area;
the establishing module is used for establishing a current area storage path of each target device in the current area, storing the financial transaction data received by the receiving module into the established corresponding current area storage path, and constructing a current area node according to the established current area storage path;
the server is used for determining the transaction type of the financial transaction data of each target device received by the receiving module based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node;
and when receiving an inquiry instruction input by a manager and transmitted by the management terminal, acquiring financial transaction data related to the inquiry instruction based on the current region node, and transmitting the financial transaction data to the management terminal for display.
In one possible way of realisation,
the server is further configured to determine, based on a pre-stored version database, the current area node and version information of a current area storage path managed by the current area node, and push related version information to the corresponding target device;
the target device is used for receiving the version information pushed by the server, receiving an updating instruction which is input by a user and is related to the version information, and transmitting the updating instruction to the server;
the server is further configured to determine a corresponding update address according to the update instruction transmitted by the target device, and perform version update on the current area node and a current area storage path managed by the current area node based on the update address;
the server is further configured to record the current area node and version update information of the current area storage path managed by the current area node.
In one possible implementation manner, the method further includes:
the construction module is used for constructing a financial link of the user corresponding to the target equipment, and the financial link comprises area storage paths corresponding to different areas of the user;
the server is used for receiving the financial link of the user constructed by the construction module, matching and analyzing the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the construction module, and judging whether a preset matching rate is lower than the actual matching rate of the user and the financial transaction information of the user in the current area node, if so, the server continues to execute subsequent operations;
otherwise, performing matching analysis again for preset times on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the establishing module, and if the actual matching rate of the financial transaction information of the user and the financial transaction information of the user in the current area node is lower than the preset matching rate after the matching analysis is performed each time, sending a first warning instruction to the management end.
In one possible implementation manner, the method further includes:
the clock module is used for providing a preset time period for the backup module;
the backup module is used for controlling the financial transaction data in the current area storage path and the current area node to perform preset standard format conversion, and performing backup processing on the financial transaction data subjected to the preset standard format conversion according to a preset time period provided by the clock module;
the monitoring module is used for monitoring the preset time period provided by the clock module;
the server is further used for determining whether the clock module is damaged or not according to the monitoring result of the monitoring module, storing the financial transaction data after the conversion of the preset standard formats corresponding to a plurality of current preset time periods into a buffer database if the clock module is damaged, and simultaneously sending a second warning instruction to the management terminal;
otherwise, controlling the clock module to continue working.
In one possible implementation, the target device includes:
the system comprises a registration unit, a processing unit and a processing unit, wherein the registration unit is used for receiving registration account information input by a user based on target equipment, and the account information comprises a user account and an account password related to the user account;
the encryption unit is used for encrypting the account information received by the registration unit;
the cutting unit is used for randomly cutting the account information encrypted by the encryption unit to obtain related missing account information;
the input unit is used for receiving a login instruction input by a user based on the target equipment;
the server is used for pushing a login interface related to a login instruction to the target equipment when the input unit receives the login instruction input by the user based on the target equipment, and missing account information obtained after random cutting processing is carried out on the basis of a cutting unit on the target equipment is displayed on the login interface;
and the user inputs the residual account information related to the missing account information based on the login interface.
In one possible way of realisation,
the encryption unit is configured to encrypt the account information received by the registration unit, and the encryption unit includes:
step S1: determining user account information and account password information related to the account information in the account information;
step S2: determining all first single bytes in the user account information and simultaneously determining all second single bytes in the account password information;
step S3: mixing and randomly processing all the first single bytes determined in the step S2 and the second single bytes determined, and allocating new user account information and new account password information;
step S4: and transmitting the new user account information and the new account password information allocated in the step S3 to the cutting unit for random cutting processing.
In one possible way of realisation,
the server is further used for remotely verifying the user information of the user when receiving that the user inputs the residual account information related to the missing account information based on the login interface, judging whether the input user of the residual account information is the same user as the remotely verified user, and if so, receiving that the user executes corresponding financial operation on the financial software;
wherein the remote authentication comprises: verifying biological information;
the biometric information verification includes: fingerprint verification and face identification verification.
In one possible way of realisation,
the target device is used for receiving the sharing instruction input by the user;
the verification module is used for verifying the authority of the user of the sharing instruction received by the target device;
the server is used for determining whether the user has sharing authority according to the authority verification result of the verification module, and controlling the sharing module to start working if the user has the sharing authority;
otherwise, pushing information without sharing authority to the target equipment;
and the sharing module is used for sharing the financial transaction data stored by the server to the target equipment related to the sharing instruction when the server determines that the user has the sharing right.
In one possible way of realisation,
the current area node is connected with the current area path in the current area in a downlink mode, and the current area path comprises a plurality of sub paths;
the current area node is connected with the server in an uplink mode.
In one possible way of realisation,
assigning all single bytes in new user account information and new account password information based on the step S3 to be the same as all single bytes in the registered account information input by the user based on the registration unit;
the number of the single bytes of the distributed new user account information is within a first preset number range;
and the number of the single bytes of the allocated new account password information is within a second preset number range.
In one possible way of realisation,
the cutting unit randomly cuts the account information encrypted by the encryption unit, and the process of obtaining the related missing account information further comprises: determining the legality of the missing account information;
the step of determining the validity of the missing account information includes:
step S1: obtaining the account information, and determining a correction value y of the ith single byte in the N single bytes in the cutting process according to a formula (1)i
Figure BSA0000195378220000051
Wherein j represents the ith single byte pairA jth binary character of the respective n binary characters; e.g. of the typeijRepresenting the natural index of the jth binary character in the ith single byte ηijIndicating the correction factor for the jth binary character in the ith single byte ηij-1A correction coefficient indicating the j-1 th binary character in the ith single byte; deltaijRepresenting a cutting decibel value generated in the process of cutting the jth binary character in the ith single byte; deltaijaRepresenting the noise decibel value generated in the process of cutting the jth binary character in the ith single byte; s (ij) represents the difference coefficient of the jth binary character in the ith single byte; siminRepresenting the minimum difference coefficient of all binary characters in the ith single byte; simaxMaximum difference coefficient of all binary characters in ith single byte;
Figure BSA0000195378220000061
represents the average correction coefficient of all binary characters in the ith single byte;
Figure BSA0000195378220000062
representing the average decibel value generated in the process of cutting all binary characters in the ith single byte;
step S2: the correction value y obtained according to the formula (2) and step S1iDetermining the actual cutting value f of the ith single bytei
Figure BSA0000195378220000063
Wherein m isijThe occupation ratio of the jth binary character in the ith single byte in the single byte storage space is represented;
Figure BSA0000195378220000064
representing the average ratio of all binary characters in the ith single byte in the single byte storage space; Γ () represents a gamma function; and i is more than or equal to 1 and less than or equal to N;
step S3: according to step S2The actual cutting value f of the ith single byte is takeniAnd formula (3), confirm whether each single byte cuts completely in the course of cutting and processing;
Figure BSA0000195378220000065
wherein S represents the cutting completeness of the ith single byte; h isiRepresenting a preset cutting value of the ith single byte;
when the result is S-1, judging that the single byte is completely cut in the cutting processing process, and when each single byte is completely cut in the cutting processing process, indicating that the missing account information is legal;
and when the result is that S is 0, indicating that the missing account information is illegal.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic structural diagram of a financial management system based on big data according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
An embodiment of the present invention provides a financial management system based on big data, as shown in fig. 1, including:
the receiving module is used for receiving financial transaction data of all target devices in the current area;
the establishing module is used for establishing a current area storage path of each target device in the current area, storing the financial transaction data received by the receiving module into the established corresponding current area storage path, and constructing a current area node according to the established current area storage path;
the server is used for determining the transaction type of the financial transaction data of each target device received by the receiving module based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node;
and when receiving an inquiry instruction input by a manager and transmitted by the management terminal, acquiring financial transaction data related to the inquiry instruction based on the current region node, and transmitting the financial transaction data to the management terminal for display.
The financial transaction data includes: the number of transactions and the transaction amount made by the user of each target device in the current area using the financial software downloaded on the target device;
it should be noted that each user has a specific financial link, and the financial link includes area storage paths corresponding to the users in different areas, and each area storage path includes all records of the users using the financial software in different areas.
The target device may be an electronic device, such as a smart phone, a notebook, a tablet, or other electronic devices;
the current region node may manage all current region storage paths in the current region;
the current area storage path manages the sub-paths thereunder, and the number of the sub-paths can be multiple;
the sub-paths may be, for example, when the user uses different financial software to perform financial data transaction, each financial software corresponds to a corresponding sub-path;
therefore, a layer-by-layer management scheme is adopted according to the sub-path, the current area storage path and the current area node, and effective management of financial transaction data is achieved.
The query instruction may be, for example, a financial transaction instruction of querying the user a in the area B, which is input by the user;
the management terminal may be a device such as a notebook, and the device is displayed on the management terminal, so as to facilitate query and check by a manager.
The beneficial effects of the above technical scheme are: the effective management of the financial system is realized by carrying out layer-by-layer management on financial transaction data.
Embodiments of the present invention provide a financial management system based on big data,
the server is further configured to determine, based on a pre-stored version database, the current area node and version information of a current area storage path managed by the current area node, and push related version information to the corresponding target device;
the target device is used for receiving the version information pushed by the server, receiving an updating instruction which is input by a user and is related to the version information, and transmitting the updating instruction to the server;
the server is further configured to determine a corresponding update address according to the update instruction transmitted by the target device, and perform version update on the current area node and a current area storage path managed by the current area node based on the update address;
the server is further configured to record the current area node and version update information of the current area storage path managed by the current area node.
The version information is similar to the principle of software update for updating finance, and is used for repairing or updating some problems existing in the software update, or adding new use functions.
The update instruction is, for example, an instruction to update financial software;
the determining of the corresponding update address based on the update instruction is to obtain a relevant file of an updated version, such as downloaded app software, from the update address;
the recording of the version update information is to provide a reference for repairing a failure of a current area node in a later period and a current area storage path managed by the current area node.
The beneficial effects of the above technical scheme are: the existing loopholes are reduced by determining the current area nodes and the current area storage paths managed by the current area nodes, the system is further optimized, meanwhile, the loopholes existing in the storage paths are conveniently searched, and the system is convenient to repair the loopholes in time
The embodiment of the invention provides a financial management system based on big data, which further comprises:
the construction module is used for constructing a financial link of the user corresponding to the target equipment, and the financial link comprises area storage paths corresponding to different areas of the user;
the server is used for receiving the financial link of the user constructed by the construction module, matching and analyzing the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the construction module, and judging whether a preset matching rate is lower than the actual matching rate of the user and the financial transaction information of the user in the current area node, if so, the server continues to execute subsequent operations;
otherwise, performing matching analysis again for preset times on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the establishing module, and if the actual matching rate of the financial transaction information of the user and the financial transaction information of the user in the current area node is lower than the preset matching rate after the matching analysis is performed each time, sending a first warning instruction to the management end.
The financial link is a link exclusive to the user and comprises all financial transaction data of the user;
when the user firstly conducts financial transactions in different areas, a current area storage path is established, and when the user firstly uses financial software in the current area, a sub-path related to the financial software is established;
the matching analysis is to match the financial transaction information of the user stored in the financial link with the financial transaction information of the user in the current area node constructed by the establishing module one by one;
the preset times can be manually set or default by a system;
the preset matching rate can be set manually or default by a system, and is generally not lower than 98%;
the first warning instruction may be an instruction that the financial transaction data is wrong.
The beneficial effects of the above technical scheme are: by carrying out matching analysis on the financial data, the financial data can be effectively prevented from being mistaken, and convenience is provided for financial management.
The embodiment of the invention provides a financial management system based on big data, which further comprises:
the clock module is used for providing a preset time period for the backup module;
the backup module is used for controlling the financial transaction data in the current area storage path and the current area node to perform preset standard format conversion, and performing backup processing on the financial transaction data subjected to the preset standard format conversion according to a preset time period provided by the clock module;
the monitoring module is used for monitoring the preset time period provided by the clock module;
the server is further used for determining whether the clock module is damaged or not according to the monitoring result of the monitoring module, storing the financial transaction data after the conversion of the preset standard formats corresponding to a plurality of current preset time periods into a buffer database if the clock module is damaged, and simultaneously sending a second warning instruction to the management terminal;
otherwise, controlling the clock module to continue working.
The preset time period can be 3-5 hours generally, so that congestion of a transmission channel caused by the fact that the time is too short and in the process of uninterrupted data transmission and backup is avoided, and the situation that the data transmission is slow caused by too long time is also avoided;
the preset standard format is converted into a binary format generally;
the backup processing is to copy and store the transmitted financial transaction data, and can be backed up to a cloud disk and the like;
the plurality of current preset time periods may be, for example, a plurality of continuous preset time periods before the central node and a plurality of continuous preset time periods after the central node, where the current preset period is used as the central node;
the buffer database is arranged to avoid data loss and bring inconvenience to the management of financial data;
the second warning instruction may be, for example, a clock module damage instruction.
The beneficial effects of the above technical scheme are: the method can effectively avoid the possibility of data backup failure caused by clock damage, improve the integrity of acquired data, facilitate the effective management of financial transaction data, and further reduce the loss of financial data by setting a buffer database.
The embodiment of the invention provides a financial management system based on big data, and the target equipment comprises:
the system comprises a registration unit, a processing unit and a processing unit, wherein the registration unit is used for receiving registration account information input by a user based on target equipment, and the account information comprises a user account and an account password related to the user account;
the encryption unit is used for encrypting the account information received by the registration unit;
the cutting unit is used for randomly cutting the account information encrypted by the encryption unit to obtain related missing account information;
the input unit is used for receiving a login instruction input by a user based on the target equipment;
the server is used for pushing a login interface related to a login instruction to the target equipment when the input unit receives the login instruction input by the user based on the target equipment, and missing account information obtained after random cutting processing is carried out on the basis of a cutting unit on the target equipment is displayed on the login interface;
and the user inputs the residual account information related to the missing account information based on the login interface.
The login instruction can be an instruction for jumping to a preset login interface to log in;
the registered account information includes, for example, a user account input by the user: 123456; the input account password related to the user account is as follows: zxcvbn;
encrypting the information of the registered account, wherein if the encryption can be implemented by mutually replacing any one single byte in the user account with the first single byte in the account password, the obtained user account is as follows: 12345 z; the account password is as follows: 6 xcvbn;
at this time, after the cutting process is performed on the account number, the obtained missing account number information is: the user account is as follows: 123; the account password is as follows: 6 xcv;
then, the user account in the corresponding remaining account information is: 45 z; the account password is as follows: bn.
The beneficial effects of the above technical scheme are: the account information of the user is encrypted and cut, so that the safety of the financial account of the user is improved, and the possibility of illegal use by an illegal user is avoided.
Embodiments of the present invention provide a financial management system based on big data,
the cutting unit randomly cuts the account information encrypted by the encryption unit, and the process of obtaining the related missing account information further comprises: determining the legality of the missing account information;
the step of determining the validity of the missing account information includes:
step S1: obtaining the account information and according to the account informationFormula (1) determines a correction value y of the ith single byte in the N single bytes in the cutting processi
Figure BSA0000195378220000121
Wherein j represents the jth binary character in the n binary characters corresponding to the ith single byte; e.g. of the typeijRepresenting the natural index of the jth binary character in the ith single byte ηijIndicating the correction factor for the jth binary character in the ith single byte ηij-1A correction coefficient indicating the j-1 th binary character in the ith single byte; deltaijRepresenting a cutting decibel value generated in the process of cutting the jth binary character in the ith single byte; deltaijaRepresenting the noise decibel value generated in the process of cutting the jth binary character in the ith single byte; s (ij) represents the difference coefficient of the jth binary character in the ith single byte; siminRepresenting the minimum difference coefficient of all binary characters in the ith single byte; simaxMaximum difference coefficient of all binary characters in ith single byte;
Figure BSA0000195378220000122
represents the average correction coefficient of all binary characters in the ith single byte;
Figure BSA0000195378220000131
representing the average decibel value generated in the process of cutting all binary characters in the ith single byte;
step S2: the correction value y obtained according to the formula (2) and step S1iDetermining the actual cutting value f of the ith single bytei
Figure BSA0000195378220000132
Wherein m isijIndicating the occupation of the jth binary character in the ith single byte in the single byte storage spaceA ratio;
Figure BSA0000195378220000133
representing the average ratio of all binary characters in the ith single byte in the single byte storage space; Γ () represents a gamma function; and i is more than or equal to 1 and less than or equal to N;
step S3: according to the actual cutting value f of the i-th single byte acquired in the step S2iAnd formula (3), confirm whether each single byte cuts completely in the course of cutting and processing;
Figure BSA0000195378220000134
wherein S represents the cutting completeness of the ith single byte; h isiRepresenting a preset cutting value of the ith single byte;
when the result is S-1, judging that the single byte is completely cut in the cutting processing process, and when each single byte is completely cut in the cutting processing process, indicating that the missing account information is legal;
and when the result is that S is 0, indicating that the missing account information is illegal.
The beneficial effects of the above technical scheme are: in the process of cutting account information, the correction value of a single byte is obtained through the formula (1), the actual cutting value of the single byte is determined through the formula (2), whether all characters corresponding to the characters are completely cut or not in the process of cutting the characters in the single byte is determined, the phenomenon that the characters are lost due to position cutting errors in the cutting process of a certain character is avoided, further the random cutting processing failure of the account information is caused, influences are brought to follow-up user operation, and the legality of the account information can be effectively guaranteed through the steps.
Embodiments of the present invention provide a financial management system based on big data,
the encryption unit is configured to encrypt the account information received by the registration unit, and the encryption unit includes:
step S1: determining user account information and account password information related to the account information in the account information;
step S2: determining all first single bytes in the user account information and simultaneously determining all second single bytes in the account password information;
step S3: mixing and randomly processing all the first single bytes determined in the step S2 and the second single bytes determined, and allocating new user account information and new account password information;
step S4: and transmitting the new user account information and the new account password information allocated in the step S3 to the cutting unit for random cutting processing.
The first single byte and the second single byte are determined for obtaining all information in the account number, and the first single byte and the second single byte can be any one or more of numbers, letters and underlines generally;
mixing and randomly processing all the first single bytes and the determined second single bytes, and distributing new user account information and new account password information;
for example: the user account is as follows: 123456; the input account password related to the user account is as follows: zxcvbn;
after the mixed random processing, the formed user account is, for example: 6z5 v; the formed account password is as follows: 1423 xcbn;
it should be noted that the user account obtained in the step after the mixed random processing is only cut for the cutting unit, and the missing account information obtained after cutting, for example, the user account is: 6 z; the formed account password is as follows: 142;
when the user can fill in the remaining account information, the remaining single byte, such as: and 5vxcbn carries out random combination filling at the corresponding account and password, such as: filling in an account number: nbx, password place: cv 5.
The beneficial effects of the above technical scheme are: new account information is further distributed by determining single byte in the account information, and a safety environment basis is provided for financial transactions.
Embodiments of the present invention provide a financial management system based on big data,
the server is further used for remotely verifying the user information of the user when receiving that the user inputs the residual account information related to the missing account information based on the login interface, judging whether the input user of the residual account information is the same user as the remotely verified user, and if so, receiving that the user executes corresponding financial operation on the financial software;
wherein the remote authentication comprises: verifying biological information;
the biometric information verification includes: fingerprint verification and face identification verification.
The beneficial effects of the above technical scheme are: the identity of the user is further verified, the real identity of the user who performs financial operation is determined, and a foundation is provided for financial management.
Embodiments of the present invention provide a financial management system based on big data,
the target device is used for receiving the sharing instruction input by the user;
the verification module is used for verifying the authority of the user of the sharing instruction received by the target device;
the server is used for determining whether the user has sharing authority according to the authority verification result of the verification module, and controlling the sharing module to start working if the user has the sharing authority;
otherwise, pushing information without sharing authority to the target equipment;
and the sharing module is used for sharing the financial transaction data stored by the server to the target equipment related to the sharing instruction when the server determines that the user has the sharing right.
The sharing instruction can be a sharing instruction for financial data;
the authority verification is to determine whether the user can perform the sharing operation.
The beneficial effects of the above technical scheme are: and determining user authority so as to facilitate the sharing of financial data.
Embodiments of the present invention provide a financial management system based on big data,
the current area node is connected with the current area path in the current area in a downlink mode, and the current area path comprises a plurality of sub paths;
the current area node is connected with the server in an uplink mode.
The beneficial effects of the above technical scheme are: and a foundation is provided for layer-by-layer management of financial data.
Embodiments of the present invention provide a financial management system based on big data,
assigning all single bytes in new user account information and new account password information based on the step S3 to be the same as all single bytes in the registered account information input by the user based on the registration unit;
the number of the single bytes of the distributed new user account information is within a first preset number range;
and the number of the single bytes of the allocated new account password information is within a second preset number range.
The first preset number range and the second preset number range are randomly set.
The beneficial effects of the above technical scheme are: the method and the device aim to provide more filling possibilities for the user, ensure the login security of the user and effectively avoid the possibility of illegal login by illegal personnel.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A big data based financial management system, comprising:
the receiving module is used for receiving financial transaction data of all target devices in the current area;
the establishing module is used for establishing a current area storage path of each target device in the current area, storing the financial transaction data received by the receiving module into the established corresponding current area storage path, and constructing a current area node according to the established current area storage path;
the server is used for determining the transaction type of the financial transaction data of each target device received by the receiving module based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node;
and when receiving an inquiry instruction input by a manager and transmitted by the management terminal, acquiring financial transaction data related to the inquiry instruction based on the current region node, and transmitting the financial transaction data to the management terminal for display.
2. The financial management system of claim 1,
the server is further configured to determine, based on a pre-stored version database, the current area node and version information of a current area storage path managed by the current area node, and push related version information to the corresponding target device;
the target device is used for receiving the version information pushed by the server, receiving an updating instruction which is input by a user and is related to the version information, and transmitting the updating instruction to the server;
the server is further configured to determine a corresponding update address according to the update instruction transmitted by the target device, and perform version update on the current area node and a current area storage path managed by the current area node based on the update address;
the server is further configured to record the current area node and version update information of the current area storage path managed by the current area node.
3. The financial management system of claim 1, further comprising:
the construction module is used for constructing a financial link of the user corresponding to the target equipment, and the financial link comprises area storage paths corresponding to different areas of the user;
the server is used for receiving the financial link of the user constructed by the construction module, matching and analyzing the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the construction module, and judging whether a preset matching rate is lower than the actual matching rate of the user and the financial transaction information of the user in the current area node, if so, the server continues to execute subsequent operations;
otherwise, performing matching analysis again for preset times on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the establishing module, and if the actual matching rate of the financial transaction information of the user and the financial transaction information of the user in the current area node is lower than the preset matching rate after the matching analysis is performed each time, sending a first warning instruction to the management end.
4. The financial management system of claim 1, further comprising:
the clock module is used for providing a preset time period for the backup module;
the backup module is used for controlling the financial transaction data in the current area storage path and the current area node to perform preset standard format conversion, and performing backup processing on the financial transaction data subjected to the preset standard format conversion according to a preset time period provided by the clock module;
the monitoring module is used for monitoring the preset time period provided by the clock module;
the server is further used for determining whether the clock module is damaged or not according to the monitoring result of the monitoring module, storing the financial transaction data after the conversion of the preset standard formats corresponding to a plurality of current preset time periods into a buffer database if the clock module is damaged, and simultaneously sending a second warning instruction to the management terminal;
otherwise, controlling the clock module to continue working.
5. The financial management system of claim 1, wherein said target device comprises:
the system comprises a registration unit, a processing unit and a processing unit, wherein the registration unit is used for receiving registration account information input by a user based on target equipment, and the account information comprises a user account and an account password related to the user account;
the encryption unit is used for encrypting the account information received by the registration unit;
the cutting unit is used for randomly cutting the account information encrypted by the encryption unit to obtain related missing account information;
the input unit is used for receiving a login instruction input by a user based on the target equipment;
the server is used for pushing a login interface related to a login instruction to the target equipment when the input unit receives the login instruction input by the user based on the target equipment, and missing account information obtained after random cutting processing is carried out on the basis of a cutting unit on the target equipment is displayed on the login interface;
and the user inputs the residual account information related to the missing account information based on the login interface.
6. The account management system of claim 5, wherein the process of randomly cutting the account information encrypted by the encryption unit by the cutting unit to obtain the related missing account information further comprises: determining the legality of the missing account information;
the step of determining the validity of the missing account information includes:
step S1: obtaining the account information, and determining a correction value y of the ith single byte in the N single bytes in the cutting process according to a formula (1)i
Figure FSA0000195378210000031
Wherein j represents the jth binary character in the n binary characters corresponding to the ith single byte; e.g. of the typeijRepresenting the natural index of the jth binary character in the ith single byte ηijIndicating the correction factor for the jth binary character in the ith single byte ηij-1A correction coefficient indicating the j-1 th binary character in the ith single byte; deltaijRepresenting a cutting decibel value generated in the process of cutting the jth binary character in the ith single byte; deltaijaRepresenting the noise decibel value generated in the process of cutting the jth binary character in the ith single byte; s (ij) represents the difference coefficient of the jth binary character in the ith single byte; siminRepresenting the minimum difference coefficient of all binary characters in the ith single byte; simaxMaximum difference coefficient of all binary characters in ith single byte;
Figure FSA0000195378210000032
represents the average correction coefficient of all binary characters in the ith single byte;
Figure FSA0000195378210000033
representing the average decibel value generated in the process of cutting all binary characters in the ith single byte;
step S2: the correction value y obtained according to the formula (2) and step S1iDetermining the actual cutting value f of the ith single bytei
Figure FSA0000195378210000041
Wherein m isijThe occupation ratio of the jth binary character in the ith single byte in the single byte storage space is represented;
Figure FSA0000195378210000042
representing the average ratio of all binary characters in the ith single byte in the single byte storage space; Γ () represents a gamma function; and i is more than or equal to 1 and less than or equal to N;
step S3: according to the actual cutting value f of the i-th single byte acquired in the step S2iAnd formula (3), confirm whether each single byte cuts completely in the course of cutting and processing;
Figure FSA0000195378210000043
wherein S represents the cutting completeness of the ith single byte; h isiRepresenting a preset cutting value of the ith single byte;
when the result is S-1, judging that the single byte is completely cut in the cutting processing process, and when each single byte is completely cut in the cutting processing process, indicating that the missing account information is legal;
and when the result is that S is 0, indicating that the missing account information is illegal.
7. The account management system of claim 5,
the encryption unit is configured to encrypt the account information received by the registration unit, and the encryption unit includes:
step S1: determining user account information and account password information related to the account information in the account information;
step S2: determining all first single bytes in the user account information and simultaneously determining all second single bytes in the account password information;
step S3: mixing and randomly processing all the first single bytes determined in the step S2 and the second single bytes determined, and allocating new user account information and new account password information;
step S4: transmitting the new user account information and the new account password information allocated in the step S3 to the cutting unit for random cutting processing;
assigning all single bytes in new user account information and new account password information based on the step S3 to be the same as all single bytes in the registered account information input by the user based on the registration unit;
the number of the single bytes of the distributed new user account information is within a first preset number range;
and the number of the single bytes of the allocated new account password information is within a second preset number range.
8. The financial management system of claim 5,
the server is further used for remotely verifying the user information of the user when receiving that the user inputs the residual account information related to the missing account information based on the login interface, judging whether the input user of the residual account information is the same user as the remotely verified user, and if so, receiving that the user executes corresponding financial operation on the financial software;
wherein the remote authentication comprises: verifying biological information;
the biometric information verification includes: fingerprint verification and face identification verification.
9. The financial management system of claim 1,
the target device is used for receiving the sharing instruction input by the user;
the verification module is used for verifying the authority of the user of the sharing instruction received by the target device;
the server is used for determining whether the user has sharing authority according to the authority verification result of the verification module, and controlling the sharing module to start working if the user has the sharing authority;
otherwise, pushing information without sharing authority to the target equipment;
and the sharing module is used for sharing the financial transaction data stored by the server to the target equipment related to the sharing instruction when the server determines that the user has the sharing right.
10. The financial management system of claim 1,
the current area node is connected with the current area path in the current area in a downlink mode, and the current area path comprises a plurality of sub paths;
the current area node is connected with the server in an uplink mode.
CN201911146249.2A 2019-11-21 2019-11-21 Financial management system based on big data Active CN110889763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911146249.2A CN110889763B (en) 2019-11-21 2019-11-21 Financial management system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911146249.2A CN110889763B (en) 2019-11-21 2019-11-21 Financial management system based on big data

Publications (2)

Publication Number Publication Date
CN110889763A true CN110889763A (en) 2020-03-17
CN110889763B CN110889763B (en) 2023-05-23

Family

ID=69748197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911146249.2A Active CN110889763B (en) 2019-11-21 2019-11-21 Financial management system based on big data

Country Status (1)

Country Link
CN (1) CN110889763B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113487275A (en) * 2021-06-29 2021-10-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008217230A (en) * 2007-03-01 2008-09-18 Shinfuoomu:Kk Password automatic update system
CN102316127A (en) * 2010-06-29 2012-01-11 阿尔卡特朗讯 In the wireless communication system based on the document transmission method of distributed storage
CN103207902A (en) * 2013-03-27 2013-07-17 交通银行股份有限公司 Method and system for updating financial client side data
CN104866395A (en) * 2014-02-24 2015-08-26 中国移动通信集团福建有限公司 Data backup method, data backup system, main-backup switching method and main-backup switching system
CN106371867A (en) * 2016-08-29 2017-02-01 深圳市证通电子股份有限公司 Method and system for updating financial equipment software
CN106550032A (en) * 2016-10-25 2017-03-29 广东欧珀移动通信有限公司 A kind of data back up method, apparatus and system
CN107124265A (en) * 2017-04-28 2017-09-01 淮安纷云软件有限公司 A kind of identity identifying method based on Hash hash tables
CN108108452A (en) * 2017-12-28 2018-06-01 珠海德塔芬特金融科技有限公司 Finance data stores and inquiry system, finance data storage and querying method
CN108459929A (en) * 2018-03-28 2018-08-28 成都汇智远景科技有限公司 A kind of data back up method based on cloud computing
CN108765122A (en) * 2018-06-05 2018-11-06 武汉理工大学 A kind of finance data query processing system
CN108985772A (en) * 2018-07-02 2018-12-11 上海达家迎信息科技有限公司 A kind of verification method, device, equipment and the storage medium of block chain
US20190018888A1 (en) * 2017-04-12 2019-01-17 Vijay K. Madisetti Method and System for Tuning Blockchain Scalability, Decentralization, and Security for Fast and Low-Cost Payment and Transaction Processing
CN110163636A (en) * 2019-05-27 2019-08-23 安徽省鼎众金融信息咨询服务有限公司 A kind of CRM system based on big data
CN110310069A (en) * 2019-07-09 2019-10-08 云南经济管理学院 A kind of logistics supply chain information management system
CN110400212A (en) * 2019-07-27 2019-11-01 南宁师范大学 A kind of block chain finance big data processing system and method
CN110413649A (en) * 2019-08-01 2019-11-05 宁波富万信息科技有限公司 A kind of financial big data processing method and its system platform based on block chain

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008217230A (en) * 2007-03-01 2008-09-18 Shinfuoomu:Kk Password automatic update system
CN102316127A (en) * 2010-06-29 2012-01-11 阿尔卡特朗讯 In the wireless communication system based on the document transmission method of distributed storage
CN103207902A (en) * 2013-03-27 2013-07-17 交通银行股份有限公司 Method and system for updating financial client side data
CN104866395A (en) * 2014-02-24 2015-08-26 中国移动通信集团福建有限公司 Data backup method, data backup system, main-backup switching method and main-backup switching system
CN106371867A (en) * 2016-08-29 2017-02-01 深圳市证通电子股份有限公司 Method and system for updating financial equipment software
CN106550032A (en) * 2016-10-25 2017-03-29 广东欧珀移动通信有限公司 A kind of data back up method, apparatus and system
US20190018888A1 (en) * 2017-04-12 2019-01-17 Vijay K. Madisetti Method and System for Tuning Blockchain Scalability, Decentralization, and Security for Fast and Low-Cost Payment and Transaction Processing
CN107124265A (en) * 2017-04-28 2017-09-01 淮安纷云软件有限公司 A kind of identity identifying method based on Hash hash tables
CN108108452A (en) * 2017-12-28 2018-06-01 珠海德塔芬特金融科技有限公司 Finance data stores and inquiry system, finance data storage and querying method
CN108459929A (en) * 2018-03-28 2018-08-28 成都汇智远景科技有限公司 A kind of data back up method based on cloud computing
CN108765122A (en) * 2018-06-05 2018-11-06 武汉理工大学 A kind of finance data query processing system
CN108985772A (en) * 2018-07-02 2018-12-11 上海达家迎信息科技有限公司 A kind of verification method, device, equipment and the storage medium of block chain
CN110163636A (en) * 2019-05-27 2019-08-23 安徽省鼎众金融信息咨询服务有限公司 A kind of CRM system based on big data
CN110310069A (en) * 2019-07-09 2019-10-08 云南经济管理学院 A kind of logistics supply chain information management system
CN110400212A (en) * 2019-07-27 2019-11-01 南宁师范大学 A kind of block chain finance big data processing system and method
CN110413649A (en) * 2019-08-01 2019-11-05 宁波富万信息科技有限公司 A kind of financial big data processing method and its system platform based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高菲: ""模块化云储存安全技术的研究"" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113487275A (en) * 2021-06-29 2021-10-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN113487275B (en) * 2021-06-29 2022-02-11 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain

Also Published As

Publication number Publication date
CN110889763B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
CN109242326B (en) Policy sharing system based on big data and artificial intelligence
WO2017028630A1 (en) Verification method and server
CN111771194A (en) System and method for generating and maintaining immutable digital conference records within distributed network nodes
US11941583B1 (en) Intelligent employment-based blockchain
CN111008402A (en) Block chain timestamp protocol
CN111625809B (en) Data authorization method and device, electronic equipment and storage medium
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN112733178B (en) Cross-chain trust method, device, equipment and medium based on digital certificate authentication
CN105516133A (en) User identity verification method, server and client
KR20200114188A (en) Electronic voting method using smart contract based block chain And system
CN108650289B (en) Method and device for managing data based on block chain
KR102009336B1 (en) Apparatus, method and computer program for cloud scrapping using pre-scrapped bigdata
CN113268336A (en) Service acquisition method, device, equipment and readable medium
CN111339141A (en) Data transmission method, block link node equipment and medium
CN111292057A (en) Service processing method based on block chain
CN110807209A (en) Data processing method, device and storage medium
US11799907B2 (en) Synthetic identity signal network
CN111260475A (en) Data processing method, block chain node point equipment and storage medium
CN110362626A (en) One kind being based on the convenience-for-people inquiry system of block chain network and application method
CN112702410B (en) Evaluation system, method and related equipment based on blockchain network
CN110889763A (en) Financial management system based on big data
CN113326503A (en) Certificate management method and computing device
CN110598479B (en) Data processing method, device and computer readable storage medium
CN115021995B (en) Multi-channel login method, device, equipment and storage medium
US20160117524A1 (en) Enhanced view compliance tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant