CN111898886B - Collective asset production and nuclear resource clearing system - Google Patents
Collective asset production and nuclear resource clearing system Download PDFInfo
- Publication number
- CN111898886B CN111898886B CN202010686753.8A CN202010686753A CN111898886B CN 111898886 B CN111898886 B CN 111898886B CN 202010686753 A CN202010686753 A CN 202010686753A CN 111898886 B CN111898886 B CN 111898886B
- Authority
- CN
- China
- Prior art keywords
- data
- transaction
- customer
- database
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004519 manufacturing process Methods 0.000 title description 2
- 238000000034 method Methods 0.000 claims abstract description 51
- 230000008569 process Effects 0.000 claims abstract description 38
- 238000012545 processing Methods 0.000 claims abstract description 21
- 230000004044 response Effects 0.000 claims abstract description 16
- 238000013500 data storage Methods 0.000 claims abstract description 15
- 238000004891 communication Methods 0.000 claims abstract description 8
- 238000013475 authorization Methods 0.000 claims description 36
- 238000012795 verification Methods 0.000 claims description 21
- 230000001105 regulatory effect Effects 0.000 claims description 13
- 238000012546 transfer Methods 0.000 claims description 6
- 230000003993 interaction Effects 0.000 claims description 5
- 241000700605 Viruses Species 0.000 description 9
- 230000008901 benefit Effects 0.000 description 6
- 230000007547 defect Effects 0.000 description 6
- 238000012806 monitoring device Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 241001209435 Actus Species 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
- G06Q30/0637—Approvals
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Bioethics (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Game Theory and Decision Science (AREA)
- Databases & Information Systems (AREA)
- Educational Administration (AREA)
- Automation & Control Theory (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a collective asset inventory system, which comprises a supervision device, a database, a data storage, a server and a processing device, wherein the supervision device is configured to supervise checking operation in the database; the data store is configured to check transaction data stored in the memory; the database is used for accessing data links of communication among a plurality of clients and accessing the transaction data based on the supervision device; the processing device is configured to check, clear and verify transaction information from the stored transaction data in response to the server and the server. The invention adopts all transaction information to be stored in the data storage, and calls or checks the data of the order on the data storage in the process of verifying each transaction, thereby ensuring the safe proceeding of the transaction.
Description
Technical Field
The invention relates to the technical field of property accounting, in particular to a collective asset delivery and verification system.
Background
The existing collective economic data can not be dynamically connected with an industrial chain scene in real time by means of manual acquisition, and has the defects of low information updating frequency, chain length decision, low efficiency, high cost and the like.
For example, the prior art of CN111080425a discloses a system and a method for checking the rights and interests of assets of accounts receivable, which cannot realize automatic downloading of registration certificates and datamation of standard format data through a system interface, so that the data processing is very slow and the efficiency is very low, and meanwhile, due to large data processing amount, the required manual resources are increased, so that the cost is increased; when the data are compared, the data are completely matched and compared manually, the efficiency is extremely low, meanwhile, the manual operation is easy to make mistakes, so that the risk is increased and the efficiency is reduced. Another typical internet of things annular intelligent financial service system and method disclosed in the prior art such as WO2017096701A1, and a statistical method and a stock system for stock technical data according to sales conditions disclosed in the prior art such as WO2017124566A1, wherein collective economic data is manually obtained, cannot be dynamically connected with an industrial chain scene in real time, has slow information updating frequency, is low in decision chain length and efficiency, is high in cost, and cannot control industrial chain financial risks.
The invention is provided for solving the problems that the information updating frequency is slow, the decision chain length is long, the efficiency is low, the cost is high, the data processing amount is large, the artificial resources are increased, the real-time dynamic connection with the industrial chain scene can not be realized, and the like in the prior art.
Disclosure of Invention
The invention aims to provide a collective asset inventory system aiming at the defects of the existing collective economic check assets.
In order to overcome the defects in the prior art, the invention adopts the following technical scheme:
a collective asset inventory system comprising a supervision device, a database, a data store, a server and a processing device, the supervision device being configured to supervise a verification operation in the database; the data store is configured to check transaction data stored in the memory; the database is used for accessing data links of communication among a plurality of clients and accessing the transaction data based on the supervision device; the processing device is configured to check, clear and verify transaction information from the stored transaction data in response to the server and the server.
Optionally, the processing device includes a transaction tool, a verification tool, a cloud platform, and a processor, the cloud platform configured to receive a registration request from the transaction tool; and responsive to receiving the registration request, validating the transaction information for the customer;
the cloud platform is configured as a central transaction system and a centralized transaction system; the transaction information includes: information identifying a designated funds account accessible to the central transaction system; responsive to verifying the transaction information, completing registration of the customer and storing the verified information in a customer record maintained or accessed by the centralized transaction system;
the transaction instrument is configured to receive a purchase order under a registered customer or other authorized party of a financial instrument operating on behalf of the customer;
the verification tool is configured to verify a buy or sell order, wherein for the buy order, the verifying step includes evaluating a designated funds account to determine whether there are sufficient funds to complete the transaction, and wherein for the sell order, the verifying step includes evaluating an inventory account to ensure that there is sufficient inventory for the customer to complete the transaction;
the verification tool is further configured to determine, in response to confirming the purchase order, whether another registered customer has placed a matching order; in response to determining a matching order, immediately executing the trade, and wherein the step of executing the trade comprises: the centralized transaction system immediately updates and settles the transaction; extracting funds corresponding to the transaction amount from the designated funds account using the instant funds transfer process; and updates the customer's inventory records to reflect the transactions performed.
Optionally, the transaction information for the customer further includes identification information that can be used to verify the customer's identification to meet regulatory requirements for the jurisdiction in which the centralized transaction system operates; the customer's transaction information also includes inventory information that may be used to access an account for storing an inventory of financial instruments.
Optionally, the database is configured to verify the data stored in the data storage, and delete the repeated data to generate a new data list; the data list comprises a database retrieval list and a database main table, wherein the database main table comprises a main identifier of each identified data block; generating, for each data block identified in the master table, a first value based on a master identification of the identified data block; for each data block identified in the master table, a second value is generated based on the master identification of the identified data block.
Optionally, the policing device includes an authorization engine, a token configuration engine, and a token manipulation engine, the authorization engine configured to perform interactions of data with the third party service provider and with the third party service provider; the token configuration engine is configured to perform processes associated with generating, programming, and deploying access objects or tokens, and to identify, verify, and access the third party service provider's identity for the purpose of authorizing collective economic financial data; the token manipulation engine is configured to perform processes related to identifying and verifying third party tokens and to determine collective economic data authorized for third party access carrying tokens.
Optionally, the token configuration engine is configured to configure the token such that information contained in the token cannot be downloaded by any user, and the configured token security credentials are configured as biometric or other physical features provided by a plurality of banking systems or third party service providers to access authorized data or rights to access.
The beneficial effects obtained by the invention are as follows:
1. through adopting all transaction information to be stored in the data storage, in the process of verifying each transaction, calling or checking the data of the order on the data storage is also carried out, so that the safe proceeding of the transaction is ensured;
2. by adopting the method that the database is used for accessing data links of communication among a plurality of clients and monitoring the transaction data based on the monitoring device, the system, the data storage, the database, the data links and other operations can not be implanted with viruses in the process of accessing, even if viruses are implanted in the process of accessing, the monitoring device can immediately act and viruses are shielded, and the operation of replacing or updating the accessed tokens based on an authorization engine and a token configuration engine is performed, so that the security and protection capability of the whole system is improved;
3. Through adopting a centralized transaction system to execute the validity check of the order in progress, the collective economy is ensured not to be disturbed or threatened in the using process, so that the benefit of the collective is not lost;
4. allowing access to the data by the token manipulation engine without allowing a digital copy of the data itself to provide security and prevent unauthorized distribution of sensitive financial information, guaranteeing a high degree of security for the financial data and access data;
5. by adopting the inquiry of the data of the external third party service provider, the checking precision is improved, the defects of low information updating frequency, low efficiency, high cost and large data processing amount are overcome, and the whole system is improved to be capable of dynamically connecting the data in real time.
Drawings
The invention will be further understood from the following description taken in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
Fig. 1 is a schematic view of a scenario of the present invention.
Fig. 2 is a schematic control flow diagram of the processing device.
Fig. 3 is a schematic diagram of a control flow for deleting repeated transaction information in the database.
Fig. 4 is a schematic control flow diagram of the supervision apparatus.
Fig. 5 is a schematic diagram of a control flow for verifying transaction data.
Detailed Description
The technical scheme and advantages of the present invention will become more apparent, and the present invention will be further described in detail with reference to the following examples thereof; it should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. Other systems, methods, and/or features of the present embodiments will be or become apparent to one with skill in the art upon examination of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the following detailed description.
The same or similar reference numbers in the drawings of embodiments of the invention correspond to the same or similar components; in the description of the present invention, it should be understood that, if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc., based on the orientation or positional relationship shown in the drawings, this is for convenience of description and simplification of the description, rather than to indicate or imply that the apparatus or components referred to must have a specific orientation.
Embodiment one: a collective asset inventory system comprising a supervision device, a database, a data store, a server and a processing device, the supervision device being configured to supervise a verification operation in the database; the data store is configured to check transaction data stored in the memory; the database is used for accessing data links of communication among a plurality of clients and accessing the transaction data based on the supervision device; the processing device is configured to check, clear and verify transaction information from the stored transaction data by the server and the server's response; the processing device includes a transaction tool, a verification tool, a cloud platform, and a processor, the cloud platform configured to receive a registration request from the transaction tool; and responsive to receiving the registration request, validating the transaction information for the customer; the cloud platform is configured as a central transaction system and a centralized transaction system; the transaction information includes: information identifying a designated funds account accessible to the central transaction system; responsive to verifying the transaction information, completing registration of the customer and storing the verified information in a customer record maintained or accessed by the centralized transaction system; the transaction instrument is configured to receive a purchase order under a registered customer or other authorized party of a financial instrument operating on behalf of the customer; the verification tool is configured to verify a buy or sell order, wherein for the buy order, the verifying step includes evaluating a designated funds account to determine whether there are sufficient funds to complete the transaction, and wherein for the sell order, the verifying step includes evaluating an inventory account to ensure that there is sufficient inventory for the customer to complete the transaction; the verification tool is further configured to determine, in response to confirming the purchase order, whether another registered customer has placed a matching order; in response to determining a matching order, immediately executing the trade, and wherein the step of executing the trade comprises: the centralized transaction system immediately updates and settles the transaction; extracting funds corresponding to the transaction amount from the designated funds account using the instant funds transfer process; and updating the customer's inventory records to reflect the transactions performed; the transaction information for the customer also includes identification information that can be used to verify the customer's identification to meet regulatory requirements for the jurisdiction in which the centralized transaction system operates; the customer's transaction information also includes inventory information that may be used to access an account for storing an inventory of financial instruments; the database is configured to verify the data stored in the data storage and delete the repeated data to generate a new data list; the data list comprises a database retrieval list and a database main table, wherein the database main table comprises a main identifier of each identified data block; generating, for each data block identified in the master table, a first value based on a master identification of the identified data block; generating a second value for each data block identified in the master table based on the master identification of the identified data block; the policing device includes an authorization engine, a token configuration engine, and a token manipulation engine, the authorization engine configured to perform interactions of data with a third party service provider and with a third party service provider; the token configuration engine is configured to perform processes associated with generating, programming, and deploying access objects or tokens, and to identify, verify, and access the third party service provider's identity for the purpose of authorizing collective economic financial data; the token manipulation engine is configured to perform processes related to identifying and verifying third party tokens and to determine collective economic data authorized for third party access carrying tokens; the token configuration engine is configured to configure a token, and information contained in the token cannot be downloaded by any user, and the configured token security credentials are configured as a biometric or other physical feature provided by a plurality of banking systems or third party service providers to access authorized data or rights to access.
Embodiment two: this embodiment should be understood to include at least all of the features of any one of the foregoing embodiments, and further improvements thereto, and in particular, to provide a collective asset inventory system including a monitoring device, a database, a data store, a server, and a processing device, the monitoring device configured to monitor audit operations in the database; the data store is configured to check transaction data stored in the memory; the database is used for accessing data links of communication among a plurality of clients and accessing the transaction data based on the supervision device; the processing device is configured to check, clear and verify transaction information from the stored transaction data by the server and the server's response; specifically, the data connection between the supervision device and the database enables the checking and verifying capital of the whole system to play a role in protecting and supervising, and further ensures that the supervision device sets and protects rules of the whole system according to legal regulations; in this embodiment, by performing the operations of checking and protecting the capital of the collective economy, the whole system can decide to place an order according to the budget or multiple persons when dealing with a significant project or order, and re-check and verify the whole transaction information based on the owned capital; in this embodiment, the whole system is also configured to perform a large amount of verification on the information of the transaction, so as to ensure the safe performance of the transaction; in this embodiment, there is provided a step for performing transaction verification, the step comprising: the centralized transaction system updates and settles transactions instantly; and extracting funds corresponding to the transaction amount from the designated funds account using the instant funds transfer process; and updating inventory records of both customers to reflect the executed transactions; in this embodiment, the transaction information for the customer further includes identification information, which may be used to verify the identification of the customer, so as to satisfy the efficient performance of the centralized transaction system under the regulatory requirements; in this embodiment, all transaction information is stored in the data storage, and in the process of verifying each transaction, an operation of calling an order or checking data on the data storage is also performed; the calling or checking process comprises the following steps: the database is used for accessing data links of communication among a plurality of clients, the transaction data is regulated based on the regulating device, so that the system, the data storage, the database, viruses and other operations are not implanted in the data links in the process of accessing, even if viruses are implanted in the process of accessing, the regulating device immediately acts and viruses are shielded, and the accessed token is replaced or updated based on an authorization engine and a token configuration engine; in this embodiment, the supervision device is used to provide protection for the whole system, prevent the lawbreaker from damaging the system, and ensure the security of the data stored in the system; in an embodiment, in the process that the client accesses the link related to the database, the supervision device also supervises the link of the whole system, so as to ensure the safety of data transportation and transmission;
The processing device includes a transaction tool, a verification tool, a cloud platform, and a processor, the cloud platform configured to receive a registration request from the transaction tool; and responsive to receiving the registration request, validating the transaction information for the customer; the cloud platform is configured as a central transaction system and a centralized transaction system; the transaction information includes: information identifying a designated funds account accessible to the central transaction system; responsive to verifying the transaction information, completing registration of the customer and storing the verified information in a customer record maintained or accessed by the centralized transaction system; the transaction instrument is configured to receive a purchase order under a registered customer or other authorized party of a financial instrument operating on behalf of the customer; the verification tool is configured to verify a buy or sell order, wherein for the buy order, the verifying step includes evaluating a designated funds account to determine whether there are sufficient funds to complete the transaction, and wherein for the sell order, the verifying step includes evaluating an inventory account to ensure that there is sufficient inventory for the customer to complete the transaction; the verification tool is further configured to determine, in response to confirming the purchase order, whether another registered customer has placed a matching order; in response to determining a matching order, immediately executing the trade, and wherein the step of executing the trade comprises: the centralized transaction system immediately updates and settles the transaction; extracting funds corresponding to the transaction amount from the designated funds account using the instant funds transfer process; and updating the customer's inventory records to reflect the transactions performed; specifically, in this embodiment, there is provided a method for immediate settlement, including: s1: corresponding to the registration request; s2: receiving a customer order; s3: verifying the matching order; s4: buying a bill, and verifying information such as the capital of a purchaser; specifically, a registration request is received from a customer desiring to transact a financial instrument or other value instrument in the following manner: in response to receiving the registration request, the future time verifies transaction information for the customer, the transaction information including information identifying a designated funds account accessible by the centralized transaction system; responsive to verifying the transaction information, completing registration of the customer and maintaining a customer record storing the verification information; in particular, the centralized transaction system evaluates the customer records to determine a designated transaction account that is then automatically queried to establish sufficient funds to conduct a transaction; if the transaction account is underfunded, the order will be immediately rejected; otherwise, the purchase order will be validated; the operation of automatic query includes techniques known to those skilled in the art, or those skilled in the art know the means of querying relevant manuals, so in this embodiment, the automatic query mode will not be described in detail;
After registration, receiving a purchase order under an authorized party registering the customer or conducting a financial instrument transaction on behalf of the customer; determining whether another registered customer places a matching order; verifying the matching order, wherein for the order, the verifying step includes evaluating the designated funds account to confirm that sufficient funds or other tradeable stock is available to complete the trade, and wherein for the order, the verifying step includes evaluating the inventory account to ensure that the customer has sufficient inventory to complete the trade; in response to confirming the order, immediately executing the transaction, and wherein the step of executing the transaction comprises: the centralized transaction system updates and settles transactions instantly; immediately extracting funds or tradable stocks corresponding to the transaction amount from the designated funds account of the purchasing customer; updating inventory records of both customers to reflect the executed transactions;
in this embodiment, the whole system includes data of a third party service provider, and in the process of connecting with the third party service provider, the supervision device needs to be supervised and protected; in addition, the transactions are registered in turn in a data store, and the transaction details are transmitted to the relevant regulatory authorities; the centralized transaction system comprises an electronic transaction platform; more specifically, in the present implementation, the cloud platform is implemented by a web server hosting a web application accessible by a user computing device for client registration; the web application is further configured to implement an order execution module that executes and receives orders placed by registered clients; the network server is further configured to communicate with various remote third party services, data stores and regulatory authorities over a network; for meeting regulatory reporting requirements, verifying and updating inventory records maintained elsewhere, communicating with other stakeholders, etc.; the centralized transaction system performs validity check of the order in progress, so that the collective economy is ensured not to be disturbed or threatened in the using process, and the benefit of the collective is not lost;
The transaction information for the customer also includes identification information that can be used to verify the customer's identification to meet regulatory requirements for the jurisdiction in which the centralized transaction system operates; the customer's transaction information also includes inventory information that may be used to access an account for storing an inventory of financial instruments; specifically, the centralized transaction system registers executed transactions sequentially in a database or series of databases, and transaction details are sent to relevant regulatory authorities and other stakeholders; the database consists of any database agreed by the transaction counterpart; in this embodiment, the centralized transaction system communicates the complete data file to a database accessible to the regulatory authorities, while the edited version is sent to a database accessible to other stakeholders; likewise, the database includes any suitable data store or ledger; in this embodiment, the data file is sent to the single transaction log being administered at microsecond timing containing all asset price changes, and the transaction execution will be administered; settling on a centralized transaction system, the initial transaction agreed upon by two registered customers will have two or three cash flow types; first any prepayment from one party to another party; then, the centralized transaction system will require the initial assurance of both parties to the transaction; in the event that any party violates the contract before the derivative contract expires, the initial guarantee is simply a payment to the central transaction adversary, ensuring that the benefits of each other are not lost; the collective economy needs to master the inventory of the collective economy in the process of trade or transaction, so that no default exists in the process of transaction, and no credit is generated;
The database is configured to verify the data stored in the data storage and delete the repeated data to generate a new data list; the data list comprises a database retrieval list and a database main table, wherein the database main table comprises a main identifier of each identified data block; generating, for each data block identified in the master table, a first value based on a master identification of the identified data block; generating a second value for each data block identified in the master table based on the master identification of the identified data block; specifically, in this embodiment, the list of the data list stored in the database is deduplicated or deleted in other forms; in this embodiment, the detection is performed through the database search list, where the database search list is configured to mark the main identifier of the data block for the database main table, and when the identifiers of the main identifiers of the data blocks are consistent, it is determined that a certain transaction data in the data table has repetition, and the transaction information is deleted; generating the first value of the respective data block includes: summing the primary identities of the data blocks associated with the respective data blocks; generating the second value for the corresponding data block includes: squaring a primary identification of the data block associated with the corresponding data block; and summing the squared original identifications; ensuring that interference items in a data main table can be filtered through the cooperation between the first value and the second value, and relieving the difficulty of searching the data main table;
In the embodiment, the whole system also queries the data of the external third party service provider, so that the checking precision is improved, the defects of low information updating frequency, low efficiency, high cost and large data processing amount are overcome, and the whole system is improved to be capable of dynamically connecting the data in real time; meanwhile, in the process of carrying out data interaction on the third party service provider, the supervision device is required to authorize the accessed data and links or verify digital certificates; specifically, the policing device comprises an authorization engine, a token configuration engine and a token operation engine, wherein the authorization engine is configured to execute data interaction with a third party service provider and a third party service provider; the token configuration engine is configured to perform processes associated with generating, programming, and deploying access objects or tokens, and to identify, verify, and access the third party service provider's identity for the purpose of authorizing collective economic financial data; the token manipulation engine is configured to perform processes related to identifying and verifying third party tokens and to determine collective economic data authorized for third party access carrying tokens; in particular, the token configuration engine is configured to configure a token, and information contained in the token cannot be downloaded by any user, and the configured token security credentials are configured as a biometric or other physical feature provided by a plurality of banking systems or third party service providers to access authorized data or rights to access; in particular, the token configuration engine is configured to configure a token, and information contained in the token cannot be downloaded by any user, and the configured token security credentials are configured as a biometric or other physical feature provided by a plurality of banking systems or third party service providers to access authorized data or rights to access; specifically, in this embodiment, the cloud platform receives, via the token manipulation engine, a request from a third party, such as a third party service provider, to access visitor financial data; the token manipulation engine confirms that the third party is an authorized party and then requests to receive and verify a previously configured digital certificate of the third party; the authorization engine reads or executes software instructions stored in the third party token to determine visitor financial data that the third party can access for any given visitor, and then provides authorized visitor data in response to the third party; in this embodiment, the token exchanges or passes certain authentication information from third party service providers and cloud platforms; by creating trust relationships, a third party service provider is able to access multiple restricted access rights modules, data, libraries, or other services in the cloud platform that cannot be accessed by an untrusted third party; the cloud platform determines, via the authorization engine, the financial service account provider, such as: a provider associated with the banking system whether to authorize and authenticate the third party;
The authorization engine makes the determination by sending a third party request to a banking system or other third party facilitator via a network or by other means; in this embodiment, the authorization engine provides information to the banking system about the third party service provider that is seeking authorization, including: identification information, information about the proposed third party service or application, information about the type of visitor financial data requested, etc.; if the financial service account provider does not authorize and authenticate the third party, the authorization engine denies the third party authorization request; conversely, if the banking system does indicate that the third party has been authorized and authenticated, the authorization engine proceeds and determines a particular visitor associated with the financial services account provider;
in this embodiment, the visitor is a partner enterprise or manager of the financial service account provider, and the financial service account provider has previously configured the visitor with a financial service account; in this embodiment, the banking system may have acquired financial data of the visitor in other ways, so that information such as identity or information of the visitor is grasped, and if the information provided by the visitor is false or counterfeit, a third party service provider such as the banking system will reject the access request; the cloud platform determines, via an authorization engine, whether each visitor authorizes and authenticates the third party, and makes the determination by the authorization engine by sending a third party request to the mobile device via the wireless carrier network or by other means; if the visitor does not authorize and authenticate the third party, the authorization engine denies the third party authorization request; conversely, if the visitor does indicate, for example, through a mobile application or through an email message, that the third party has been authorized and authenticated, the authorization engine continues to begin configuring access tokens, thereby allowing the third party to access the financial data; the cloud platform configures digital certificates for authorized third parties via a token configuration engine and the purpose of the certificates is to identify the third parties and provide enhanced security for visitor data;
Initially configuring a digital certificate at the beginning of a trusted business relationship between the cloud platform and a third party service provider; the certificate and the identification information containing it are updated at any time after their initial configuration; the high security of the certificate is ensured by updating the certificate, so that the security of the financial data is ensured, and the condition that the whole inquiry platform is interfered by the theft or the tampering of the certificate is prevented;
the cloud platform is capable of revoking digital certificates of any third party service provider, denying them access to any visitor financial data, financial institution data or other information and services hosted by the cloud platform; if the third party service provider has an unreliable state, the cloud platform can cancel the digital certificate at any time, so that the safe and effective efficient transmission of the whole system between data is improved;
the token configuration engine is configured to communicate directly with the authorization engine to determine authorization data and rights to access authorized by both the financial service account provider and the individual visitor; the token configuration engine determining authorized data and rights to access from information stored in a memory or database; the token is structured to contain various categories or arrangements of visitor financial data or rights to access that the third party may potentially access, and an indication of whether the third party service provider is actually authorized to access the data; the token configuration engine implements a password protection scheme for the token that further includes configuring and implementing additional security issues to further limit access, in embodiments the cloud platform generates terms of service or other similar security and usage agreements and requires validation of the terms of service by third party service providers; the token is configured with one or more layers of required authorization and may require verification by one or both of the cloud platform or a third party service provider to display or access the authorization data token contained therein; the token configuration engine configures the token such that information contained in the token cannot be downloaded by any user;
In this embodiment, the configured token security credential includes a biometric or other physical feature provided by one or more of the banking system or the third party service provider to access authorized data or rights to access; in this embodiment, the credentials include the physical device required for access, such as a key, dongle, card, or other such device; the token configuration engine may also configure the token to operate under hypertext transfer protocol security or other similar security protection over the network; the token manipulation engine verifies that the identification credential provided by the third party service provider is valid; verification of the certificate is performed by any means known to a person skilled in the art; the processor reads the information contained in the certificate, compares it with the identification information stored in the memory or database, and provides a notification to the third certificate when it is confirmed that the provided information matches the stored information of the certificate; the third party service provider computer system proving that the certificate is valid; the token manipulation engine determining the rights of the visitor financial data or access to the given visitor by the authorized third party; the token operation engine compares the authorization information stored in the token with the specific data which the third party has requested to access and the access permission; if the request exceeds the authorization level stored in the token, the token manipulation engine denies access to unauthorized data or rights to access and provides such an indication to the third party service provider; if the requested data and the rights to access are authorized based on the token information, the token manipulation engine provides access to the rights to the data or the access; in this embodiment, the token manipulation engine only allows access to the data, but not to a digital copy of the data itself, to provide security and prevent unauthorized distribution of sensitive financial information, guaranteeing a high level of security for the financial data and access to the data; in the present embodiment, it is also possible to remotely, that is: providing access to the data based on read-only access of the cloud, and the visitor data is not sent to the third party service provider; the token manipulation engine provides access to stored financial data or rights to access from within a memory or database via a link over a network or directly from a banking system via a network; any or all of the cloud platform, the banking system, or the visitor are configured through an authorization engine of a mobile device to revoke authorization and access to particular data or services by a third party service provider, the access request will be either rejected or denied; in this embodiment, the token configuration engine revokes or otherwise cancels the initially configured token, and if some level of more restricted access is still authorized for the third party service provider, the token configuration engine configures a new token based on the modified authorization and access conditions;
A third party service provider receiving a request from a visitor to provide a mobile service; the request is received from the mobile device and includes a request or invitation for a third party service provider to perform or provide mobile services to the visitor using visitor financial data; in this embodiment, the request is associated with a mobile application associated with a plurality of visitors, financial service account providers, or third party service providers; the authorization is accomplished in substantially the same manner as described in the authorization process above; in addition, third party service providers seek and protect authorization from visitors and banking systems through the cloud platform; the visitor authorizes the third party service provider as part of its initial request for mobile services; the third party service provider determining the visitor financial data or rights to access required to perform the requested mobile service; the third party service provider has a previously configured application to provide the requested mobile service and the application contains information about the required data or rights to access; after determining the visitor financial data or rights to access necessary to perform the requested mobile service, the third party service provider requests and receives access to those data or rights to access via the cloud platform; in this embodiment, the cloud platform responds to the third party request by the token configuration engine by performing a token configuration process substantially similar to the token configuration process described above; upon receiving the configured token from the cloud platform, the third party service provider provides the token to the cloud platform to access rights for the desired visitor financial data access, either immediately or at a later time; in this embodiment, the cloud platform responds to the third party providing the token by the token manipulation engine performing a token manipulation process substantially similar to the token manipulation process described above.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
In summary, according to the collective asset inventory system, all transaction information is stored in the data memory, and in the process of verifying each transaction, the operation of calling the order or checking the data on the data memory is required to ensure the safe proceeding of the transaction; by adopting the method that the database is used for accessing data links of communication among a plurality of clients and monitoring the transaction data based on the monitoring device, the system, the data storage, the database, the data links and other operations can not be implanted with viruses in the process of accessing, even if viruses are implanted in the process of accessing, the monitoring device can immediately act and viruses are shielded, and the operation of replacing or updating the accessed tokens based on an authorization engine and a token configuration engine is performed, so that the security and protection capability of the whole system is improved; through adopting a centralized transaction system to execute the validity check of the order in progress, the collective economy is ensured not to be disturbed or threatened in the using process, so that the benefit of the collective is not lost; allowing access to the data by the token manipulation engine without allowing a digital copy of the data itself to provide security and prevent unauthorized distribution of sensitive financial information, guaranteeing a high degree of security for the financial data and access data; by adopting the inquiry of the data of the external third party service provider, the checking precision is improved, the defects of low information updating frequency, low efficiency, high cost and large data processing amount are overcome, and the whole system is improved to be capable of dynamically connecting the data in real time.
While the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications can be made without departing from the scope of the invention. That is, the methods, systems and devices discussed above are examples. Various configurations may omit, replace, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in a different order than described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, such as different aspects and elements of the configurations may be combined in a similar manner. Furthermore, as the technology evolves, elements therein may be updated, i.e., many of the elements are examples, and do not limit the scope of the disclosure or the claims.
Specific details are given in the description to provide a thorough understanding of exemplary configurations involving implementations. However, configurations may be practiced without these specific details, e.g., well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring configurations. This description provides only an example configuration and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configuration will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
It is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is intended that it be regarded as illustrative rather than limiting. Various changes and modifications to the present invention may be made by one skilled in the art after reading the teachings herein, and such equivalent changes and modifications are intended to fall within the scope of the invention as defined in the appended claims.
Claims (2)
1. A collective asset inventory system comprising a supervision device, a database, a data storage, a server, and a processing device, the supervision device configured to supervise a verification operation in the database; the data store is configured to check transaction data stored in the memory; the database is used for accessing data links of communication among a plurality of clients and accessing the transaction data based on the supervision device; the processing device is configured to check, clear and verify transaction information from the stored transaction data by the server and the server's response;
the processing device includes a transaction tool, a verification tool, a cloud platform, and a processor, the cloud platform configured to receive a registration request from the transaction tool; and responsive to receiving the registration request, validating the transaction information for the customer;
The cloud platform is configured as a central transaction system and a centralized transaction system; the transaction information includes: information identifying a designated funds account accessible to the central transaction system; responsive to verifying the transaction information, completing registration of the customer and storing the verified information in a customer record maintained or accessed by the centralized transaction system;
the transaction instrument is configured to receive a purchase order under a registered customer or other authorized party of a financial instrument operating on behalf of the customer; the verification tool is configured to verify a buy or sell order, wherein for the buy order, the verifying step includes evaluating a designated funds account to determine whether there are sufficient funds to complete the transaction, and wherein for the sell order, the verifying step includes evaluating an inventory account to ensure that there is sufficient inventory for the customer to complete the transaction;
the verification tool is further configured to determine, in response to confirming the purchase order, whether another registered customer has placed a matching order; in response to determining a matching order, immediately executing the trade, and wherein the step of executing the trade comprises: the centralized transaction system immediately updates and settles the transaction; extracting funds corresponding to the transaction amount from the designated funds account using the instant funds transfer process; and updating the customer's inventory records to reflect the transactions performed;
The transaction information for the customer also includes identification information that can be used to verify the customer's identification to meet regulatory requirements for the jurisdiction in which the centralized transaction system operates; the customer's transaction information also includes inventory information that may be used to access an account for storing an inventory of financial instruments;
the database is configured to verify the data stored in the data storage and delete the repeated data to generate a new data list; the data list comprises a database retrieval list and a database main table, wherein the database main table comprises a main identifier of each identified data block; generating, for each data block identified in the master table, a first value based on a master identification of the identified data block; generating a second value for each data block identified in the master table based on the master identification of the identified data block;
detecting through the database retrieval list, wherein the database retrieval list is constructed to mark the main identifier of the data block for the database main table, and when the identifiers of the main identifiers of the data blocks are consistent, determining that a certain transaction data in the data table is duplicated, and deleting the transaction information; generating the first value of the respective data block includes: summing primary identities of the data blocks associated with the respective data blocks; generating the second value for the corresponding data block includes: squaring a primary identification of the data block associated with the corresponding data block; and summing the squared original identifications; ensuring that interference items in a data main table can be filtered through the cooperation between the first value and the second value, and relieving the difficulty of searching the data main table;
The policing device includes an authorization engine, a token configuration engine, and a token manipulation engine, the authorization engine configured to perform interactions of data with a third party service provider and with a third party service provider; the token configuration engine is configured to perform processes associated with generating, programming, and deploying access objects or tokens, and to identify, verify, and access the third party service provider's identity for the purpose of authorizing collective economic financial data; the token manipulation engine is configured to perform processes related to identifying and verifying third party tokens and to determine collective economic data authorized for third party access carrying tokens.
2. A collective asset inventory system as claimed in claim 1, in which the token configuration engine is configured to configure tokens and the information contained in the tokens cannot be downloaded by any user, and the configured token security credentials are configured as biometric or other physical features provided by a plurality of banking systems or third party service providers to access authorised data or rights to access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010686753.8A CN111898886B (en) | 2020-07-16 | 2020-07-16 | Collective asset production and nuclear resource clearing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010686753.8A CN111898886B (en) | 2020-07-16 | 2020-07-16 | Collective asset production and nuclear resource clearing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111898886A CN111898886A (en) | 2020-11-06 |
CN111898886B true CN111898886B (en) | 2023-11-21 |
Family
ID=73191056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010686753.8A Active CN111898886B (en) | 2020-07-16 | 2020-07-16 | Collective asset production and nuclear resource clearing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111898886B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220092601A1 (en) * | 2020-09-22 | 2022-03-24 | Jpmorgan Chase Bank, N.A. | System and method for addressing spear phishing with real-time database implementation |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001063531A1 (en) * | 2000-02-25 | 2001-08-30 | Ipass, Inc. | Method and system to broker a service access transaction |
GB201212703D0 (en) * | 2012-07-17 | 2012-08-29 | Tromp Ag | Transactional account repository |
WO2015049515A1 (en) * | 2013-10-01 | 2015-04-09 | Planixs Grp Limited | Improvements relating to distributed resource management in real-time systems |
CA2991308A1 (en) * | 2015-07-09 | 2017-01-12 | Liquid Markets Group Inc. | Systems and methods for trading, clearing and settling securities transactions using blockchain technology |
WO2019045900A1 (en) * | 2017-08-31 | 2019-03-07 | Flexfunds Etp, Llc | System for issuing and managing exchange traded products as financial instruments and balancing the investment |
CA2981581A1 (en) * | 2017-10-05 | 2019-04-05 | The Toronto-Dominion Bank | Real-time generation and provisioning of contextual notification data to network-connected devices |
US10387808B1 (en) * | 2017-09-08 | 2019-08-20 | Aviation Aero Tix, Llc | System and method for the collection, display, and reporting of uplift data |
WO2020087136A1 (en) * | 2018-11-02 | 2020-05-07 | Australian Bond Exchange Holdings Limited | System and computer implemented method for facilitating the transaction and settlement of a financial instrument |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7295989B2 (en) * | 2000-04-28 | 2007-11-13 | Alan Rudnick | Method and system for providing direct and indirect sales channels for goods or services from a single point of purchase |
GB2367411C (en) * | 2000-07-10 | 2007-12-12 | Garry Harold Gibson | Pyment system |
US7603296B2 (en) * | 2002-10-22 | 2009-10-13 | PPI Technology Services, LP | Method for monitoring well equipment during transport and storage |
GB2445764A (en) * | 2007-01-22 | 2008-07-23 | Surfcontrol Plc | Resource access filtering system and database structure for use therewith |
US10129211B2 (en) * | 2011-09-15 | 2018-11-13 | Stephan HEATH | Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms |
US10055727B2 (en) * | 2012-11-05 | 2018-08-21 | Mfoundry, Inc. | Cloud-based systems and methods for providing consumer financial data |
EP3860083A1 (en) * | 2013-08-23 | 2021-08-04 | IDEMIA Identity & Security USA LLC | System and method for identity management |
US10942251B2 (en) * | 2014-09-03 | 2021-03-09 | CloudLeaf, Inc. | Asset location and management system with distributed processing |
-
2020
- 2020-07-16 CN CN202010686753.8A patent/CN111898886B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001063531A1 (en) * | 2000-02-25 | 2001-08-30 | Ipass, Inc. | Method and system to broker a service access transaction |
GB201212703D0 (en) * | 2012-07-17 | 2012-08-29 | Tromp Ag | Transactional account repository |
WO2015049515A1 (en) * | 2013-10-01 | 2015-04-09 | Planixs Grp Limited | Improvements relating to distributed resource management in real-time systems |
CA2991308A1 (en) * | 2015-07-09 | 2017-01-12 | Liquid Markets Group Inc. | Systems and methods for trading, clearing and settling securities transactions using blockchain technology |
WO2019045900A1 (en) * | 2017-08-31 | 2019-03-07 | Flexfunds Etp, Llc | System for issuing and managing exchange traded products as financial instruments and balancing the investment |
US10387808B1 (en) * | 2017-09-08 | 2019-08-20 | Aviation Aero Tix, Llc | System and method for the collection, display, and reporting of uplift data |
CA2981581A1 (en) * | 2017-10-05 | 2019-04-05 | The Toronto-Dominion Bank | Real-time generation and provisioning of contextual notification data to network-connected devices |
WO2020087136A1 (en) * | 2018-11-02 | 2020-05-07 | Australian Bond Exchange Holdings Limited | System and computer implemented method for facilitating the transaction and settlement of a financial instrument |
Non-Patent Citations (1)
Title |
---|
网上证券交易系统安全机制的研究;陈静;马丽;;信息安全与通信保密(06);45-48 * |
Also Published As
Publication number | Publication date |
---|---|
CN111898886A (en) | 2020-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11783323B1 (en) | Autonomous devices | |
US20220277307A1 (en) | Systems and methods for personal identification and verification | |
US11695755B2 (en) | Identity proofing and portability on blockchain | |
US11763305B1 (en) | Distributed ledger for device management | |
US10999268B2 (en) | System and method for electronic credentials | |
JP5207736B2 (en) | Network security and fraud detection system and method | |
US20180240107A1 (en) | Systems and methods for personal identification and verification | |
JP3228339U (en) | Personal authentication and verification system and method | |
AU2018341458A2 (en) | Method, apparatus, and computer-readable medium for compliance aware tokenization and control of asset value | |
US20140223578A1 (en) | Secure data delivery system | |
CN110226165A (en) | Pass through updatable data structure detection electronic penetration person | |
WO2019079708A1 (en) | Enhanced system and method for identity evaluation using a global score value | |
WO2018075314A1 (en) | Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score | |
US20160217437A1 (en) | Method for generating intangible bit money managed as data and system for providing services relevant to same | |
CN109791660A (en) | Data protection system and method | |
KR20030019466A (en) | Method and system of securely collecting, storing, and transmitting information | |
KR102190192B1 (en) | Method, system and application for providing open authentication intermediary service on open banking environment | |
RU2577472C2 (en) | Authentication framework extension for verification of identification information | |
US20180375847A1 (en) | Stored value user identification system using blockchain or math-based function | |
KR102492195B1 (en) | Deposit and withdrawal management apparatus of Virtual assest Market capable of agent for authorization | |
US10867326B2 (en) | Reputation system and method | |
CN111898886B (en) | Collective asset production and nuclear resource clearing system | |
JP7324941B2 (en) | Financial transaction system and method | |
CN116611041A (en) | Intelligent contract-based authority processing method and related device | |
KR101309835B1 (en) | A system for total financial transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |