CN111783152A - Decision tree-based accounting anti-tampering abstract generation method and system - Google Patents

Decision tree-based accounting anti-tampering abstract generation method and system Download PDF

Info

Publication number
CN111783152A
CN111783152A CN202010629944.0A CN202010629944A CN111783152A CN 111783152 A CN111783152 A CN 111783152A CN 202010629944 A CN202010629944 A CN 202010629944A CN 111783152 A CN111783152 A CN 111783152A
Authority
CN
China
Prior art keywords
information
accounting
abstract
basic
supplementary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010629944.0A
Other languages
Chinese (zh)
Other versions
CN111783152B (en
Inventor
胡天皓
董妙英
管虹翔
倪文隽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010629944.0A priority Critical patent/CN111783152B/en
Publication of CN111783152A publication Critical patent/CN111783152A/en
Application granted granted Critical
Publication of CN111783152B publication Critical patent/CN111783152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/34Browsing; Visualisation therefor
    • G06F16/345Summarisation for human users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/01Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Computing Systems (AREA)
  • Evolutionary Computation (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a method and a system for generating an accounting anti-tampering abstract based on a decision tree, wherein the method comprises the following steps: extracting key information from the transaction message to obtain basic accounting information; determining a preset supplementary abstract rule corresponding to the transaction message based on a decision tree, extracting supplementary information from the transaction message based on the supplementary abstract rule to obtain supplementary abstract information, and encrypting the basic accounting information and the supplementary abstract information to obtain basic abstract information; the invention can prevent the accounting abstract from being falsified and ensure the smooth operation of accounting audit work.

Description

Decision tree-based accounting anti-tampering abstract generation method and system
Technical Field
The invention relates to the technical field of accounting, in particular to a method and a system for generating an accounting anti-tampering abstract based on a decision tree.
Background
The accounting document abstract is mainly used for recording the specific occurrence content of the economic business and filling out the coming and going pulse and the business property of the economic business clearly. In the existing accounting auditing process, many forensics analysis works firstly to screen required data from accounts of an audited unit, wherein the main approach is to pass through an accounting abstract.
The summary generation method commonly used by most electronic accounting systems in the industry at present is to pre-configure some commonly used summary statements, and simultaneously allow financial staff to modify the summary result manually. The method has a good effect on a small company accounting processing mode with small business volume and single business scene, but is difficult to process under the conditions of large transaction volume and complex transaction products of financial market business, and the conditions of too simple abstract, single result or too general and fuzzy expression easily occur. And due to the large transaction quantity, financial accounting staff have different business qualities, and the abstract cannot be timely and accurately modified. The problems of unclear statistics and difficult backtracking appear in the subsequent accounting processing and auditing process due to various reasons. In addition, part of units are to avoid the inspection of tax finance, and can modify and mask the key content of the summary information, thereby greatly influencing the difficulty of audit supervision.
Disclosure of Invention
The invention aims to provide a method for generating an accounting anti-tampering abstract based on a decision tree, which prevents the accounting abstract from being tampered and ensures the smooth operation of accounting auditing work. It is another object of the present invention to provide a decision tree based accounting tamper resistant digest generation system. It is a further object of this invention to provide such a computer apparatus. It is a further object of this invention to provide such a readable medium.
In order to achieve the above object, the present invention discloses a method for generating an accounting anti-tampering abstract based on a decision tree, which comprises:
extracting key information from the transaction message to obtain basic accounting information;
determining a preset supplementary abstract rule corresponding to the transaction message based on a decision tree, extracting supplementary information from the transaction message based on the supplementary abstract rule to obtain supplementary abstract information, and encrypting the basic accounting information and the supplementary abstract information to obtain basic abstract information;
and forming modified summary information according to the input information of the user, and obtaining the accounting summary information according to the basic summary information and the modified summary information.
Preferably, the extracting the key information of the transaction message to obtain the basic accounting information specifically includes:
and extracting key values corresponding to all key information in the accounting main body, the account set information, the business class, the transaction opponent, the currency and the accounting subjects of the transaction message to obtain basic accounting information.
Preferably, the determining, based on the decision tree, the preset supplemental summary rule corresponding to the transaction message specifically includes:
matching according to the strategy type and the function of the decision tree root node and the transaction message to obtain a corresponding child node, matching the transaction message according to the strategy type and the function of the child node to obtain a lower-layer child node corresponding to the child node, repeatedly matching the transaction message to obtain the lower-layer child node until the lower-layer child node is a leaf node, and obtaining a preset supplement summary rule corresponding to the leaf node.
Preferably, the encrypting the basic accounting information and the supplementary digest information to obtain the basic digest information specifically includes:
combining and standardizing the basic accounting information and the supplementary summary information to obtain summary information;
carrying out code conversion and encryption on the summary information to obtain encrypted summary information;
and obtaining basic abstract information according to the summary abstract information and the encrypted abstract information.
Preferably, the method further comprises the following steps:
decrypting the encrypted abstract information of the basic abstract information in the accounting abstract information to obtain original information;
obtaining the summary information again according to the transaction message;
and comparing the original information with the summary abstract information to determine whether the basic abstract information is tampered.
The invention also discloses a system for generating the accounting anti-tampering abstract based on the decision tree, which comprises the following steps:
the basic information extraction module is used for extracting key information of the transaction message to obtain basic accounting information;
a supplementary summary generation module, configured to determine a preset supplementary summary rule corresponding to the transaction message based on a decision tree, extract supplementary information from the transaction message based on the supplementary summary rule to obtain supplementary summary information, and encrypt the basic accounting information and the supplementary summary information to obtain basic summary information;
and the abstract modification module is used for forming modified abstract information according to the input information of the user and obtaining the accounting abstract information according to the basic abstract information and the modified abstract information.
Preferably, the basic information extraction module is specifically configured to extract key values corresponding to all key information in an accounting main body, account set information, business category, transaction opponent, currency and accounting subject of the transaction message to obtain basic accounting information.
Preferably, the supplementary summary generation module is specifically configured to match the strategy type and the function of the decision tree root node with the transaction message to obtain a corresponding child node, match the transaction message according to the strategy type and the function of the child node to obtain a lower-layer child node corresponding to the child node, repeat matching the transaction message to obtain the lower-layer child node until the lower-layer child node is a leaf node, and obtain a preset supplementary summary rule corresponding to the leaf node.
Preferably, the supplementary summary generating module comprises a summary summarizing unit, a summary encrypting unit and a basic summary generating unit;
the summary summarizing unit is used for combining the basic accounting information and the supplementary summary information and carrying out standardized processing to obtain summarized summary information;
the summary encryption unit is used for carrying out coding conversion on the summary information and encrypting the summary information to obtain encrypted summary information;
and the basic abstract generating unit is used for obtaining basic abstract information according to the summary abstract information and the encrypted abstract information.
Preferably, the system further comprises a tamper-proof detection module, which is used for decrypting encrypted abstract information of basic abstract information in the accounting abstract information to obtain original information, obtaining summarized abstract information according to the transaction message again, and comparing the original information with the summarized abstract information to determine whether the basic abstract information is tampered.
The invention also discloses a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method as described above.
The invention also discloses a computer-readable medium, having stored thereon a computer program,
which when executed by a processor implements the method as described above.
The invention obtains basic accounting information by extracting key information of the transaction message, and obtains supplementary summary information by extracting supplementary information of the transaction message through a decision tree and a preset supplementary summary rule. And encrypting the basic accounting information and the supplementary summary information to obtain basic summary information, and forming the accounting summary information together with the basic summary information by using modified summary information formed according to user input as additional information. Therefore, when verifying whether the accounting abstract information is tampered, the same abstract operation can be carried out on the transaction message again, the basic abstract information is decrypted to obtain the original text, whether the basic abstract information is tampered is confirmed by comparing the result of the new abstract operation with the original text obtained by decryption, the safety and the accuracy of the accounting abstract information are guaranteed, and the accounting audit work is guaranteed to be carried out smoothly.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram illustrating a method for generating a decision tree based accounting anti-tampering digest in accordance with one embodiment of the present invention;
FIG. 2 is a flowchart of a decision tree based accounting anti-tampering digest generation method according to an embodiment S200 of the present invention;
FIG. 3 is a block diagram of a decision tree of an embodiment of a method for generating a tamper-resistant digest based on decision tree accounting according to the present invention;
FIG. 4 is a diagram illustrating a sample decision tree according to a specific embodiment of the method for generating a decision tree-based accounting anti-tampering abstract of the present invention;
FIG. 5 is a second flowchart of a decision tree based accounting anti-tampering digest generation method S200 according to an embodiment of the present invention;
FIG. 6 is a flow chart of a decision tree based accounting anti-tampering digest generation method S400 according to an embodiment of the present invention;
FIG. 7 is a block diagram illustrating one embodiment of a decision tree based accounting tamper resistant digest generation system of the present invention;
FIG. 8 is a block diagram of a supplemental summary generation module according to an embodiment of the decision tree based accounting tamper-resistant summary generation system of the present invention;
FIG. 9 is a block diagram illustrating a specific embodiment of a decision tree based accounting anti-tampering digest generation system of the present invention including an anti-tampering detection module;
FIG. 10 is a flowchart illustrating operation of one embodiment of a decision tree based accounting tamper resistant digest generation system of the present invention;
FIG. 11 illustrates a schematic block diagram of a computer device suitable for use in implementing embodiments of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
According to one aspect of the invention, the embodiment discloses a method for generating an accounting anti-tampering abstract based on a decision tree. As shown in fig. 1, in this embodiment, the method includes:
s100: and extracting key information from the transaction message to obtain basic accounting information.
S200: and determining a preset supplementary abstract rule corresponding to the transaction message based on a decision tree, extracting supplementary information from the transaction message based on the supplementary abstract rule to obtain supplementary abstract information, and encrypting the basic accounting information and the supplementary abstract information to obtain basic abstract information.
S300: and forming modified summary information according to the input information of the user, and obtaining the accounting summary information according to the basic summary information and the modified summary information.
The invention obtains basic accounting information by extracting key information of the transaction message, and obtains supplementary summary information by extracting supplementary information of the transaction message through a decision tree and a preset supplementary summary rule. And encrypting the basic accounting information and the supplementary summary information to obtain basic summary information, and forming the accounting summary information together with the basic summary information by using modified summary information formed according to user input as additional information. Therefore, when verifying whether the accounting abstract information is tampered, the same abstract operation can be carried out on the transaction message again, the basic abstract information is decrypted to obtain the original text, whether the basic abstract information is tampered is confirmed by comparing the result of the new abstract operation with the original text obtained by decryption, the safety and the accuracy of the accounting abstract information are guaranteed, and the accounting audit work is guaranteed to be carried out smoothly.
In a preferred embodiment, the step S100 of extracting the key information from the transaction packet to obtain the basic accounting information specifically includes:
s110: and extracting key values corresponding to all key information in the accounting main body, the account set information, the business class, the transaction opponent, the currency and the accounting subjects of the transaction message to obtain basic accounting information.
It can be understood that, in order to meet the basic requirements of the accounting criteria on the accounting summary, the key information of all categories, such as the accounting main body, the account set information, the business major category, the transaction opponent, the currency type, the accounting subject and the like in the transaction message, needs to be extracted for generating the most basic necessary basic accounting information in the summary.
Preferably, the input and output elements of the Key information extraction are Key-Value pairs (Key-Value) patterns. Key-Value can match with various transmission modes of the current mainstream, such as JASON or XML. Key defines the name of the current Key information, such as "accounting subject", and Value defines the location or processing function of the current Key information in the accounting detail or accounting document.
Wherein, the accounting main body is the space range of the current accounting information. The human subject can be the thinner dimension of the human subject. For a financial institution participating in a financial market transaction and having multiple full or funded subsidiaries, the designation may be made by the dimensions of each subsidiary. Generally, the position of the accounting subject in the accounting voucher is fixed, and the Value corresponding to the Key-accounting subject at this time can be defined as the position of the specific accounting subject name in the accounting detail.
The account set information refers to the important information of the current accounting object (accounting main body) for accounting processing and accounting policy. The generation of the abstract does not need all information, and the device only needs to acquire the name of the account set for distinguishing the account detail or the account set to which the account voucher belongs. In a typical single account set accounting system, Value is a parameter preset by a business person. In the accounting system with multiple account sets, corresponding account sets are saved in the journal for distinction, and corresponding Value can be defined as the position of a specific account set name in the accounting detail.
The business category refers to the coarsest granularity of the financial market business, and the industry generally divides the business into dimensions of bonds, financing, foreign exchange, commodities, futures, derivatives and the like. Value here is taken directly from a fixed position in the transaction message.
A trading opponent refers to a customer of a trading accomplishment party or agent in a financial market trade, i.e., an opponent from or to in a compound billing method. Value here is taken directly from a fixed position in the transaction message.
Currency refers to the currency currently used for accounting and the currency of the transaction. For the scene related to foreign currency accounting, Value here is divided into 2 steps, firstly obtaining the currency after conversion from the fixed position in the accounting detail or the voucher, and then obtaining the transaction currency from the fixed position in the transaction message.
Subject refers to a unit of subject for accounting. The financial market industry generally divides the subject numbers according to the transaction varieties and the current life cycle. The Value is configured as a function mode, and the actual subject is obtained according to the subject definition table of the enterprise corresponding to the transaction information mapping in the transaction message.
In a preferred embodiment, as shown in fig. 2, the determining, in S200, the preset supplemental summary rule corresponding to the transaction packet based on the decision tree specifically includes:
s210: and matching the strategy type and the function of the decision tree root node with the transaction message to obtain a corresponding child node, and matching the transaction message according to the strategy type and the function of the child node to obtain a lower-layer child node corresponding to the child node.
S220: and repeatedly matching the transaction messages to obtain lower-layer child nodes until the lower-layer child nodes are leaf nodes, and acquiring preset supplementary abstract rules corresponding to the leaf nodes.
It can be understood that different supplementary summary information is set for different transaction requirements according to different aspects of transaction types and the like, so that the supplementary summary information is dynamically generated according to different service types and service logics, and specific service scenes and service purposes can be described in detail. According to the method, different transactions can be divided into a plurality of levels according to different financial sources, business categories, life cycles and business types, and the supplementary summary rules are matched with the transactions of different levels in a decision tree mode and are preset correspondingly to the plurality of levels of the transactions.
As shown in fig. 3, the trunk of the decision tree is a decision node (including a decision root node and a decision child node). The decision nodes are mapped by the incidence relation, and the leaf nodes of the tree are regular nodes corresponding to the preset supplementary summary rules. Specifically, each node may include a node number, a policy type, and a function. The node number is used for storing the specific number of the current node, and data can be initialized or dynamically distributed by a database. The strategy type is a data dictionary and is used for marking the function type of the current decision node and is divided into a root node, a child node and a leaf node. And when the call is circularly called, screening the root node according to the field as the start of the decision tree. When the decision is made to the leaf node, the decision is finished, and a preset supplementary abstract rule can be called for processing.
And when the strategy type is a leaf node, a decision function needs to be performed, and the function name and the position of the supplement abstract rule are stored and used for dynamically calling the preset supplement abstract rule. The abstract rule is a set of abstract information function and can be dynamically developed according to requirements of different organizations and countries. The function can be developed gradually along with the business expansion, and the hot plug use does not influence the stock function. The function is a simple function and is used for acquiring the information specified in the transaction and matching the information with the matching value in the node incidence relation. Fig. 4 shows an example of a decision tree of a supplement summary rule, in practical application, a root node of the decision tree is determined according to a policy type, an accounting source of a transaction message is determined through a function of the root node, if the accounting source is a general accounting, a child node corresponding to the general accounting is called, a business category to which the transaction message belongs is determined through the function of the child node, if the business category to which the transaction message belongs is financing, the child node is a leaf node, and a preset supplement summary rule "country to which a transaction opponent belongs" is directly and dynamically called, that is, a country to which the transaction opponent belongs in the transaction message is obtained to form supplement summary information.
The decision tree further comprises a node incidence relation used for storing the incidence relation of parent and child nodes in the decision tree, wherein the upper node in each layer of nodes of the decision tree is the parent node of the lower node, and the lower node is the child node of the upper node. In a specific example, the node association may store the association of parent and child nodes in the decision tree in the form of table 1:
TABLE 1
Parent node numbering Storing parent node numbers
Decision value Storing preset decision data for matching with the value obtained by the function of the father node
Child node numbering Storing the child node number corresponding to the decision value
For example, when the parent node is a child node for determining the business class to which the parent node belongs, the child node is a child node for determining the current life cycle, and the decision value is 1, after the business class to which the transaction message corresponds is determined by the function of the parent node in the association relationship of the nodes, a decision value can be determined according to the value of the business class to which the transaction message belongs in the transaction message obtained by matching, so that when the decision value obtained by the function is 1, the child node for determining the current life cycle is called to continue processing the transaction message, and similarly, when a leaf node is screened, the corresponding supplementary summary rule can be called to form supplementary summary information.
In a preferred embodiment, as shown in fig. 5, the encrypting the basic accounting information and the supplementary digest information in S200 to obtain the basic digest information specifically includes:
s230: and combining and standardizing the basic accounting information and the supplementary summary information to obtain summary information.
S240: and carrying out coding conversion on the summary abstract information and encrypting to obtain encrypted abstract information.
S250: and obtaining basic abstract information according to the summary abstract information and the encrypted abstract information.
It can be understood that the basic accounting information and the supplementary summary information are combined and standardized to obtain the summarized summary information, that is, the basic accounting information and the supplementary summary information are combined together (i.e., spliced together), and the standardized process of truncation is performed to ensure that the summary length does not exceed the preset data storage range. The data storage range is a preset data size, and may be, for example, the length of information or the occupied storage space.
In a specific example, when the summarized abstract information is subjected to code conversion and encrypted to obtain encrypted abstract information, information such as characters and/or numbers in the summarized abstract information can be converted into ASCII codes. Based on the result obtained by the ASCII code conversion, encryption processing by the MD5(message-digest algorithm5) algorithm is performed to prevent tampering with the automatically generated basic accounting information including the key content and the supplemental digest information. The encryption results in cryptographic digest information in the form of a MD5 hash string, e.g., a 32-bit 16-ary MD5 hash string is generated.
Finally, based on the MD5 hash string encrypted by MD5, the MD5 hash string may be appended to the summarized digest information as the final base digest information. Furthermore, modified summary information is formed according to input information of a user, and the modified summary information is attached to the basic summary information to form accounting summary information, namely, service personnel is allowed to add personalized summary information (modified summary information) on the basis of original basic summary information, so that the service personnel is allowed to modify the basic summary information in a personalized manner, and the basic summary information generated by the transaction message is not influenced, so that the safety and the accuracy of the basic summary information generated by the transaction message are ensured.
In a preferred embodiment, as shown in fig. 6, the method further includes S400:
s410: and decrypting the encrypted abstract information of the basic abstract information in the accounting abstract information to obtain the original information.
S420: and comparing the summary abstract information in the original information and the basic abstract information to determine whether the basic abstract information is tampered.
It can be understood that the generated basic summary information includes summary information obtained by combining and standardizing the basic accounting information and the supplementary summary information, and further includes coding conversion and encryption of the summary information to obtain encrypted summary information. Therefore, basic abstract information is obtained from the received accounting abstract information, the basic abstract information is decrypted to obtain original information, the original information is compared with summary abstract information in the basic abstract information, if the original information is consistent with the summary abstract information, the encrypted abstract information is obtained by encrypting the summary abstract information, and the basic abstract information is not tampered, so that the purpose of preventing the accounting abstract information from being tampered is achieved.
The method aims to solve the problems of rich, complete and accurate summary generation in the accounting process of the financial market. The invention provides a summary generation scheme based on a decision tree, which generates diversified summary contents according to financial market transaction information, and simultaneously peels off accounting basic information and service personalized information, thereby ensuring the compliance and integrity of the summary information and supporting the tamper resistance of key information.
Based on the same principle, the embodiment also discloses a system for generating the accounting anti-tampering abstract based on the decision tree. As shown in fig. 7, in the present embodiment, the system includes a basic information extraction module 11, a supplementary summary generation module 12, and a summary modification module 13.
The basic information extraction module 11 is configured to extract key information from the transaction message to obtain basic accounting information.
The supplementary summary generation module 12 is configured to determine a preset supplementary summary rule corresponding to the transaction message based on a decision tree, extract supplementary information from the transaction message based on the supplementary summary rule to obtain supplementary summary information, and encrypt the basic accounting information and the supplementary summary information to obtain basic summary information.
The abstract modification module 13 is used for forming modified abstract information according to the input information of the user, and obtaining accounting abstract information according to the basic abstract information and the modified abstract information.
In a preferred embodiment, the basic information extraction module 11 is specifically configured to extract key values corresponding to all key information in an accounting main body, account set information, a business category, a transaction opponent, a currency type, and an accounting subject of a transaction message to obtain basic accounting information.
In a preferred embodiment, the supplementary summary generating module 12 is specifically configured to match the policy type and the function of the decision tree root node with the transaction packet to obtain a corresponding child node, match the transaction packet according to the policy type and the function of the child node to obtain a lower-layer child node corresponding to the child node, repeat matching the transaction packet to obtain the lower-layer child node until the lower-layer child node is a leaf node, and obtain a preset supplementary summary rule corresponding to the leaf node.
In a preferred embodiment, as shown in fig. 8, the supplementary digest generation module 12 includes a digest summarization unit 121, a digest encryption unit 122, and a base digest generation unit 123.
The summary summarizing unit 121 is configured to combine and standardize the basic accounting information and the supplementary summary information to obtain summarized summary information.
The summary encryption unit 122 is configured to perform transcoding on the summarized summary information and encrypt the summarized summary information to obtain encrypted summary information.
The basic summary generating unit 123 is configured to obtain basic summary information according to the summary information and the encrypted summary information.
In a preferred embodiment, as shown in fig. 9, the system further comprises a tamper-proof detection module 14. The tamper-proof detection module 14 is configured to decrypt encrypted digest information of basic digest information in the accounting digest information to obtain original information, obtain summarized digest information again according to the transaction message, and compare the original information with the summarized digest information to determine whether the basic digest information is tampered.
The invention will be further illustrated by means of a specific example. As shown in fig. 10, in this specific example, the generating step of the accounting summary information may include:
step S1101: and inputting a transaction message.
Step S1102: the basic information extraction module 11 is started to read the transaction message
Step S1103: the basic information extraction module 11 calls a basic abstract function for acquiring an accounting main body, an account set, a business class, a transaction opponent, a currency (pair) and an accounting subject from a predefined functional function pool to acquire basic accounting information.
Step S1104: the supplementary summary generation module 12 is started to read the transaction message
Step S1105: the supplemental summary generation module 12 reads the pre-maintained decision tree from the database/configuration file.
Step S1106: the supplementary summary generation module 12 calls a function from a predefined pool of function functions according to a user-configured decision tree.
Step S1107: the supplementary summary generation module 12 determines whether the decision is finished according to the function value and the decision tree parameter. If not, the new function is called according to the user configuration, and the process returns to step S1106. If so, it jumps to step S1108.
Step S1108: the supplement summary generation module 12 calls a preset supplement summary rule from the function pool according to a preset supplement summary rule configured by the user to generate supplement summary information.
Step S1109: and summarizing the basic accounting information and the supplementary summary information, and truncating the ultralong data.
Step S1110: and performing MD5 encryption processing on the data generated in S1109, and splicing the 32-bit 16-system string generated by processing onto the summarized information.
Step S1111: and if the service personnel have supplement requirements on the output summary result, manually supplementing to form modified summary information.
Step S1112: and outputting final accounting summary information.
Since the principle of the system for solving the problem is similar to the above method, the implementation of the system can refer to the implementation of the method, and the detailed description is omitted here.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer device, which may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
In a typical example, the computer device comprises in particular a memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the method as described above.
Referring now to FIG. 11, shown is a schematic diagram of a computer device 600 suitable for use in implementing embodiments of the present application.
As shown in fig. 11, the computer apparatus 600 includes a Central Processing Unit (CPU)601 which can perform various appropriate works and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM)) 603. In the RAM603, various programs and data necessary for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output section 607 including a Cathode Ray Tube (CRT), a liquid crystal feedback (LCD), and the like, and a speaker and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted as necessary on the storage section 608.
In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the invention include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (12)

1. An accounting anti-tampering abstract generation method based on a decision tree is characterized by comprising the following steps:
extracting key information from the transaction message to obtain basic accounting information;
determining a preset supplementary abstract rule corresponding to the transaction message based on a decision tree, extracting supplementary information from the transaction message based on the supplementary abstract rule to obtain supplementary abstract information, and encrypting the basic accounting information and the supplementary abstract information to obtain basic abstract information;
and forming modified summary information according to the input information of the user, and obtaining the accounting summary information according to the basic summary information and the modified summary information.
2. The method for generating the accounting anti-tampering abstract based on the decision tree as claimed in claim 1, wherein the extracting key information of the transaction message to obtain the basic accounting information specifically comprises:
and extracting key values corresponding to all key information in the accounting main body, the account set information, the business class, the transaction opponent, the currency and the accounting subjects of the transaction message to obtain basic accounting information.
3. The method for generating an accounting anti-tampering abstract based on a decision tree as claimed in claim 1, wherein the determining the preset supplementary abstract rule corresponding to the transaction message based on the decision tree specifically comprises:
matching according to the strategy type and the function of the decision tree root node and the transaction message to obtain a corresponding child node, matching the transaction message according to the strategy type and the function of the child node to obtain a lower-layer child node corresponding to the child node, repeatedly matching the transaction message to obtain the lower-layer child node until the lower-layer child node is a leaf node, and obtaining a preset supplement summary rule corresponding to the leaf node.
4. The method for generating a digest for accounting and tamper resistance based on decision tree according to claim 1, wherein the encrypting the basic accounting information and the supplementary digest information to obtain the basic digest information specifically includes:
combining and standardizing the basic accounting information and the supplementary summary information to obtain summary information;
carrying out code conversion and encryption on the summary information to obtain encrypted summary information;
and obtaining basic abstract information according to the summary abstract information and the encrypted abstract information.
5. The method of generating a decision tree based accounting tamper-resistant digest of claim 4 further comprising:
decrypting the encrypted abstract information of the basic abstract information in the accounting abstract information to obtain original information;
obtaining the summary information again according to the transaction message;
and comparing the original information with the summary abstract information to determine whether the basic abstract information is tampered.
6. An accounting anti-tampering digest generation system based on decision trees, comprising:
the basic information extraction module is used for extracting key information of the transaction message to obtain basic accounting information;
a supplementary summary generation module, configured to determine a preset supplementary summary rule corresponding to the transaction message based on a decision tree, extract supplementary information from the transaction message based on the supplementary summary rule to obtain supplementary summary information, and encrypt the basic accounting information and the supplementary summary information to obtain basic summary information;
and the abstract modification module is used for forming modified abstract information according to the input information of the user and obtaining the accounting abstract information according to the basic abstract information and the modified abstract information.
7. The decision tree-based accounting anti-tampering abstract generating system of claim 6, wherein the basic information extracting module is specifically configured to extract key values corresponding to all key information in an accounting main body, account set information, business category, transaction opponent, currency and accounting subject of the transaction message to obtain the basic accounting information.
8. The decision tree-based accounting anti-tampering digest generation system of claim 6, wherein the supplemental digest generation module is specifically configured to match the policy type and the function of the decision tree root node with the transaction message to obtain a corresponding child node, match the transaction message according to the policy type and the function of the child node to obtain a lower-layer child node corresponding to the child node, repeat matching the transaction message to obtain the lower-layer child node until the lower-layer child node is a leaf node, and obtain the preset supplemental digest rule corresponding to the leaf node.
9. The decision tree based accounting tamper-resistant digest generation system of claim 6 wherein the supplementary digest generation module comprises a digest summarization unit, a digest encryption unit and a basic digest generation unit;
the summary summarizing unit is used for combining the basic accounting information and the supplementary summary information and carrying out standardized processing to obtain summarized summary information;
the summary encryption unit is used for carrying out coding conversion on the summary information and encrypting the summary information to obtain encrypted summary information;
and the basic abstract generating unit is used for obtaining basic abstract information according to the summary abstract information and the encrypted abstract information.
10. The decision tree based accounting anti-tampering digest creation system of claim 9, further comprising an anti-tampering detection module for decrypting the encrypted digest information of the basic digest information in the accounting digest information to obtain original information, obtaining the summarized digest information again according to the transaction message, and comparing the original information and the summarized digest information to determine whether the basic digest information is tampered.
11. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method of any of claims 1-5.
12. A computer-readable medium, having stored thereon a computer program,
the program when executed by a processor implementing the method according to any one of claims 1-5.
CN202010629944.0A 2020-07-03 2020-07-03 Method and system for generating tamper-proof abstract of accounting based on decision tree Active CN111783152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010629944.0A CN111783152B (en) 2020-07-03 2020-07-03 Method and system for generating tamper-proof abstract of accounting based on decision tree

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010629944.0A CN111783152B (en) 2020-07-03 2020-07-03 Method and system for generating tamper-proof abstract of accounting based on decision tree

Publications (2)

Publication Number Publication Date
CN111783152A true CN111783152A (en) 2020-10-16
CN111783152B CN111783152B (en) 2023-08-25

Family

ID=72758368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010629944.0A Active CN111783152B (en) 2020-07-03 2020-07-03 Method and system for generating tamper-proof abstract of accounting based on decision tree

Country Status (1)

Country Link
CN (1) CN111783152B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109670334A (en) * 2018-12-19 2019-04-23 平安科技(深圳)有限公司 Electronic health record sharing method, device, computer equipment and storage medium
CN110135964A (en) * 2019-05-21 2019-08-16 山东浪潮通软信息科技有限公司 A kind of financial accounting method based on block chain technology
US20200117550A1 (en) * 2018-10-12 2020-04-16 EMC IP Holding Company LLC Method, device and computer program product for backing up data
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200117550A1 (en) * 2018-10-12 2020-04-16 EMC IP Holding Company LLC Method, device and computer program product for backing up data
CN109670334A (en) * 2018-12-19 2019-04-23 平安科技(深圳)有限公司 Electronic health record sharing method, device, computer equipment and storage medium
CN110135964A (en) * 2019-05-21 2019-08-16 山东浪潮通软信息科技有限公司 A kind of financial accounting method based on block chain technology
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
文硕频, 乔胜勇, 陈彩云, 李治国: "基于决策树的不完全决策表的数据补充及规则提取", 计算机应用, no. 11 *

Also Published As

Publication number Publication date
CN111783152B (en) 2023-08-25

Similar Documents

Publication Publication Date Title
CN110352425B (en) Cognitive regulatory compliance automation for blockchain transactions
US9898715B2 (en) Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
US7693767B2 (en) Method for generating predictive models for a business problem via supervised learning
US9589242B2 (en) Integrating custom policy rules with policy validation process
CN111507638A (en) Risk information output and risk information construction method and device
CN108830696A (en) Reference reports analyzing and processing method, device, computer equipment and storage medium
CN112567716B (en) Secure data transmission system and method
CN115049471A (en) Bill processing method, device, equipment and storage medium
CN113627145A (en) Method, device, equipment and medium for generating file of parameterized configuration
CN111639179A (en) Privacy control method and device for batch customer information of bank front-end query system
CN113382017B (en) Permission control method and device based on white list, electronic equipment and storage medium
US20210149982A1 (en) Data processing systems and methods for dynamically determining data processing consent configurations
CN110021291A (en) A kind of call method and device of speech synthesis file
CN117522094A (en) Seal management method, platform, electronic equipment and storage medium
CN111783152A (en) Decision tree-based accounting anti-tampering abstract generation method and system
CN115600167A (en) Login-free access and embedded configuration method and equipment
CN113051257B (en) Service data cleaning method and device
US20210287315A1 (en) Architectures and methods for generating and transferring electronically signed document data packages
CN114493530A (en) Content auditing processing method, device, equipment and system
CN113343685A (en) Message anomaly detection method and device
US10824894B2 (en) Document content identification utilizing the font
Demir et al. Institutional similarity, firm heterogeneity and export sophistication
CN112241915A (en) Loan product generation method and device
CN113111089A (en) Information acquisition management system and method
KR20120036523A (en) Method and system for certificating data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant