CN110889763B - Financial management system based on big data - Google Patents

Financial management system based on big data Download PDF

Info

Publication number
CN110889763B
CN110889763B CN201911146249.2A CN201911146249A CN110889763B CN 110889763 B CN110889763 B CN 110889763B CN 201911146249 A CN201911146249 A CN 201911146249A CN 110889763 B CN110889763 B CN 110889763B
Authority
CN
China
Prior art keywords
user
current area
financial
account information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911146249.2A
Other languages
Chinese (zh)
Other versions
CN110889763A (en
Inventor
邵素军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan College of Bussiness Management
Original Assignee
Yunnan College of Bussiness Management
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan College of Bussiness Management filed Critical Yunnan College of Bussiness Management
Priority to CN201911146249.2A priority Critical patent/CN110889763B/en
Publication of CN110889763A publication Critical patent/CN110889763A/en
Application granted granted Critical
Publication of CN110889763B publication Critical patent/CN110889763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides a financial management system based on big data, comprising: the receiving module is used for receiving financial transaction data of all target devices in the current area; the establishing module is used for establishing a current area storage path of each target device in the current area, storing the melting transaction data and constructing a current area node according to the current area storage path; the server is used for determining the transaction type of the received financial transaction data of each target device based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node; and when a query instruction input by a manager transmitted by the management end is received, acquiring financial transaction data related to the query instruction based on the current area node, and transmitting the financial transaction data to the management end for display. The financial transaction data is managed layer by layer, so that the financial system is effectively managed.

Description

Financial management system based on big data
Technical Field
The invention relates to the technical field of financial management, in particular to a financial management system based on big data.
Background
Financial management informatization is an important component of national informatization, and is mutually promoted with informatization of various enterprises and citizens. The effective use of modern information construction in the process of financial management has great advantages, can optimize the content of financial management work in many aspects, improves the efficiency of financial business, and the right application information technology is also the requirement of financial market, however, present financial management informatization system is imperfect, and there are many problems, such as the trouble in the construction of financial informatization management framework due to understanding difference of related concepts of finance, and further, such as the problem that potential risks exist in the process of transmission of financial resources or in the process of use, which are all factors that lead to inconvenient effective management of financial system by manager.
Disclosure of Invention
The invention provides a financial management system based on big data, which is used for realizing effective management of a financial system by carrying out layer-by-layer management on financial transaction data.
The embodiment of the invention provides a financial management system based on big data, which comprises the following steps:
the receiving module is used for receiving financial transaction data of all target devices in the current area;
the establishing module is used for establishing a current area storage path of each target device in the current area, storing the financial transaction data received by the receiving module into the established corresponding current area storage path, and constructing a current area node according to the established current area storage path;
the server is used for determining the transaction type of the financial transaction data of each target device received by the receiving module based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node;
and when a query instruction input by a manager transmitted by the management end is received, acquiring financial transaction data related to the query instruction based on the current area node, and transmitting the financial transaction data to the management end for display.
The registration unit is used for receiving registration account information input by a user based on target equipment, wherein the account information comprises a user account and an account password related to the user account;
the encryption unit is used for carrying out encryption processing on the account information received by the registration unit;
the cutting unit is used for carrying out random cutting processing on the account information encrypted by the encryption unit to obtain related missing account information;
the input unit is used for receiving a login instruction input by a user based on target equipment;
the server is used for pushing a login interface related to the login instruction to the target equipment when the input unit receives the login instruction input by the user based on the target equipment, and displaying missing account information obtained after random cutting processing is performed based on a cutting unit on the target equipment on the login interface;
the user inputs residual account information related to the missing account information based on the login interface;
the cutting unit performs random cutting processing on the account information encrypted by the encryption unit, and the process of obtaining the related missing account information further comprises the following steps: determining the legality of the missing account information;
the step of determining the validity of the missing account information comprises the following steps:
step S1: acquiring the account information, and determining a correction value y of the ith single byte in the N single bytes in the cutting process according to a formula (1) i
Figure GSB0000204085660000031
Wherein j represents a j-th binary character of n binary characters corresponding to the i-th single byte; e, e ij A natural exponent representing a jth binary character in an ith single byte; η (eta) ij A correction coefficient representing the jth binary character in the ith single byte; η (eta) ij-1 A correction coefficient representing the j-1 th binary character in the i-th single byte; delta ij Representing a cut decibel value generated in the process of cutting the jth binary character in the ith single byte; delta ija Representing noise decibel values generated in the process of cutting the jth binary character in the ith single byte; s (ij) represents a difference coefficient of a j-th binary character in the i-th single byte; s is(s) imin Representing the smallest difference coefficient of all binary characters in the ith single byte; s is(s) imax The maximum difference coefficient of all binary characters in the ith single byte;
Figure GSB0000204085660000032
representing the average correction coefficient of all binary characters in the ith single byte; />
Figure GSB0000204085660000033
Representing that all binary characters in the ith single byte are cutAverage decibel values generated during the process;
step S2: correction value y obtained according to formula (2) and step S1 i Determining the actual cut value f of the ith single byte i
Figure GSB0000204085660000034
Wherein m is ij Representing the ratio of the jth binary character in the ith single byte in the single byte storage space;
Figure GSB0000204085660000035
representing the average occupation ratio of all binary characters in the ith single byte in the single byte storage space; Γ () represents a gamma function; and i is more than or equal to 1 and less than or equal to N;
step S3: the actual cut value f of the ith single byte obtained according to step S2 i And (3) determining whether each single byte is cut intact during the cutting process;
Figure GSB0000204085660000041
wherein S represents the cut integrity of the ith single byte; h is a i Representing a preset cut value of an ith single byte;
when the result is s=1, judging that the single byte is completely cut in the cutting process, and when each single byte is completely cut in the cutting process, indicating that the missing account information is legal;
when the result is s=0, the missing account information is not legal.
In one possible implementation of this method,
the server is further configured to determine, based on a pre-stored version database, the current area node and version information of a current area storage path managed by the current area node, and push related version information to the corresponding target device;
the target equipment is used for receiving version information pushed by the server, receiving an update instruction related to the version information and input by a user, and transmitting the update instruction to the server;
the server is further configured to determine a corresponding update address according to the update instruction transmitted by the target device, and update the version of the current area node and the current area storage path managed by the current area node based on the update address;
the server is further configured to record version update information of the current area node and a current area storage path managed by the current area node.
In one possible implementation, the method further includes:
the construction module is used for constructing a financial link of a user corresponding to the target equipment, wherein the financial link comprises area storage paths corresponding to different areas of the user;
the server is used for receiving the financial link of the user constructed by the construction module, carrying out matching analysis on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the construction module, judging whether the preset matching rate is lower than the actual matching rate of the user and the user, and if so, continuing to execute subsequent operations by the server;
otherwise, carrying out matching analysis on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the establishing module again for preset times, and sending a first warning instruction to the management end if the result after each matching analysis is that the actual matching rate of the user and the financial transaction information of the user is lower than the preset matching rate.
In one possible implementation, the method further includes:
the clock module is used for providing a preset time period for the backup module;
the backup module is used for controlling the current area storage path and the financial transaction data in the current area node to perform preset standard format conversion, and carrying out backup processing on the financial transaction data after the preset standard format conversion according to a preset time period provided by the clock module;
the monitoring module is used for monitoring the preset time period provided by the clock module;
the server is further configured to determine whether the clock module is damaged according to a monitoring result of the monitoring module, if so, store the converted financial transaction data in the buffer database in the preset standard format corresponding to the current preset time period, and send a second warning instruction to the management end;
otherwise, the clock module is controlled to continue to work.
In one possible implementation of this method,
the encryption unit is used for encrypting the account information received by the registration unit, and comprises the following specific steps:
step S1: determining user account information and account password information related to the account information in the account information;
step S2: determining all first single bytes in the user account information, and simultaneously determining all second single bytes in the account password information;
step S3: performing mixed random processing on all the first single bytes determined in the step S2 and the determined second single bytes, and distributing new user account information and new account password information;
step S4: and transmitting the new user account information and the new account password information distributed in the step S3 to the cutting unit for random cutting.
In one possible implementation of this method,
the server is further configured to, when receiving that the user inputs the remaining account information related to the missing account information based on the login interface, perform remote verification on the user information of the user, determine whether the user of the input remaining account information is the same user as the user that is remotely verified, and if yes, receive that the user performs a corresponding financial operation on the financial management system;
wherein the remote verification comprises: verifying biological information;
the biometric information verification includes: fingerprint verification and face recognition verification.
In one possible implementation of this method,
the target equipment is used for receiving the sharing instruction input by the user;
the verification module is used for verifying the authority of the user of the sharing instruction received by the target equipment;
the server is used for determining whether the user has the sharing authority according to the authority verification result of the verification module, and if so, controlling the sharing module to start working;
otherwise, pushing the information which does not have the sharing authority to the target equipment;
and the sharing module is used for sharing the financial transaction data stored by the server to the target equipment related to the sharing instruction when the server determines that the user has the sharing right.
In one possible implementation of this method,
the current area node is connected with the current area path in the current area in a downlink manner, and the current area path comprises a plurality of sub-paths;
the current area node is connected with the server in an uplink mode.
In one possible implementation of this method,
distributing all single bytes in the new user account information and the new account password information based on the step S3 to be the same as all single bytes in the registration account information input by the user based on the registration unit;
the number of the single bytes of the allocated new user account information is within a first preset number range;
the number of the single bytes of the allocated new account password information is within a second preset number range.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
fig. 1 is a schematic structural diagram of a financial management system based on big data in an embodiment of the invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
An embodiment of the present invention provides a financial management system based on big data, as shown in fig. 1, including:
the receiving module is used for receiving financial transaction data of all target devices in the current area;
the establishing module is used for establishing a current area storage path of each target device in the current area, storing the financial transaction data received by the receiving module into the established corresponding current area storage path, and constructing a current area node according to the established current area storage path;
the server is used for determining the transaction type of the financial transaction data of each target device received by the receiving module based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node;
and when a query instruction input by a manager transmitted by the management end is received, acquiring financial transaction data related to the query instruction based on the current area node, and transmitting the financial transaction data to the management end for display.
The financial transaction data includes: the number of transactions and the amount of transactions performed by the user of each target device in the current area using the financial software downloaded on the target device;
it should be noted that each user has a specific financial link, and the financial link includes an area storage path corresponding to a different area by the user, and each area storage path includes all records of using financial software by the user in a different area.
The target device may be an electronic device, such as a smart phone, a notebook, a tablet, etc.;
the current area node can manage all current area storage paths in the current area;
the current area storage path manages the sub-paths below the current area storage path, and the sub-paths can be multiple;
the sub-paths may be, for example, when the user uses different financial software to conduct financial data transaction, each financial software corresponds to a corresponding sub-path;
therefore, according to the sub-path, the current area storage path and the current area node, a layer-by-layer management scheme is adopted, so that effective management of financial transaction data is realized.
The inquiry command may be, for example, a financial transaction command input by the user for inquiring the area B of the user a;
the management end can be a device such as a notebook, and the like, and is displayed on the device so as to facilitate the inquiry and the check of management personnel.
The beneficial effects of the technical scheme are as follows: the financial transaction data is managed layer by layer, so that the financial system is effectively managed.
The registration unit is used for receiving registration account information input by a user based on target equipment, wherein the account information comprises a user account and an account password related to the user account;
the encryption unit is used for carrying out encryption processing on the account information received by the registration unit;
the cutting unit is used for carrying out random cutting processing on the account information encrypted by the encryption unit to obtain related missing account information;
the input unit is used for receiving a login instruction input by a user based on target equipment;
the server is used for pushing a login interface related to the login instruction to the target equipment when the input unit receives the login instruction input by the user based on the target equipment, and displaying missing account information obtained after random cutting processing is performed based on a cutting unit on the target equipment on the login interface;
and the user inputs the residual account information related to the missing account information based on the login interface.
The login instruction may be an instruction to skip to a preset login interface to perform login;
the above registered account information, for example, the user account input by the user is: 123456; the input account passwords related to the user account are as follows: zxcvbn;
the encrypting process is performed on the registered account information, for example, the encrypting process may be that any one single byte in the user account and the first single byte in the account password are replaced with each other, and the obtained user account is: 12345z; the account number password is as follows: 6xcvbn;
at this time, after the cutting treatment is performed, the obtained missing account information is: the user account is: 123, a step of; the account number password is as follows: 6xcv;
the user account in the corresponding remaining account information is: 45z; the account number password is as follows: bn.
The beneficial effects of the technical scheme are as follows: the encryption and cutting processing are carried out on the account information of the user, so that the safety of the financial account of the user is improved, and the possibility of illegal use by an illegal user is avoided.
The cutting unit performs random cutting processing on the account information encrypted by the encryption unit, and the process of obtaining the related missing account information further comprises the following steps: determining the legality of the missing account information;
the step of determining the validity of the missing account information comprises the following steps:
step S1: acquiring the account information, and determining a correction value y of the ith single byte in the N single bytes in the cutting process according to a formula (1) i
Figure GSB0000204085660000101
Wherein j represents a j-th binary character of n binary characters corresponding to the i-th single byte; e, e ij A natural exponent representing a jth binary character in an ith single byte; η (eta) ij A correction coefficient representing the jth binary character in the ith single byte; η (eta) ij-1 A correction coefficient representing the j-1 th binary character in the i-th single byte; delta ij Representing a cut decibel value generated in the process of cutting the jth binary character in the ith single byte; delta ija Representing noise decibel values generated in the process of cutting the jth binary character in the ith single byte; s (ij) represents a difference coefficient of a j-th binary character in the i-th single byte; s is(s) imin Representing the smallest difference coefficient of all binary characters in the ith single byte; s is(s) imax The maximum difference coefficient of all binary characters in the ith single byte;
Figure GSB0000204085660000102
representing the average correction coefficient of all binary characters in the ith single byte; />
Figure GSB0000204085660000103
Representing the average generated during the cutting process of all binary characters in the ith single byteDecibel values;
step S2: correction value y obtained according to formula (2) and step S1 i Determining the actual cut value f of the ith single byte i
Figure GSB0000204085660000104
Wherein m is ij Representing the ratio of the jth binary character in the ith single byte in the single byte storage space;
Figure GSB0000204085660000105
representing the average occupation ratio of all binary characters in the ith single byte in the single byte storage space; Γ () represents a gamma function; and i is more than or equal to 1 and less than or equal to N;
step S3: the actual cut value f of the ith single byte obtained according to step S2 i And (3) determining whether each single byte is cut intact during the cutting process;
Figure GSB0000204085660000111
wherein S represents the cut integrity of the ith single byte; h is a i Representing a preset cut value of an ith single byte;
when the result is s=1, judging that the single byte is completely cut in the cutting process, and when each single byte is completely cut in the cutting process, indicating that the missing account information is legal;
when the result is s=0, the missing account information is not legal.
The beneficial effects of the technical scheme are as follows: the correction value of the single byte is obtained through the formula (1) in the process of cutting account information, the actual cutting value of the single byte is determined through the formula (2), whether all corresponding characters are completely cut in the process of cutting characters in the single byte is determined, the situation that the characters are lost due to position cutting errors of a certain character in the cutting process, further the account information random cutting processing is failed is avoided, the influence is brought to subsequent user operation, and the legality of the account information can be effectively guaranteed through the steps.
The embodiment of the invention provides a financial management system based on big data,
the server is further configured to determine, based on a pre-stored version database, the current area node and version information of a current area storage path managed by the current area node, and push related version information to the corresponding target device;
the target equipment is used for receiving version information pushed by the server, receiving an update instruction related to the version information and input by a user, and transmitting the update instruction to the server;
the server is further configured to determine a corresponding update address according to the update instruction transmitted by the target device, and update the version of the current area node and the current area storage path managed by the current area node based on the update address;
the server is further configured to record version update information of the current area node and a current area storage path managed by the current area node.
The version information is similar to the principle of software update for updating finance, in order to repair or update some problems existing therein, or in order to add new use functions.
The update instruction is, for example, an instruction to update financial software;
the corresponding update address is determined based on the update instruction, so as to obtain the relevant file of the update version from the update address, and the downloaded app software is downloaded;
the version update information is recorded, so as to provide a repair reference basis for faults of the current area node in the later stage and the current area storage path managed by the current area node.
The beneficial effects of the technical scheme are as follows: by determining the current region node and the current region storage path managed by the current region node, the vulnerability existing in the current region node is reduced, the system is further optimized, and meanwhile, the vulnerability existing in the storage path is also convenient to find, so that timely repair is facilitated
The embodiment of the invention provides a financial management system based on big data, which further comprises:
the construction module is used for constructing a financial link of the user corresponding to the target equipment, and the financial link comprises area storage paths corresponding to different areas of the user;
the server is used for receiving the financial link of the user constructed by the construction module, carrying out matching analysis on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the construction module, judging whether the preset matching rate is lower than the actual matching rate of the user and the user, and if so, continuing to execute subsequent operations by the server;
otherwise, carrying out matching analysis on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the establishing module again for preset times, and sending a first warning instruction to the management end if the result after each matching analysis is that the actual matching rate of the user and the financial transaction information of the user is lower than the preset matching rate.
The financial link is a dedicated link of the user and comprises all financial transaction data of the user;
when the user first carries out financial transaction in different areas, a current area storage path is established, and when the user first uses financial software in the current area, a sub-path related to the financial software is established;
the matching analysis is to match the financial transaction information of the user stored in the financial link with the financial transaction information of the user in the current area node constructed by the establishing module one by one;
the preset times can be manually set or default;
the preset matching rate can be manually set or default, and is generally not lower than 98%;
the first warning command may be a command for causing errors in financial transaction data.
The beneficial effects of the technical scheme are as follows: by carrying out matching analysis on the financial data, errors of the financial data can be effectively avoided, and convenience is brought to financial management.
The embodiment of the invention provides a financial management system based on big data, which further comprises:
the clock module is used for providing a preset time period for the backup module;
the backup module is used for controlling the current area storage path and the financial transaction data in the current area node to perform preset standard format conversion, and carrying out backup processing on the financial transaction data after the preset standard format conversion according to a preset time period provided by the clock module;
the monitoring module is used for monitoring the preset time period provided by the clock module;
the server is further configured to determine whether the clock module is damaged according to a monitoring result of the monitoring module, if so, store the converted financial transaction data in the buffer database in the preset standard format corresponding to the current preset time period, and send a second warning instruction to the management end;
otherwise, the clock module is controlled to continue to work.
The preset time period can be generally 3-5 hours, so that congestion of a transmission channel in the uninterrupted transmission backup process of data caused by too short time is avoided, and the situation that data transmission is slower caused by too long time is also avoided;
the preset standard format is converted, generally into a binary format;
the backup processing is to copy and store the transmitted financial transaction data, and the data can be backed up to a cloud disk and the like;
the plurality of current preset time periods may be, for example, a plurality of continuous preset time periods with the current preset period as a central node before the central node, and a plurality of continuous preset time periods after the central node;
the buffer database is arranged to avoid data loss, so that inconvenience is brought to the management of financial data;
the second warning command may be, for example, a clock module damage command.
The beneficial effects of the technical scheme are as follows: the method can effectively avoid the possibility of data backup failure caused by clock damage, improves the integrity of acquired data, is convenient for effectively managing financial transaction data, and can further reduce the loss of the financial data by arranging a buffer database.
The embodiment of the invention provides a financial management system based on big data, which comprises the following components:
and the user inputs the residual account information related to the missing account information based on the login interface.
The embodiment of the invention provides a financial management system based on big data,
the encryption unit is used for encrypting the account information received by the registration unit, and comprises the following specific steps:
step S1: determining user account information and account password information related to the account information in the account information;
step S2: determining all first single bytes in the user account information, and simultaneously determining all second single bytes in the account password information;
step S3: performing mixed random processing on all the first single bytes determined in the step S2 and the determined second single bytes, and distributing new user account information and new account password information;
step S4: and transmitting the new user account information and the new account password information distributed in the step S3 to the cutting unit for random cutting.
The first single byte and the second single byte are determined to obtain all information in the account, and the first single byte and the second single byte can be any one or more of numbers, letters and underlines in general;
carrying out mixed random processing on all the first single bytes and the determined second single bytes, and distributing new user account information and new account password information;
for example: the user account is: 123456; the input account passwords related to the user account are as follows: zxcvbn;
after the mixed random processing, the formed user account is, for example: 6z5v; the formed account password is as follows: 1423xcbn;
it should be noted that, the user account obtained after the mixed random processing in this step is only cut by the cutting unit, and missing account information obtained after cutting, for example, the user account is: 6z; the formed account password is as follows: 142;
the user may fill in the remaining account information and may use the remaining single bytes, such as: the 5vxcbn is randomly combined and filled in the corresponding account number and password, such as: filling in an account: nbx, filling in the password: cv5.
The beneficial effects of the technical scheme are as follows: and a single byte in the account information is determined, so that new account information is distributed, and a safe environment foundation is provided for financial transactions.
The embodiment of the invention provides a financial management system based on big data,
the server is further configured to, when receiving that the user inputs the remaining account information related to the missing account information based on the login interface, perform remote verification on the user information of the user, determine whether the user of the input remaining account information is the same user as the user that is remotely verified, and if yes, receive that the user performs a corresponding financial operation on the financial management system;
wherein the remote verification comprises: verifying biological information;
the biometric information verification includes: fingerprint verification and face recognition verification.
The beneficial effects of the technical scheme are as follows: the identity of the user is further verified, the true identity of the user performing the financial operation is determined, and a foundation is provided for financial management.
The embodiment of the invention provides a financial management system based on big data,
the target equipment is used for receiving the sharing instruction input by the user;
the verification module is used for verifying the authority of the user of the sharing instruction received by the target equipment;
the server is used for determining whether the user has the sharing authority according to the authority verification result of the verification module, and if so, controlling the sharing module to start working;
otherwise, pushing the information which does not have the sharing authority to the target equipment;
and the sharing module is used for sharing the financial transaction data stored by the server to the target equipment related to the sharing instruction when the server determines that the user has the sharing right.
The sharing instruction may be a sharing instruction for financial data;
the permission verification is to determine whether the user can perform the sharing operation.
The beneficial effects of the technical scheme are as follows: and determining the user permission, so that the financial data can be conveniently shared.
The embodiment of the invention provides a financial management system based on big data,
the current area node is connected with the current area path in the current area in a downlink manner, and the current area path comprises a plurality of sub-paths;
the current area node is connected with the server in an uplink mode.
The beneficial effects of the technical scheme are as follows: providing a foundation for layer-by-layer management of financial data.
The embodiment of the invention provides a financial management system based on big data,
distributing all single bytes in the new user account information and the new account password information based on the step S3 to be the same as all single bytes in the registration account information input by the user based on the registration unit;
the number of the single bytes of the allocated new user account information is within a first preset number range;
the number of the single bytes of the allocated new account password information is within a second preset number range.
The first preset number range and the second preset number range are randomly set.
The beneficial effects of the technical scheme are as follows: the method is used for providing more filling possibilities for the user, not only can ensure the safety of user login, but also can effectively avoid the possibility of illegal login by illegal personnel.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (8)

1. A big data based financial management system, comprising:
the receiving module is used for receiving financial transaction data of all target devices in the current area;
the establishing module is used for establishing a current area storage path of each target device in the current area, storing the financial transaction data received by the receiving module into the established corresponding current area storage path, and constructing a current area node according to the established current area storage path;
the server is used for determining the transaction type of the financial transaction data of each target device received by the receiving module based on a pre-stored financial data model, storing the transaction type into a sub-path in a corresponding current area storage path, and simultaneously transmitting the transaction type into the constructed current area node;
when a query instruction input by a manager transmitted by a management end is received, acquiring financial transaction data related to the query instruction based on the current area node, and transmitting the financial transaction data to the management end for display;
the target device includes:
the registration unit is used for receiving registration account information input by a user based on target equipment, wherein the account information comprises a user account and an account password related to the user account;
the encryption unit is used for carrying out encryption processing on the account information received by the registration unit;
the cutting unit is used for carrying out random cutting processing on the account information encrypted by the encryption unit to obtain related missing account information;
the input unit is used for receiving a login instruction input by a user based on target equipment;
the server is used for pushing a login interface related to the login instruction to the target equipment when the input unit receives the login instruction input by the user based on the target equipment, and displaying missing account information obtained after random cutting processing is performed based on a cutting unit on the target equipment on the login interface;
the user inputs residual account information related to the missing account information based on the login interface;
the cutting unit performs random cutting processing on the account information encrypted by the encryption unit, and the process of obtaining the related missing account information further comprises the following steps: determining the legality of the missing account information;
the step of determining the validity of the missing account information comprises the following steps:
step S1: acquiring the account information, and determining a correction value y of the ith single byte in the N single bytes in the cutting process according to a formula (1) i
Figure FSB0000204085650000021
Wherein j represents a j-th binary character of n binary characters corresponding to the i-th single byte; e, e ij A natural exponent representing a jth binary character in an ith single byte; η (eta) ij A correction coefficient representing the jth binary character in the ith single byte; η (eta) ij-1 A correction coefficient representing the j-1 th binary character in the i-th single byte; delta ij Representing a cut decibel value generated in the process of cutting the jth binary character in the ith single byte; delta ija Representing noise decibel values generated in the process of cutting the jth binary character in the ith single byte; s (ij) represents a difference coefficient of a j-th binary character in the i-th single byte; s is(s) imin Representing the smallest difference coefficient of all binary characters in the ith single byte; s is(s) imax The maximum difference coefficient of all binary characters in the ith single byte;
Figure FSB0000204085650000031
representing the average correction coefficient of all binary characters in the ith single byte; />
Figure FSB0000204085650000032
Representing the average decibel value generated in the process of cutting all binary characters in the ith single byte;
step S2: correction value y obtained according to formula (2) and step S1 i Determining the actual cut value f of the ith single byte i
Figure FSB0000204085650000033
Wherein m is ij Representing the ratio of the jth binary character in the ith single byte in the single byte storage space;
Figure FSB0000204085650000034
representing the average occupation ratio of all binary characters in the ith single byte in the single byte storage space; Γ () represents a gamma function; and i is more than or equal to 1 and less than or equal to N;
step S3: the actual cut value f of the ith single byte obtained according to step S2 i And (3) determining whether each single byte is cut intact during the cutting process;
Figure FSB0000204085650000035
wherein S represents the cut integrity of the ith single byte; h is a i Representing a preset cut value of an ith single byte;
when the result is s=1, judging that the single byte is completely cut in the cutting process, and when each single byte is completely cut in the cutting process, indicating that the missing account information is legal;
when the result is s=0, the missing account information is not legal.
2. The financial management system of claim 1, wherein,
the server is further configured to determine, based on a pre-stored version database, the current area node and version information of a current area storage path managed by the current area node, and push related version information to the corresponding target device;
the target equipment is used for receiving version information pushed by the server, receiving an update instruction related to the version information and input by a user, and transmitting the update instruction to the server;
the server is further configured to determine a corresponding update address according to the update instruction transmitted by the target device, and update the version of the current area node and the current area storage path managed by the current area node based on the update address;
the server is further configured to record version update information of the current area node and a current area storage path managed by the current area node.
3. The financial management system of claim 1, further comprising:
the construction module is used for constructing a financial link of a user corresponding to the target equipment, wherein the financial link comprises area storage paths corresponding to different areas of the user;
the server is used for receiving the financial link of the user constructed by the construction module, carrying out matching analysis on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the construction module, judging whether the preset matching rate is lower than the actual matching rate of the user and the user, and if so, continuing to execute subsequent operations by the server;
otherwise, carrying out matching analysis on the financial transaction information of the user stored in the financial link and the financial transaction information of the user in the current area node constructed by the establishing module again for preset times, and sending a first warning instruction to the management end if the result after each matching analysis is that the actual matching rate of the user and the financial transaction information of the user is lower than the preset matching rate.
4. The financial management system of claim 1, further comprising:
the clock module is used for providing a preset time period for the backup module;
the backup module is used for controlling the current area storage path and the financial transaction data in the current area node to perform preset standard format conversion, and carrying out backup processing on the financial transaction data after the preset standard format conversion according to a preset time period provided by the clock module;
the monitoring module is used for monitoring the preset time period provided by the clock module;
the server is further configured to determine whether the clock module is damaged according to a monitoring result of the monitoring module, if so, store the converted financial transaction data in the buffer database in the preset standard format corresponding to the current preset time period, and send a second warning instruction to the management end;
otherwise, the clock module is controlled to continue to work.
5. The financial management system of claim 1, wherein,
the encryption unit is used for encrypting the account information received by the registration unit, and comprises the following specific steps:
step S1: determining user account information and account password information related to the account information in the account information;
step S2: determining all first single bytes in the user account information, and simultaneously determining all second single bytes in the account password information;
step S3: performing mixed random processing on all the first single bytes determined in the step S2 and the determined second single bytes, and distributing new user account information and new account password information;
step S4: transmitting the new user account information and the new account password information distributed in the step S3 to the cutting unit for random cutting;
distributing all single bytes in the new user account information and the new account password information based on the step S3 to be the same as all single bytes in the registration account information input by the user based on the registration unit;
the number of the single bytes of the allocated new user account information is within a first preset number range;
the number of the single bytes of the allocated new account password information is within a second preset number range.
6. The financial management system of claim 1, wherein,
the server is further configured to, when receiving that the user inputs the remaining account information related to the missing account information based on the login interface, perform remote verification on the user information of the user, determine whether the user of the input remaining account information is the same user as the user that is remotely verified, and if yes, receive that the user performs a corresponding financial operation on the financial management system;
wherein the remote verification comprises: verifying biological information;
the biometric information verification includes: fingerprint verification and face recognition verification.
7. The financial management system of claim 1, wherein,
the target equipment is used for receiving the sharing instruction input by the user;
the verification module is used for verifying the authority of the user of the sharing instruction received by the target equipment;
the server is used for determining whether the user has the sharing authority according to the authority verification result of the verification module, and if so, controlling the sharing module to start working;
otherwise, pushing the information which does not have the sharing authority to the target equipment;
and the sharing module is used for sharing the financial transaction data stored by the server to the target equipment related to the sharing instruction when the server determines that the user has the sharing right.
8. The financial management system of claim 1, wherein,
the current area node is connected with the current area path in the current area in a downlink manner, and the current area path comprises a plurality of sub-paths;
the current area node is connected with the server in an uplink mode.
CN201911146249.2A 2019-11-21 2019-11-21 Financial management system based on big data Active CN110889763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911146249.2A CN110889763B (en) 2019-11-21 2019-11-21 Financial management system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911146249.2A CN110889763B (en) 2019-11-21 2019-11-21 Financial management system based on big data

Publications (2)

Publication Number Publication Date
CN110889763A CN110889763A (en) 2020-03-17
CN110889763B true CN110889763B (en) 2023-05-23

Family

ID=69748197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911146249.2A Active CN110889763B (en) 2019-11-21 2019-11-21 Financial management system based on big data

Country Status (1)

Country Link
CN (1) CN110889763B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113487275B (en) * 2021-06-29 2022-02-11 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008217230A (en) * 2007-03-01 2008-09-18 Shinfuoomu:Kk Password automatic update system
CN102316127A (en) * 2010-06-29 2012-01-11 阿尔卡特朗讯 In the wireless communication system based on the document transmission method of distributed storage
CN103207902A (en) * 2013-03-27 2013-07-17 交通银行股份有限公司 Method and system for updating financial client side data
CN104866395A (en) * 2014-02-24 2015-08-26 中国移动通信集团福建有限公司 Data backup method, data backup system, main-backup switching method and main-backup switching system
CN106371867A (en) * 2016-08-29 2017-02-01 深圳市证通电子股份有限公司 Method and system for updating financial equipment software
CN107124265A (en) * 2017-04-28 2017-09-01 淮安纷云软件有限公司 A kind of identity identifying method based on Hash hash tables
CN108108452A (en) * 2017-12-28 2018-06-01 珠海德塔芬特金融科技有限公司 Finance data stores and inquiry system, finance data storage and querying method
CN108765122A (en) * 2018-06-05 2018-11-06 武汉理工大学 A kind of finance data query processing system
CN108985772A (en) * 2018-07-02 2018-12-11 上海达家迎信息科技有限公司 A kind of verification method, device, equipment and the storage medium of block chain
CN110163636A (en) * 2019-05-27 2019-08-23 安徽省鼎众金融信息咨询服务有限公司 A kind of CRM system based on big data
CN110310069A (en) * 2019-07-09 2019-10-08 云南经济管理学院 A kind of logistics supply chain information management system
CN110400212A (en) * 2019-07-27 2019-11-01 南宁师范大学 A kind of block chain finance big data processing system and method
CN110413649A (en) * 2019-08-01 2019-11-05 宁波富万信息科技有限公司 A kind of financial big data processing method and its system platform based on block chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550032A (en) * 2016-10-25 2017-03-29 广东欧珀移动通信有限公司 A kind of data back up method, apparatus and system
US10255342B2 (en) * 2017-04-12 2019-04-09 Vijay K. Madisetti Method and system for tuning blockchain scalability, decentralization, and security for fast and low-cost payment and transaction processing
CN108459929A (en) * 2018-03-28 2018-08-28 成都汇智远景科技有限公司 A kind of data back up method based on cloud computing

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008217230A (en) * 2007-03-01 2008-09-18 Shinfuoomu:Kk Password automatic update system
CN102316127A (en) * 2010-06-29 2012-01-11 阿尔卡特朗讯 In the wireless communication system based on the document transmission method of distributed storage
CN103207902A (en) * 2013-03-27 2013-07-17 交通银行股份有限公司 Method and system for updating financial client side data
CN104866395A (en) * 2014-02-24 2015-08-26 中国移动通信集团福建有限公司 Data backup method, data backup system, main-backup switching method and main-backup switching system
CN106371867A (en) * 2016-08-29 2017-02-01 深圳市证通电子股份有限公司 Method and system for updating financial equipment software
CN107124265A (en) * 2017-04-28 2017-09-01 淮安纷云软件有限公司 A kind of identity identifying method based on Hash hash tables
CN108108452A (en) * 2017-12-28 2018-06-01 珠海德塔芬特金融科技有限公司 Finance data stores and inquiry system, finance data storage and querying method
CN108765122A (en) * 2018-06-05 2018-11-06 武汉理工大学 A kind of finance data query processing system
CN108985772A (en) * 2018-07-02 2018-12-11 上海达家迎信息科技有限公司 A kind of verification method, device, equipment and the storage medium of block chain
CN110163636A (en) * 2019-05-27 2019-08-23 安徽省鼎众金融信息咨询服务有限公司 A kind of CRM system based on big data
CN110310069A (en) * 2019-07-09 2019-10-08 云南经济管理学院 A kind of logistics supply chain information management system
CN110400212A (en) * 2019-07-27 2019-11-01 南宁师范大学 A kind of block chain finance big data processing system and method
CN110413649A (en) * 2019-08-01 2019-11-05 宁波富万信息科技有限公司 A kind of financial big data processing method and its system platform based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高菲."模块化云储存安全技术的研究".《自动化与仪器仪表》.2016,(第10期),141-143. *

Also Published As

Publication number Publication date
CN110889763A (en) 2020-03-17

Similar Documents

Publication Publication Date Title
US20200183654A1 (en) Data processing systems for identity validation of data subject access requests and related methods
CN109242326B (en) Policy sharing system based on big data and artificial intelligence
US20200034919A1 (en) Blockchain-based service rental methods and devices
CN108711006B (en) Income management method, management node, system and storage equipment
US20200364075A1 (en) Blockchain network transaction processing method, apparatus, device, and storage medium
US20140351895A1 (en) Method and apparatus for process enforced configuration management
CN109308285A (en) Database script management method, device, computer equipment and storage medium
CN110619206B (en) Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN104363112B (en) A kind of parameter management method and device
US20170270602A1 (en) Object manager
CN110807209A (en) Data processing method, device and storage medium
CN110889763B (en) Financial management system based on big data
CN111339141A (en) Data transmission method, block link node equipment and medium
WO2020073516A1 (en) Method and device for selecting supplier based on data analysis, and computer device
CN114331315A (en) Social security service processing method and device combining RPA and AI
CN108038667B (en) Policy generation method, device and equipment
CN113312649A (en) Message processing method, device, equipment, system and storage medium
US20220156397A1 (en) Business official email box based b2b service security verification method, apparatus, and server
CN115242433A (en) Data processing method, system, electronic device and computer readable storage medium
CN112101810A (en) Risk event control method, device and system
CN112633271A (en) Financial transaction system authentication method based on OCR recognition
US11106643B1 (en) System and method for integrating systems to implement data quality processing
JP2021157564A (en) Information processing device, information processing method, and program
CN105913247A (en) Space management method for ESIM card and space management device
CN114281849B (en) Data query method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant