CN113538147A - Stock right detail data generation method and device and electronic equipment - Google Patents

Stock right detail data generation method and device and electronic equipment Download PDF

Info

Publication number
CN113538147A
CN113538147A CN202110849722.4A CN202110849722A CN113538147A CN 113538147 A CN113538147 A CN 113538147A CN 202110849722 A CN202110849722 A CN 202110849722A CN 113538147 A CN113538147 A CN 113538147A
Authority
CN
China
Prior art keywords
result
investment
penetration
target
target enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110849722.4A
Other languages
Chinese (zh)
Other versions
CN113538147B (en
Inventor
刘浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jindi Credit Service Co ltd
Original Assignee
Beijing Jindi Credit Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jindi Credit Service Co ltd filed Critical Beijing Jindi Credit Service Co ltd
Priority to CN202110849722.4A priority Critical patent/CN113538147B/en
Publication of CN113538147A publication Critical patent/CN113538147A/en
Application granted granted Critical
Publication of CN113538147B publication Critical patent/CN113538147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Technology Law (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the disclosure provides a method and a device for generating rights detail data and electronic equipment. The method comprises the following steps: carrying out shareholder penetration processing on a target enterprise to obtain a first penetration result; verifying the first penetration result to obtain a first verification result; and generating the stock right detail data of the target enterprise according to the first penetration result and the first verification result. By adopting the technical scheme, the accuracy of the stock right detail data of the target enterprise can be ensured. In addition, the whole method for generating the stock right detail data can be used without excessive manual participation, so that the labor and the time can be effectively saved.

Description

Stock right detail data generation method and device and electronic equipment
Technical Field
The present disclosure relates to the field of information processing technologies, and in particular, to a method and an apparatus for generating rights detail data, and an electronic device.
Background
In some cases, the enterprise needs to disclose its own details of the equity, for example, in cases where the enterprise needs to go to market, the enterprise needs to disclose its details of the equity to a witness. Generally speaking, the details of the equity of the enterprise need to employ a large number of lawyers for collection and arrangement, which is very labor and time consuming and difficult to guarantee.
Disclosure of Invention
The invention aims to provide a method and a device for generating stock right detail data and electronic equipment, and further solves the problems that collection and arrangement of the stock right detail conditions of an enterprise consume manpower and time, and accuracy is difficult to guarantee at least to a certain extent.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to a first aspect of the present disclosure, there is provided a method of generating rights detail data, comprising:
carrying out shareholder penetration processing on a target enterprise to obtain a first penetration result;
verifying the first penetration result to obtain a first verification result;
and generating the stock right detail data of the target enterprise according to the first penetration result and the first verification result.
In an exemplary embodiment of the present disclosure, the first penetration result includes: k shareholder information sets of levels, wherein K is an integer greater than or equal to 1, and each shareholder information set comprises: the target enterprise comprises an object having a preset shareholder association relation with the target enterprise, and investment situation data corresponding to the object having the preset shareholder association relation with the target enterprise.
In an exemplary embodiment of the present disclosure,
the shareholder information set of level 1 includes: an object as an investor of the target enterprise, and investment situation data for the target enterprise as an investor of the target enterprise;
the shareholder information set of the (i + 1) th level comprises: the method comprises the steps that an object group corresponding to a first target object and investment situation data of objects in the object group corresponding to the first target object aiming at the first target object are obtained;
the first target object is an object of which the object type is a specified type in the shareholder information set of the ith hierarchy, and the object group corresponding to the first target object comprises an object of the shareholder serving as the first target object.
In an exemplary embodiment of the present disclosure,
the shareholder information set of the level 1 comprises: the number of the objects with the corresponding investment situation data in the shareholder information set of the level 1 in the N objects is M, N is an integer greater than or equal to 1, and M is an integer less than or equal to N;
the verifying the first penetration result to obtain a first verification result includes:
comparing M with N to obtain a first comparison result;
judging whether share proportion exists in M investment condition data corresponding to M objects with corresponding investment condition data in the shareholder information set of the level 1 in the N objects to obtain a first judgment result;
obtaining a first checking result according to the first comparison result and/or the first judgment result;
and/or the presence of a gas in the gas,
the object group corresponding to the first target object comprises: p objects, wherein the number of the objects with corresponding investment situation data in the shareholder information set at the i +1 th level is Q, P is an integer greater than or equal to 1, and Q is an integer less than or equal to P;
the verifying the first penetration result to obtain a first verification result includes:
comparing P with Q to obtain a second comparison result;
judging whether share proportion exists in Q investment condition data corresponding to Q objects with corresponding investment condition data in the shareholder information set of the (i + 1) th level in the P objects to obtain a second judgment result;
and acquiring a first checking result according to the second comparison result and/or the second judgment result.
In an exemplary embodiment of the present disclosure, the obtaining a first verification result according to the first comparison result and/or the first determination result includes:
obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first comparison result representation M is smaller than N;
determining a first sum of the M share proportions in the M investment situation data when the first comparison result represents that M is equal to N and the first judgment result represents that the share proportions exist in the M investment situation data;
obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first sum value is equal to a preset value; otherwise, obtaining a first verification result used for representing that the verification of the first penetration result fails.
In an exemplary embodiment of the present disclosure, the generating of the right-to-stock detail data of the target enterprise according to the first penetration result and the first verification result includes:
under the condition that a first verification result used for representing that the verification of the first penetration result passes is obtained, generating the share detail data of the target enterprise according to the first penetration result;
acquiring the registered capital of the target enterprise under the condition that a first verification result for representing that the verification on the first penetration result is not passed is obtained, and the investment amount exists in the M pieces of investment situation data;
calculating M share proportions corresponding to the M objects according to the registered capital and M investment money in the M investment situation data, and determining a second sum of the calculated M share proportions;
updating the M share proportions in the M investment situation data to the calculated M share proportions to obtain the corrected first penetration result under the condition that the second sum value is equal to the preset value;
and generating the stock right detail data of the target enterprise according to the corrected first penetration result.
In an exemplary embodiment of the present disclosure, each shareholder information set further includes: hierarchical label information for objects in the shareholder information collection.
In an exemplary embodiment of the present disclosure, in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object includes: the object exists in the object that has been penetrated.
In an exemplary embodiment of the present disclosure, in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object includes: the object type of the object is a non-specified type.
In an exemplary embodiment of the present disclosure, the method further comprises:
carrying out external investment penetration treatment on the target enterprise to obtain a second penetration result;
verifying the second penetration result to obtain a second verification result;
generating the share detail data of the target enterprise according to the first penetration result and the first verification result, wherein the generating comprises:
and generating the stock right detail data of the target enterprise according to the first penetration result, the first verification result, the second penetration result and the second verification result.
In an exemplary embodiment of the present disclosure, the second penetration result includes: r levels of investment information sets, wherein R is an integer greater than or equal to 1, and each investment information set comprises: the target enterprise is provided with an object with a preset investment incidence relation, and the investment situation data corresponding to the object with the preset investment incidence relation.
In an exemplary embodiment of the present disclosure,
the investment information set of level 1 includes: the object invested by the target enterprise and the investment situation data of the target enterprise aiming at the object invested by the target enterprise;
the investment information set of the j +1 th level comprises: the target group corresponding to a second target object and the investment situation data of the second target object aiming at the objects in the target group corresponding to the second target object;
wherein j is an integer greater than or equal to 1 and less than or equal to R-1, the second target object is an object having an external investment in the j-th level investment information set, and the object group corresponding to the second target object includes an object invested by the second target object.
In an exemplary embodiment of the present disclosure, each investment information set further includes: hierarchical label information for objects in the investment information set.
In an exemplary embodiment of the present disclosure, in the process of conducting the outsourced investment penetration processing on the target enterprise, the penetration stop condition of any object includes: the subject does not have an outinvestment.
According to a second aspect of the present disclosure, there is provided an equity detail data generating apparatus comprising:
the first penetration processing module is used for carrying out stockholder penetration processing on the target enterprise to obtain a first penetration result;
the first checking module is used for checking the first penetration result to obtain a first checking result;
and the generating module is used for generating the share detail data of the target enterprise according to the first penetration result and the first verification result.
In an exemplary embodiment of the present disclosure, the first penetration result includes: k shareholder information sets of levels, wherein K is an integer greater than or equal to 1, and each shareholder information set comprises: the target enterprise comprises an object having a preset shareholder association relation with the target enterprise, and investment situation data corresponding to the object having the preset shareholder association relation with the target enterprise.
In an exemplary embodiment of the present disclosure,
the shareholder information set of level 1 includes: an object as an investor of the target enterprise, and investment situation data for the target enterprise as an investor of the target enterprise;
the shareholder information set of the (i + 1) th level comprises: the method comprises the steps that an object group corresponding to a first target object and investment situation data of objects in the object group corresponding to the first target object aiming at the first target object are obtained;
the first target object is an object of which the object type is a specified type in the shareholder information set of the ith hierarchy, and the object group corresponding to the first target object comprises an object of the shareholder serving as the first target object.
In an exemplary embodiment of the present disclosure,
the shareholder information set of the level 1 comprises: the number of the objects with the corresponding investment situation data in the shareholder information set of the level 1 in the N objects is M, N is an integer greater than or equal to 1, and M is an integer less than or equal to N;
the first verification module includes:
the first obtaining submodule is used for comparing M with N to obtain a first comparison result;
a second obtaining submodule, configured to determine whether share occupation proportions exist in M investment condition data corresponding to M objects having corresponding investment condition data in the shareholder information set at the level 1 among the N objects, so as to obtain a first determination result;
the third obtaining submodule is used for obtaining a first checking result according to the first comparison result and/or the first judgment result;
and/or the presence of a gas in the gas,
the object group corresponding to the first target object comprises: p objects, wherein the number of the objects with corresponding investment situation data in the shareholder information set at the i +1 th level is Q, P is an integer greater than or equal to 1, and Q is an integer less than or equal to P;
the first verification module includes:
the fourth obtaining submodule is used for comparing the P and the Q to obtain a second comparison result;
a fifth obtaining sub-module, configured to determine whether share proportions exist in Q investment condition data corresponding to Q objects having corresponding investment condition data in the shareholder information set at the i +1 th level among the P objects, so as to obtain a second determination result;
and the sixth obtaining submodule is used for obtaining a first checking result according to the second comparison result and/or the second judgment result.
In an exemplary embodiment of the present disclosure, the third obtaining sub-module includes:
the first obtaining unit is used for obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first comparison result representation M is smaller than N;
the determining unit is used for determining a first sum of the M share proportions in the M investment situation data under the condition that the first comparison result represents that M is equal to N and the first judgment result represents that the share proportions exist in the M investment situation data;
the second obtaining unit is used for obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first sum value is equal to a preset value; otherwise, obtaining a first verification result used for representing that the verification of the first penetration result fails.
In an exemplary embodiment of the present disclosure, the generating module includes:
the first generation submodule is used for generating the stock right detail data of the target enterprise according to the first penetration result under the condition that the first verification result used for representing that the verification of the first penetration result passes is obtained;
a seventh obtaining sub-module, configured to obtain the registered capital of the target enterprise if a first verification result for indicating that the verification on the first penetration result fails is obtained, and if there is an investment amount in each of the M pieces of investment situation data;
the processing submodule is used for calculating M stock occupation ratios corresponding to the M objects according to the registered capital and the M investment money in the M investment situation data, and determining a second sum of the calculated M stock occupation ratios;
an eighth obtaining sub-module, configured to, when the second sum is equal to the preset value, update M share proportions of the M investment situation data to the calculated M share proportions, so as to obtain the corrected first penetration result;
and the second generation submodule is used for generating the stock right detail data of the target enterprise according to the corrected first penetration result.
In an exemplary embodiment of the present disclosure, each shareholder information set further includes: hierarchical label information for objects in the shareholder information collection.
In an exemplary embodiment of the present disclosure, in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object includes: the object exists in the object that has been penetrated.
In an exemplary embodiment of the present disclosure, in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object includes: the object type of the object is a non-specified type.
In an exemplary embodiment of the present disclosure, the apparatus further includes:
the second penetration processing module is used for carrying out external investment penetration processing on the target enterprise to obtain a second penetration result;
the second checking module is used for checking the second penetration result to obtain a second checking result;
the generation module is specifically configured to:
and generating the stock right detail data of the target enterprise according to the first penetration result, the first verification result, the second penetration result and the second verification result.
In an exemplary embodiment of the present disclosure, the second penetration result includes: r levels of investment information sets, wherein R is an integer greater than or equal to 1, and each investment information set comprises: the target enterprise is provided with an object with a preset investment incidence relation, and the investment situation data corresponding to the object with the preset investment incidence relation.
In an exemplary embodiment of the present disclosure,
the investment information set of level 1 includes: the object invested by the target enterprise and the investment situation data of the target enterprise aiming at the object invested by the target enterprise;
the investment information set of the j +1 th level comprises: the target group corresponding to a second target object and the investment situation data of the second target object aiming at the objects in the target group corresponding to the second target object;
wherein j is an integer greater than or equal to 1 and less than or equal to R-1, the second target object is an object having an external investment in the j-th level investment information set, and the object group corresponding to the second target object includes an object invested by the second target object.
In an exemplary embodiment of the present disclosure, each investment information set further includes: hierarchical label information for objects in the investment information set.
In an exemplary embodiment of the present disclosure, in the process of conducting the outsourced investment penetration processing on the target enterprise, the penetration stop condition of any object includes: the subject does not have an outinvestment.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the above-described method of rights detail data generation via execution of the executable instructions.
According to a fourth aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described stock right detail data generation method.
According to a fifth aspect of the present disclosure, there is provided a computer program comprising computer readable code which, when run on a device, a processor in the device executes instructions of the steps of the above-mentioned method of generating rights detail data.
As can be seen from the foregoing technical solutions, the method, the apparatus, the electronic device, the computer-readable storage medium, and the computer program for generating rights detail data in the exemplary embodiments of the present disclosure have at least the following advantages and positive effects:
in the method for generating the share detail data in the embodiment of the disclosure, for the requirement of disclosing the share detail condition of the target enterprise, shareholder penetration processing can be automatically performed on the target enterprise to obtain a first penetration result, the first penetration result is verified to obtain a first verification result, and then the share detail data of the target enterprise can be generated by combining the first penetration result and the first verification result. The data according to which the target enterprise's share detail data is generated comprises the first penetration result, the share detail data of the target enterprise can reflect the controlled share condition of the target enterprise, and the data according to which the target enterprise's share detail data is generated also comprises the first verification result, so that the accuracy of the controlled share condition of the target enterprise, which is reflected by the share detail data of the target enterprise, can be ensured by taking effective measures with reference to the first verification result, thereby ensuring the accuracy of the share detail data of the target enterprise. In addition, the whole method for generating the stock right detail data can be used without excessive manual participation, so that the labor and the time can be effectively saved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
FIG. 1 is a schematic diagram of an exemplary system architecture to which embodiments of the present disclosure may be applied;
FIG. 2 is a flow chart of a method of generating equity detail data in an exemplary embodiment of the disclosure;
FIG. 3 is a diagram illustrating equity detail data displayed in graph form in an exemplary embodiment of the present disclosure;
FIG. 4 is another flow chart of a method of generating equity detail data in an exemplary embodiment of the present disclosure;
FIG. 5 is yet another flowchart of the equity detail data generation method in an exemplary embodiment of the present disclosure;
FIG. 6 is yet another flow chart of a method of generating equity detail data in an exemplary embodiment of the present disclosure;
FIG. 7 is yet another flow chart of a method of generating equity detail data in an exemplary embodiment of the present disclosure;
fig. 8 is a block diagram of an equity detail data generating apparatus in an exemplary embodiment of the present disclosure;
fig. 9 is another block diagram of the equity detail data generating apparatus in the exemplary embodiment of the present disclosure;
fig. 10 is a block diagram of an electronic device in an exemplary embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, apparatus, steps, etc. In other instances, well-known structures, methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the disclosure.
Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present disclosure, "a plurality" means at least two, e.g., two, three, etc., unless explicitly specifically limited otherwise. The symbol "/" generally indicates that the former and latter associated objects are in an "or" relationship.
In the present disclosure, unless otherwise expressly specified or limited, the terms "connected" and the like are to be construed broadly, e.g., as meaning electrically connected or in communication with each other; may be directly connected or indirectly connected through an intermediate. The specific meaning of the above terms in the present disclosure can be understood by those of ordinary skill in the art as appropriate.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may be various electronic devices having display screens including, but not limited to, smart phones, tablets, portable and desktop computers, digital cinema projectors, and the like.
The server 105 may be a server that provides various services. For example, a user sends an equity detail data generation request carrying a business identifier (e.g., a business name) of a target business to the server 105 by using the terminal device 103 (which may also be the terminal device 101 or 102), and the server 105 may generate equity detail data of the target business in response to the equity detail data generation request, and control the terminal device 103 to display the equity detail data in a visual manner, so as to present the equity detail data to the user.
Referring to fig. 2, a flow chart of a method for generating rights detail data according to an exemplary embodiment of the present disclosure is provided. The method shown in fig. 2 may include step 201, step 202 and step 203, which are described separately below.
Step 201, performing shareholder penetration processing on the target enterprise to obtain a first penetration result.
Here, the target enterprise may be any enterprise that needs to disclose its own details of equity, and the "target" in the target enterprise does not constitute any limitation on the target enterprise.
In one embodiment, the first penetration result comprises: k shareholder information sets of levels, wherein K is an integer greater than or equal to 1, and each shareholder information set comprises: the target enterprise and the target enterprise are related to the investment situation data, and the target enterprise have preset shareholder association relation objects.
Here, K may be 1, 2, 3, 4, or an integer greater than 4, which is not listed here.
Optionally, the shareholder information set of level 1 includes: the target enterprise investment data comprises an object of a shareholder of the target enterprise and investment situation data of the object of the shareholder of the target enterprise aiming at the target enterprise;
the shareholder information set of the (i + 1) th level comprises: the investment situation data of the objects in the object group corresponding to the first target object aiming at the first target object;
the I is an integer which is greater than or equal to 1 and less than or equal to K-1, the first target object is an object of which the object type is a specified type in the shareholder information set of the ith level, and the object group corresponding to the first target object comprises an object of the shareholder serving as the first target object.
Here, the object of the shareholder of the target enterprise and the object in the object group corresponding to the first target object may be regarded as objects having a preset shareholder association with the target enterprise, the investment situation data of the object of the shareholder of the target enterprise with respect to the target enterprise may be regarded as investment situation data corresponding to the object of the shareholder of the target enterprise, and the investment situation data of the object in the object group corresponding to the first target object with respect to the first target object may be regarded as investment situation data corresponding to the object in the object group corresponding to the first target object.
Here, the specified type may include an object type other than a person type, a preset enterprise type, and a preset organization type, the preset enterprise type may be a listed enterprise type, and the preset organization type may be a state commission type.
It should be noted that a first database may be preset, where the first database may store shareholder data tables corresponding to a plurality of enterprises, and the shareholder data table corresponding to any enterprise includes, but is not limited to, names of objects serving as shareholders of the enterprise, object types of the objects, investment situation data of the objects for the enterprise, and the like; the object type includes but is not limited to a personnel type, a state resource committee type, a listed enterprise type, a non-listed enterprise type and the like, and the investment situation data includes but is not limited to investment amount (which may also be called subscription amount), share proportion and the like.
In the embodiment of the disclosure, the shareholder data table corresponding to the target enterprise can be searched in the first database, and by looking up the information recorded in the shareholder data table corresponding to the target enterprise, each object as the shareholder of the target enterprise and the investment condition data of each object as the shareholder of the target enterprise for the target enterprise can be determined, so that the shareholder information set of the level 1 can be generated accordingly.
Next, by continuing to refer to the information described in the shareholder data table corresponding to the target enterprise, it can be determined whether an object of which the object type is a specified type exists in the shareholder information set of level 1. If the judgment result shows that the first target object exists, the object with the object type being the designated type in the shareholder information set of the level 1 may be taken as the first target object, the first target object may be specifically an enterprise other than a listed company and national funding committee, then the shareholder data table corresponding to the first target object may be searched in the first database, and by referring to the information recorded in the shareholder data table corresponding to the first target object, each object of the shareholder serving as the first target object and investment condition data of each object of the shareholder serving as the first target object for the first target object may be determined, so as to generate an object group corresponding to the first target object accordingly, and further generate the shareholder information set of the level 2. It should be noted that the number of the first target objects in the shareholder information set at the level 1 may be 1 or at least 2, and correspondingly, the number of the object groups in the shareholder information set at the level 2 may be 1 or at least 2.
In a specific example, the target enterprise is X, and by referring to information recorded in the stockholder data table corresponding to X, it is determined that X has 3 stockholders, which are A, B, C respectively, a is a non-listed enterprise, B is a natural person, C is a listed enterprise, a has an investment amount of 10 ten thousand for X, a has an account proportion of 20% for X, B has an investment amount of 20 ten thousand for X, B has an account proportion of 40% for X, C has an investment amount of 20 ten thousand for X, and C has an account proportion of 40% for X, then the stockholder information set at level 1 may be represented as follows: 1-A-10-20% of non-marketing enterprises, 2-B-20-40% of natural persons and 3-C-20-40% of marketing enterprises.
Since A, B, C, A is a non-public business, B is a natural person, C is a public business, and only the object type of A is a designated type, only A can be a first target object. Assuming that, by referring to the shareholder data table corresponding to a, it is determined that a has 2 shareholders, which are D, E respectively, D is a non-listed enterprise, E is a natural person, D has an investment amount of 90 ten thousand for a, D has a share proportion of 90% for a, E has an investment amount of 10 ten thousand for a, and E has a share proportion of 10% for a, the shareholder information set at level 2 may be represented as follows: 1-D-90-90% of non-marketed enterprises and 2-E-10-10% of natural persons.
It should be noted that, referring to the manner of obtaining the shareholder information set at the level 2 from the shareholder information set at the level 1, the shareholder information set at the level 3 can be obtained from the shareholder information set at the level 2, and so on, so that shareholder information sets at K levels can be obtained, and the shareholder information sets at K levels can constitute the first penetration result.
It should be noted that, although the case that K is greater than 1 is specifically described above, it is understood that K may also be 1, and in this case, only one shareholder information set exists in the first penetration result, and the shareholder information set may include: an object that is an investor of the target business, and investment data for the target business that is an object of the target business's investor.
In the embodiment, when the stockholder penetration processing is carried out on the target enterprise, a plurality of levels of penetration can be carried out, so that the integrity of the first penetration result can be better ensured.
It should be noted that the shareholder data table in the first database may also include only general object types (which may be specifically in a shareholder _ type field), for example, only person types and enterprise types, but may also store two MYSQL (which is a relational database management system) tables in the first database, where one MYSQL table is used for recording the country committee and the government and the other MYSQL table is used for recording the enterprises to market, and thus, by referring to the two MYSQL tables and combining the shareholder _ type field, it may be determined whether the object type of any object is the specified type.
Step 202, the first penetration result is verified to obtain a first verification result.
In step 202, the first penetration result may be checked according to the correctness and/or integrity of the first penetration result to generate a first check result for characterizing whether the check on the first penetration result passes or not.
And step 203, generating the share detail data of the target enterprise according to the first penetration result and the first verification result.
In step 203, in the case that the first verification result represents that the verification of the first penetration result passes, generating the right details data including the first penetration result as the right details data of the target enterprise, and in the case that the first verification result represents that the verification of the first penetration result does not pass, modifying the first penetration result to generate the right details data including the modified first penetration result as the right details data of the target enterprise.
After generating the rights detail data of the target enterprise, the rights detail data of the target enterprise can be visually displayed, for example, the rights detail data of the target enterprise is displayed in a word text form, a table form, a map form (for example, the map form shown in fig. 3) and the like, so that the attractiveness and the comprehensibility of the rights detail data of the target enterprise are ensured.
In the method for generating the share detail data in the embodiment of the disclosure, for the requirement of disclosing the share detail condition of the target enterprise, shareholder penetration processing can be automatically performed on the target enterprise to obtain a first penetration result, the first penetration result is verified to obtain a first verification result, and then the share detail data of the target enterprise can be generated by combining the first penetration result and the first verification result. The data according to which the target enterprise's share detail data is generated comprises the first penetration result, the share detail data of the target enterprise can reflect the controlled share condition of the target enterprise, and the data according to which the target enterprise's share detail data is generated also comprises the first verification result, so that the accuracy of the controlled share condition of the target enterprise, which is reflected by the share detail data of the target enterprise, can be ensured by taking effective measures with reference to the first verification result, thereby ensuring the accuracy of the share detail data of the target enterprise. In addition, the whole method for generating the stock right detail data can be used without excessive manual participation, so that the labor and the time can be effectively saved.
In an alternative example, the shareholder information set at level 1 includes: the number of the objects corresponding to the investment situation data in the shareholder information set of the level 1 in the N objects is M, N is an integer greater than or equal to 1, and M is an integer less than or equal to N;
based on the embodiment shown in fig. 2, as shown in fig. 4, step 202 includes:
step 2021, comparing M with N to obtain a first comparison result;
step 2022, determining whether share proportion exists in M investment condition data corresponding to M objects having corresponding investment condition data in the shareholder information set of the level 1 among the N objects to obtain a first determination result;
step 2023, obtaining a first verification result according to the first comparison result and/or the first judgment result.
Here, N may be 1, 2, 3, 4, or an integer greater than 4; there may be a one-to-one correspondence between the M objects and the M investment situation data.
In the embodiment of the disclosure, the size of M and the size of N may be compared to obtain a first comparison result, and in addition, the M pieces of investment condition data may be traversed to determine whether share occupation ratios exist in the M pieces of investment condition data to obtain a first determination result, so as to obtain a first verification result according to the first comparison result and/or the first determination result.
In a specific embodiment, obtaining the first verification result according to the first comparison result and/or the first determination result includes:
under the condition that the first comparison result representation M is smaller than N, obtaining a first verification result used for representing that the verification of the first penetration result passes;
determining a first sum of the M share proportions in the M investment situation data under the condition that the first comparison result represents that M is equal to N and the first judgment result represents that the share proportions exist in the M investment situation data;
under the condition that the first sum value is equal to a preset value, obtaining a first verification result used for representing that the verification of the first penetration result passes; otherwise, a first verification result used for representing that the verification of the first penetration result fails is obtained.
Here, the preset value may be 1, and certainly, the preset value may also be other values, and for convenience of understanding, the case where the preset value is 1 is taken as an example for description hereinafter.
If the first comparison result represents that M is smaller than N, it can be considered that the investment situation data in the first penetration result is not complete enough for the shareholder of the target enterprise, and at this time, the verification of the first penetration result can be directly determined to pass, and the first verification result used for representing the verification of the first penetration result to pass is obtained.
If the first comparison result represents that M is equal to N and the first determination result represents that the share proportion exists in all the M investment condition data, it can be considered that the investment condition data in the first penetration result is complete enough for the shareholder of the target enterprise, and at this time, the sum of the M share proportion in the M investment condition data can be determined, and the sum is the first sum. If the first sum is equal to 1, the M share ratios of the M investment situation data can be considered accurate, then a check pass for the first penetration result can be determined and a first check result characterizing the check pass for the first penetration result is obtained. If the first sum is not equal to 1, at least a portion of the M shares of the M investment profile data may be deemed inaccurate, then a determination may be made that the verification of the first penetration result failed and a first verification result may be obtained that characterizes the failure of the verification of the first penetration result.
In this embodiment, the verification of the first penetration result can be directly determined when the investment data in the first penetration result is not complete enough, so as to efficiently obtain the first verification result, and the share proportion calculation verification can be performed on the first penetration result when the investment data in the first penetration result is complete enough, so as to efficiently and reliably obtain the first verification result.
Of course, the embodiment of obtaining the first verification result according to the first comparison result and/or the first determination result is not limited to this, for example, when the first comparison result represents that M is smaller than N, it may be determined that the verification on the first penetration result does not pass, and a first verification result used for representing that the verification on the first penetration result does not pass is generated, and also when M is equal to N, it may be determined that the verification on the first penetration result passes, and a first verification result used for representing that the verification on the first penetration result passes is generated.
In the embodiment of the disclosure, the first comparison result and the first judgment result are combined, so that the first verification result can be efficiently and reliably acquired.
In an alternative example, the object group to which the first target object corresponds includes: p objects, wherein the number of the objects corresponding to the investment situation data in the shareholder information set at the i +1 th level in the P objects is Q, P is an integer greater than or equal to 1, and Q is an integer less than or equal to P;
based on the embodiment shown in fig. 2, as shown in fig. 5, step 202 includes:
step 2024, comparing P with Q to obtain a second comparison result;
step 2025, judging whether share proportion exists in Q investment situation data corresponding to Q objects having corresponding investment situation data in the shareholder information set of the i +1 th level in the P objects to obtain a second judgment result;
step 2026, obtaining a first verification result according to the second comparison result and/or the second judgment result.
Here, P may be 1, 2, 3, 4, or an integer greater than 4; there may be a one-to-one correspondence between the Q objects and the Q investment situation data.
It should be noted that the specific implementation process of steps 2024 to 2026 only needs to refer to the description of the specific implementation process of steps 2021 to 2023, and is not described herein again.
In the embodiment of the disclosure, the first verification result can be efficiently and reliably obtained by combining the second comparison result and the second judgment result.
On the basis of the embodiment shown in fig. 4, as shown in fig. 6, step 203 includes:
step 2031, under the condition that a first verification result used for representing that the verification of the first penetration result passes is obtained, generating the share detail data of the target enterprise according to the first penetration result;
step 2032, acquiring the registered capital of the target enterprise under the condition that a first verification result for representing that the verification of the first penetration result fails is obtained and the investment amount exists in all the M pieces of investment condition data;
step 2033, calculating M share proportions corresponding to the M objects according to the registered capital and M investment money amounts in the M investment situation data, and determining a second sum of the calculated M share proportions;
step 2034, updating the M share proportions in the M investment situation data to the calculated M share proportions to obtain a corrected first penetration result, if the second sum is equal to the preset value;
and step 2035, generating the share detail data of the target enterprise according to the corrected first penetration result.
Optionally, the first database may also store registered capital for each of the plurality of businesses.
If a first verification result for characterizing that the verification of the first penetration result passes is obtained, the equity detail data of the target enterprise may be generated according to the first penetration result, for example, the equity detail data including the first penetration result may be directly generated as the equity detail data of the target enterprise.
If a first check result for representing that the check on the first penetration result fails is obtained, whether the investment amount exists in the M pieces of investment situation data can be judged. If the judgment result is yes, the registered capital of the target enterprise can be obtained from the first database, and the M share proportions corresponding to the M objects are calculated according to the registered capital of the target enterprise and the M investment money amounts in the M investment situation data. Specifically, M investment amounts in the M investment situation data may be divided by the registered capital of the target enterprise to obtain M ratios, and the obtained M ratios may be used as the calculated M share proportions corresponding to the M objects. Then, the sum of the calculated M stock proportions, which is the second sum, may be determined. If the second sum is equal to 1, the calculated M share ratios may be deemed accurate, then the M share ratios of the M investment data may be updated to the calculated M share ratios to obtain a revised first penetration result, and generating right details data including the revised first penetration result as right details data of the target enterprise. If the second sum is not equal to 1, at least part of the calculated M share ratios may be considered inaccurate, and then the above step 201 may be performed, or a prompt message may be output to prompt the relevant person to deal with the situation.
In the embodiment of the disclosure, in the case that the account proportion calculation verification fails, the calculation of the account proportion may be performed again based on the registered capital stored in the first database, and in the case that the recalculated account proportion is accurate, the correction of the first penetration result may be performed based on the recalculated account proportion, thereby ensuring the accurate reliability of the finally generated share right detail data of the target enterprise.
In an alternative example, each shareholder information set further includes: hierarchical label information for objects in the shareholder information collection.
Here, the hierarchy label information of the object as the shareholder of the target enterprise may indicate the hierarchy at which the object is located, for example, indicate that the object is located at level 1; the hierarchical tag information of the object in the object group corresponding to the first target object may indicate not only the hierarchy where the object is located, but also which first target object the object group where the object is located specifically corresponds to.
In a specific example, if the target enterprise is 3 stockholders, "a certain united investment and stock control limited company", "a certain right investment limited partnership company", "a certain right investment limited company" in the stone river, and "a certain right investment limited partnership company" in the stone river, "2 stockholders," zheng a certain a "," zheng a certain B ", respectively, the first penetration result can be specifically shown in table 1 below:
serial number Partner/stakeholder name/name Proportion of the share Remarks for note
1 A certain joint investment and stock control company 38.24%
2 Limited partnerships for investment of certain rights in stone rivers 16.3%
2-1 Zheng somewhere A 99.0%
2-2 Zheng somewhere B 1.0%
3 Investment Limited for a certain rights in a particular river 16.0%
TABLE 1
For table 1 above, "1" may be used as the hierarchical label information of "some joint investment and stock control limited company", and since "1" is a single character and does not include a connection symbol "-", it may be considered that "some joint investment and stock control limited company" is located at the 1 st level and is the 1 st stockholder of the target enterprise; "2" can be used as the hierarchical label information of "limited partnering investment in certain rights in the river" because "2" is a single character and does not include a connection symbol "-", it can be considered that "limited partnering investment in certain rights in the river" is located at the 1 st level and is the 2 nd stockholder of the target enterprise, "3" can be used as the hierarchical label information of "limited partnering investment in certain rights in the river" because "3" is a single character and does not include a connection symbol "-", it can be considered that "limited investment in certain rights in the river" is located at the 1 st level and is the 3 rd stockholder of the target enterprise; "2-1" can be used as the hierarchical label information of "zheng somewhere a", since "2-1" includes "2" and "1" connected by the connection symbol "-", it can be considered that "zheng somewhere a" is located at the 2 nd level, "zheng somewhere a" specifically corresponds to "the limited partnering company of investment of certain rights in the rocky river" and is the 1 st stockholder of "the limited partnering company of investment of certain rights in the rocky river"; "2-2" can be used as the hierarchical label information of "zheng somewhere B", and since "2-2" includes "2" and "2" connected by the connection symbol "-", it can be considered that "zheng somewhere a" is located at the 2 nd level, and "zheng somewhere a" specifically corresponds to "the limited partnering investment company for certain rights of the river" and is the 2 nd stockholder of "the limited partnering investment company for certain rights of the river".
In the embodiment of the disclosure, the first penetration result may include hierarchical label information of the object, and the relationship between the objects in the first penetration result can be clearly presented through an indication function of the hierarchical label information.
In an optional example, in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object includes: the object exists in the object that has been penetrated.
Assuming that, in the process of performing shareholder penetration processing on X as a target enterprise, shareholder of X is found to include a, shareholder of a includes D, shareholder of D includes T, shareholder of T includes a, it is obvious that an object of a exists in the shareholder information set of the 1 st level and the shareholder information set of the 4 th level, which indicates that a exists in the penetrated object and that a loop stock exists in A, D, T, then a at the 4 th level satisfies a penetration stop condition, and at this time, penetration on a at the 4 th level is not required.
Assuming that, during the process of shareholder penetration processing on X as a target enterprise, the shareholder of X is found to include a, the shareholder of a includes D, and the shareholder of D includes X, it is obvious that X exists in the shareholder information set of the 3 rd level, which indicates that X exists in the object that has been penetrated, and X, A, D exists in the case of circulating share, then X at the 3 rd level satisfies the penetration stop condition, and at this time, penetration does not need to be performed on X at the 3 rd level.
In the embodiment of the disclosure, the situation of circular stock holding can be effectively identified, and for the situation, the penetration of the corresponding object can be finished, so that the first penetration result is more accurate and concise, and the redundancy of the first penetration result is avoided.
In an optional example, in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object includes: the object type of the object is a non-specified type.
In the embodiment of the present disclosure, the specified type may include an object type other than a person type, a preset enterprise type, and a preset organization type, and correspondingly, the unspecified type may include a person type, a preset enterprise type, and a preset organization type, where the preset enterprise type may be a listed enterprise type, and the preset organization type may be a state commission type. Therefore, when the stock right penetrating processing is carried out on the target enterprise, the stock right finally penetrates to natural people, listed enterprises or state resources, so that the integrity of the first penetrating result can be better ensured, and the first penetrating result can meet the actual requirement.
On the basis of the embodiment shown in fig. 2, as shown in fig. 7, the method further includes:
and step 211, performing outcoming investment penetration treatment on the target enterprise to obtain a second penetration result.
It should be noted that the outsource investment penetration process and the stockholder penetration process can be regarded as two processes in reverse, specifically, the stockholder penetration process is to find the sponsor under the condition that the sponsor is known, for example, to find the stockholder under the condition that the enterprise is known, and the outsource investment penetration process is to find the sponsor under the condition that the sponsor is known, for example, to find the enterprise under the condition that the stockholder is known.
In one embodiment, the second penetration result comprises: r levels of investment information sets, wherein R is an integer greater than or equal to 1, and each investment information set comprises: the target enterprise and the target enterprise are related to the investment situation data, and the target enterprise have preset investment incidence relations.
Here, R may be 1, 2, 3, 4, or an integer greater than 4, which is not listed here.
Optionally, the investment information set of level 1 includes: the target enterprise invested objects and the investment situation data of the target enterprise aiming at the self invested objects;
the investment information set of the j +1 th level comprises: the object group corresponding to the second target object and the investment situation data of the second target object aiming at the objects in the object group corresponding to the second target object;
wherein j is an integer which is greater than or equal to 1 and less than or equal to R-1, the second target object is an object having external investment in the j-th level investment information set, and the object group corresponding to the second target object comprises the object invested by the second target object.
Here, the object invested by the target enterprise and the object in the object group corresponding to the second target object may be regarded as the objects having the preset investment association relationship with the target enterprise, the investment situation data of the target enterprise with respect to the object invested by the target enterprise may be regarded as the investment situation data corresponding to the object invested by the target enterprise, and the investment situation data of the second target object with respect to the object in the object group corresponding to the second target object may be regarded as the investment situation data corresponding to the object in the object group corresponding to the second target object.
It should be noted that a second database may be preset, where the second database may store investment data tables corresponding to a plurality of enterprises, and the investment data table corresponding to any enterprise includes, but is not limited to, names of objects invested by the enterprise, investment condition data of the enterprise for the objects, and the like; the investment data includes, but is not limited to, investment amount, share proportion, etc.
In the embodiment of the disclosure, the investment data table corresponding to the target enterprise may be looked up in the second database, and by looking up the information recorded in the investment data table corresponding to the target enterprise, each object invested by the target enterprise and the investment situation data of each object invested by the target enterprise for itself may be determined, so as to generate the investment information set of level 1 accordingly.
Next, it may be determined whether an object having an external investment is present in the investment information set of level 1. If the judgment result shows that the target object exists, the target object with the target investment in the investment information set of the level 1 can be used as a second target object, an investment data table corresponding to the second target object is searched in a second database, each target object invested by the second target object can be determined by referring to information recorded in the investment data table corresponding to the second target object, so that an object group corresponding to the second target object is generated, and the investment condition data of the second target object for each target object in the object group corresponding to the second target object is further determined, so that the investment information set of the level 2 is generated. It should be noted that the number of the second target objects in the investment information set of level 1 may be 1 or at least 2, and correspondingly, the number of the object groups in the investment information set of level 2 may be 1 or at least 2.
In a specific example, the target enterprise is X, and by referring to information recorded in the investment data table corresponding to X, it is determined that X invests 2 objects, which are F, G respectively, X accounts for 30 ten thousand of investment money of F, X accounts for 100% of stock of F, X accounts for 15 ten thousand of investment money of G, and X accounts for 30% of stock of G, then the investment information set of level 1 may be represented as follows: 1-F-30-100% and 2-G-10-30%.
Assuming that only G of F and G has an external investment, only G can be a second target object. Assuming that only 1 object is invested by G, which is H, by referring to the investment data table corresponding to G, the investment amount of G for H is 20 ten thousand, and the share proportion of G for H is 20%, the investment information set of level 2 can be expressed as follows: 1-H-20-20%.
It should be noted that, referring to the manner of obtaining the investment information set of level 2 from the investment information set of level 1, the investment information set of level 3 can be obtained from the investment information set of level 2, and so on, so that the investment information sets of R levels can be obtained, and the investment information sets of R levels can constitute the second penetration result.
It should be noted that, the above specifically describes the case where R is greater than 1, it is understood that R may also be 1, and in this case, there is only one investment information set in the second penetration result, and the investment information set may include: the object invested by the target enterprise and the investment situation data of the target enterprise aiming at the object invested by the target enterprise.
In the embodiment, when the target enterprise is subjected to the outcoming investment penetration treatment, multiple levels of penetration can be performed, so that the integrity of the second penetration result can be better ensured.
In step 212, the second penetration result is verified to obtain a second verification result.
In step 212, the second penetration result may be verified according to the correctness and/or integrity of the second penetration result to generate a second verification result for characterizing whether the verification of the second penetration result passes.
In one embodiment, the level 1 investment information set includes: and if V is less than U, determining that the check on the second penetration result does not pass and generating a second check result for representing that the check on the second penetration result does not pass, and if V is equal to U, determining that the check on the second penetration result passes and generating a second check result for representing that the check on the second penetration result passes.
Of course, the embodiment of checking the second penetration result to obtain the second check result is not limited to this, for example, the checking process may include calculation and verification of an investment amount, specifically, if the investment amount in a certain investment information set exceeds a set investment amount, it may be considered that the investment amount in the investment information set is too high, and there is a high possibility of an abnormality, and at this time, a second check result for indicating that the check on the second penetration result is not passed may be generated.
It should be noted that steps 211 to 212 may be executed before steps 201 to 202, after steps 201 to 202, or simultaneously with steps 201 to 202.
Step 203, comprising:
step 2031, generating the right of stock details data of the target enterprise according to the first penetration result, the first verification result, the second penetration result and the second verification result.
In step 2031, in case that the first verification result represents that the verification of the first penetration result passes and the second verification result represents that the verification of the second penetration result passes, integrating the first penetration result and the second penetration result to generate the right details data including both the first penetration result and the second penetration result as the right details data of the target enterprise; and under the condition that the first verification result represents that the verification of the first penetration result does not pass and the second verification result represents that the verification of the second penetration result does not pass, respectively correcting the first penetration result and the second penetration result, and integrating the corrected first penetration result and the corrected second penetration result to generate the right details data which simultaneously comprise the corrected first penetration result and the corrected second penetration result and serve as the right details data of the target enterprise.
In the embodiment of the disclosure, because the data on which the right of stock details data of the target enterprise is generated includes the first penetration result and the second penetration result at the same time, the right of stock details data of the target enterprise can not only reflect the controlled stock condition of the target enterprise, but also reflect the external investment condition of the target enterprise, and the integrity of the right of stock details data of the target enterprise can be better ensured. Because the data on which the stock right detail data of the target enterprise is generated also comprises the first check result and the second check result, and the first check result and the second check result are referred, effective measures can be taken to ensure the accuracy and the reliability of the stock right detail data of the target enterprise.
In an optional example, each investment information set further comprises: hierarchical label information for objects in the investment information set.
Here, the hierarchical tag information of the object invested by the target enterprise may indicate the hierarchy in which the object is located, for example, indicate that the object is located at level 1; the hierarchical tag information of the object in the object group corresponding to the second target object may indicate not only the hierarchy where the object is located, but also which second target object the object group where the object is located specifically corresponds to. It should be noted that, the specific form of the hierarchy label information in the investment information set may refer to the form of the hierarchy label information in table 1 above, for example, for the case where X invests outwards F, G, and G invests outwards H, the hierarchy label information of F may be represented as "1", the hierarchy label information of G may be represented as "2", and the hierarchy label information of H may be represented as "2-1".
In the embodiment of the disclosure, the second penetration result may include hierarchical label information of the object, and the relationship between the objects in the second penetration result can be clearly presented through an indication function of the hierarchical label information.
In an alternative example, in the process of carrying out the outcoming investment penetration treatment on the target enterprise, the penetration stop condition of any object comprises the following steps: the subject does not have an outinvestment.
In the embodiment of the disclosure, when the target enterprise is subjected to the external investment penetration process, multiple levels of penetration may be performed, and finally the penetration is performed to the object without external investment, for example, the target enterprise pays 100% to the object 1, the object 1 pays 30% to the object 2, the object 2 pays 50% to the object 3, and the penetration to the object 3 is terminated if the object 3 has no external investment, so that the integrity of the second penetration result can be better ensured, and the second penetration result can meet the actual requirement.
It should be noted that the registered capital stored in the first database may also be utilized when the penetration of the external investment is performed. For example, if X invests F, X invests 30 ten thousand for F, and X shares a missing proportion for F by referring to the information recorded in the investment data table corresponding to X, the registered capital of F may be obtained from the first database, and the registered capital of F is divided by 30 to obtain a ratio, which may be used as the X shares a proportion for F. For another example, by referring to information described in the investment data table corresponding to X, it is determined that X invests G, but both the investment amount and the share proportion of X for G are missing, the registered capital of G can be obtained from the first database, and in addition, the investment amount and the share proportion of other objects invested in G for G can be obtained, the share proportion of X for G can be obtained by subtracting the share proportion of other objects for G from 1, and then, by multiplying the share proportion of X for G by the registered capital of G, a product can be obtained, and the product can be used as the investment amount of X for G.
In conclusion, by adopting the embodiment of the disclosure, the stock right detail data can be automatically generated, and excessive manpower is avoided, so that the money cost and the labor cost can be saved; by introducing the calculation verification of the share proportion, the cyclic share holding identification and the cyclic investment identification, the accuracy and the reliability of the detailed data of the right to stock can be effectively ensured; through the visual display of the stock right detail data, the stock right detail data can be conveniently understood, so that the user experience is improved.
Fig. 8 schematically shows a block diagram of an equity detail data generating apparatus according to an embodiment of the present disclosure. The apparatus for generating the copyright detail data provided by the embodiment of the present disclosure may be disposed on the terminal device, or may be disposed on the server, or may be partially disposed on the terminal device and partially disposed on the server, for example, may be disposed on the server 105 in fig. 1 (according to actual replacement), but the present disclosure is not limited thereto.
The device for generating the copyright detail data provided by the embodiment of the present disclosure may include a first penetration processing module 801, a first verification module 802, and a generation module 803.
A first penetration processing module 801, configured to perform shareholder penetration processing on a target enterprise to obtain a first penetration result;
a first checking module 802, configured to check the first penetration result to obtain a first checking result;
and the generating module 803 is configured to generate the share detail data of the target enterprise according to the first penetration result and the first verification result.
In an exemplary embodiment of the present disclosure, the first penetration result includes: k shareholder information sets of levels, wherein K is an integer greater than or equal to 1, and each shareholder information set comprises: the target enterprise and the target enterprise are related to the investment situation data, and the target enterprise have preset shareholder association relation objects.
In an exemplary embodiment of the present disclosure,
the shareholder information set of level 1 includes: the target enterprise investment data comprises an object of a shareholder of the target enterprise and investment situation data of the object of the shareholder of the target enterprise aiming at the target enterprise;
the shareholder information set of the (i + 1) th level comprises: the investment situation data of the objects in the object group corresponding to the first target object aiming at the first target object;
the I is an integer which is greater than or equal to 1 and less than or equal to K-1, the first target object is an object of which the object type is a specified type in the shareholder information set of the ith level, and the object group corresponding to the first target object comprises an object of the shareholder serving as the first target object.
In an exemplary embodiment of the present disclosure,
the shareholder information set of level 1 includes: the number of the objects corresponding to the investment situation data in the shareholder information set of the level 1 in the N objects is M, N is an integer greater than or equal to 1, and M is an integer less than or equal to N;
a first verification module 802, comprising:
the first obtaining submodule is used for comparing M with N to obtain a first comparison result;
the second obtaining submodule is used for judging whether share occupation proportions exist in M investment condition data corresponding to M objects with corresponding investment condition data in the shareholder information set of the level 1 in the N objects so as to obtain a first judgment result;
the third obtaining submodule is used for obtaining a first checking result according to the first comparison result and/or the first judgment result;
and/or the presence of a gas in the gas,
the object group corresponding to the first target object comprises: p objects, wherein the number of the objects corresponding to the investment situation data in the shareholder information set at the i +1 th level in the P objects is Q, P is an integer greater than or equal to 1, and Q is an integer less than or equal to P;
a first verification module 802, comprising:
the fourth obtaining submodule is used for comparing the P and the Q to obtain a second comparison result;
a fifth obtaining submodule, configured to determine whether share occupation proportions exist in Q investment condition data corresponding to Q objects having corresponding investment condition data in the shareholder information set at the i +1 th level among the P objects, so as to obtain a second determination result;
and the sixth obtaining submodule is used for obtaining the first checking result according to the second comparison result and/or the second judgment result.
In an exemplary embodiment of the present disclosure, the third obtaining sub-module includes:
the first obtaining unit is used for obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first comparison result representation M is smaller than N;
the determining unit is used for determining a first sum of M share proportions in the M pieces of investment situation data under the condition that the first comparison result represents that M is equal to N and the first judgment result represents that the share proportions exist in the M pieces of investment situation data;
the second obtaining unit is used for obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first sum value is equal to a preset value; otherwise, a first verification result used for representing that the verification of the first penetration result fails is obtained.
In an exemplary embodiment of the present disclosure, the generating module 803 includes:
the first generation submodule is used for generating the stock right detail data of the target enterprise according to the first penetration result under the condition that the first verification result used for representing that the verification of the first penetration result passes is obtained;
a seventh obtaining submodule, configured to obtain the registered capital of the target enterprise when a first verification result for indicating that the verification on the first penetration result fails is obtained, and the investment amount exists in all the M pieces of investment situation data;
the processing submodule is used for calculating M stock occupation ratios corresponding to the M objects according to the registered capital and M investment money in the M investment situation data, and determining a second sum of the calculated M stock occupation ratios;
an eighth obtaining submodule, configured to update M share proportions of the M investment situation data to the calculated M share proportions when the second sum is equal to the preset value, so as to obtain a corrected first penetration result;
and the second generation submodule is used for generating the stock right detail data of the target enterprise according to the corrected first penetration result.
In an exemplary embodiment of the present disclosure, each shareholder information set further includes: hierarchical label information for objects in the shareholder information collection.
In an exemplary embodiment of the present disclosure, in the process of performing shareholder penetration processing on a target enterprise, the penetration stop condition for any object includes: the object exists in the object that has been penetrated.
In an exemplary embodiment of the present disclosure, in the process of performing shareholder penetration processing on a target enterprise, the penetration stop condition for any object includes: the object type of the object is a non-specified type.
In an exemplary embodiment of the present disclosure, as shown in fig. 9, the apparatus further includes:
the second penetration processing module 811 is configured to perform an external investment penetration processing on the target enterprise to obtain a second penetration result;
a second checking module 812, configured to check the second penetration result to obtain a second checking result;
the generating module 803 is specifically configured to:
and generating the share detail data of the target enterprise according to the first penetration result, the first verification result, the second penetration result and the second verification result.
In an exemplary embodiment of the present disclosure, the second penetration result includes: r levels of investment information sets, wherein R is an integer greater than or equal to 1, and each investment information set comprises: the target enterprise and the target enterprise are related to the investment situation data, and the target enterprise have preset investment incidence relations.
In an exemplary embodiment of the present disclosure,
the investment information set of level 1 includes: the target enterprise invested objects and the investment situation data of the target enterprise aiming at the self invested objects;
the investment information set of the j +1 th level comprises: the object group corresponding to the second target object and the investment situation data of the second target object aiming at the objects in the object group corresponding to the second target object;
wherein j is an integer which is greater than or equal to 1 and less than or equal to R-1, the second target object is an object having external investment in the j-th level investment information set, and the object group corresponding to the second target object comprises the object invested by the second target object.
In an exemplary embodiment of the present disclosure, each investment information set further includes: hierarchical label information for objects in the investment information set.
In an exemplary embodiment of the present disclosure, in the process of conducting the outsourced investment penetration processing on the target enterprise, the penetration stop condition of any object includes: the subject does not have an outinvestment.
In the apparatus for generating the data of the right of stock details of the target enterprise according to the embodiment of the present disclosure, the data of the right of stock details of the target enterprise includes the first penetration result, and the data of the right of stock details of the target enterprise also includes the first verification result, and the first verification result is referred to, so that effective measures can be taken to ensure the accuracy of the controlled stock condition of the target enterprise, which is embodied by the data of the right of stock details of the target enterprise, and thus the accuracy of the data of the right of stock details of the target enterprise is ensured. In addition, the whole method for generating the stock right detail data can be used without excessive manual participation, so that the labor and the time can be effectively saved.
The specific implementation of each module, unit and subunit in the device for generating the copyright detail data provided by the embodiment of the present disclosure may refer to the content in the method for generating the copyright detail data, and is not described herein again.
It should be noted that although several modules, units and sub-units of the apparatus for action execution are mentioned in the above detailed description, such division is not mandatory. Indeed, the features and functionality of two or more modules, units and sub-units described above may be embodied in one module, unit and sub-unit, in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module, unit and sub-unit described above may be further divided into embodiments by a plurality of modules, units and sub-units.
As shown in fig. 10, the example electronic device 1000 includes a processor 1001 for executing software routines although a single processor is shown for clarity, the electronic device 1000 may include a multi-processor system. The processor 1001 is connected to an infrastructure 1002 for communicating with other components of the electronic device 1000. The infrastructure 1002 may include, for example, a communications bus, a crossbar, or a network.
Electronic device 1000 also includes Memory, such as Random Access Memory (RAM), which may include a main Memory 1003 and a secondary Memory 1010. The secondary memory 1010 may include, for example, a hard disk drive 1011 and/or a removable storage drive 1012, and the removable storage drive 1012 may comprise a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. The removable storage drive 1012 reads from and/or writes to a removable storage unit 1013 in a conventional manner. Removable storage unit 1013 may comprise a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 1012. As will be appreciated by one skilled in the relevant art, the removable storage unit 1013 includes a computer-readable storage medium having stored thereon computer-executable program code instructions and/or data.
In an alternative embodiment, secondary memory 1010 may additionally or alternatively include other similar means for allowing computer programs or other instructions to be loaded into electronic device 1000. Such means may include, for example, a removable storage unit 1021 and an interface 1020. Examples of the removable storage unit 1021 and interface 1020 include: a program cartridge and cartridge interface (such as that found in video game console devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units 1021 and interfaces 1020 that allow software and data to be transferred from the removable storage unit 1021 to the electronic device 1000.
Electronic device 1000 also includes at least one communication interface 1040. Communications interface 1040 allows software and data to be transferred between electronic device 1000 and external devices via communications path 1041. In various embodiments of the present disclosure, the communication interface 1040 allows data to be transferred between the electronic device 1000 and a data communication network, such as a public data or private data communication network. The communication interface 1040 may be used to exchange data between different electronic devices 1000, which electronic devices 1000 form part of an interconnected computer network. Examples of communication interface 1040 may include a modem, a network interface (such as an ethernet card), a communication port, an antenna with associated circuitry, and so forth. Communication interface 1040 may be wired or may be wireless. Software and data transferred via communications interface 1040 are in the form of signals which may be electronic, magnetic, optical or other signals capable of being received by communications interface 1040. These signals are provided to a communications interface via communications path 1041.
As shown in fig. 10, the electronic device 1000 also includes a display interface 1031 to perform operations for rendering images to an associated display 1030, and an audio interface 1032 for performing operations for playing audio content through an associated speaker 1033.
In this document, the term "computer program product" may refer, in part, to: removable storage unit 1013, removable storage unit 1021, a hard disk installed in hard disk drive 1011, or a carrier wave carrying software over communications path 1041 (wireless link or cable) to communications interface 1040. Computer-readable storage media refers to any non-transitory tangible storage medium that provides recorded instructions and/or data to electronic device 1000 for execution and/or processing. Examples of such storage media include floppy disks, magnetic tape, CD-ROMs, DVDs, Blu-ray (TM) disks, hard disk drives, ROMs, or integrated circuits, USB memory, magneto-optical disks, or a computer-readable card, such as a PCMCIA card, etc., whether internal or external to the electronic device 1000. Transitory or non-tangible computer-readable transmission media may also participate in providing software, applications, instructions, and/or data to the electronic device 1000, examples of such transmission media include radio or infrared transmission channels, network connections to another computer or another networked device, and the internet or intranet that includes e-mail transmissions and information recorded on websites and the like.
Computer programs (also called computer program code) are stored in the main memory 1003 and/or the secondary memory 1010. Computer programs may also be received via communications interface 1040. Such computer programs, when executed, enable the electronic device 1000 to perform one or more features of embodiments discussed herein. In various embodiments, the computer programs, when executed, enable the processor 1001 to perform the features of the embodiments described above. Accordingly, such computer programs represent controllers of the computer system.
The software may be stored in a computer program product and loaded into electronic device 1000 using removable storage drive 1012, hard drive 1011, or interface 1020. Alternatively, the computer program product may be downloaded to the computer system via communications path 1041. The software, when executed by the processor 1001, causes the electronic device 1000 to perform the functions of the embodiments described herein.
It should be understood that the embodiment of fig. 10 is given by way of example only. In some embodiments, one or more features of the electronic device 1000 may be omitted. In some embodiments, one or more features of the electronic device 1000 may be combined together. In some embodiments, one or more features of the electronic device 1000 may be separated into one or more components.
It will be appreciated that the elements shown in fig. 10 serve to provide a means for performing the various functions and operations of the server described in the above embodiments.
In one embodiment, a server may be generally described as a physical device including at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the physical device to perform necessary operations.
Embodiments of the present application also provide a computer-readable storage medium on which a computer program is stored, where the computer program is used to implement the functions of the methods shown in fig. 2, fig. 4, fig. 5, fig. 6, or fig. 7 when the computer program is executed by a processor.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by an electronic device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
An embodiment of the present application further provides a computer program, which includes a computer readable code, and when the computer readable code runs on a device, a processor in the device executes instructions of the steps in the above method for generating rights detail data.
From the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present disclosure can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The foregoing describes the principles of the present invention in conjunction with specific embodiments, and it is noted that the advantages, effects, etc. presented herein are merely exemplary and not limiting, and should not be considered essential to the various embodiments of the present invention. The foregoing disclosure of specific details is for purpose of illustration and description and is not intended to be limiting, since the invention is not limited to the specific details set forth.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts in the embodiments are referred to each other. For the system embodiment, since it basically corresponds to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts in the embodiments are referred to each other. For the system embodiment, since it basically corresponds to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The method and apparatus of the present invention may be implemented in a number of ways. For example, the methods and apparatus of the present invention may be implemented in software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustrative purposes only, and the steps of the method of the present invention are not limited to the order specifically described above unless specifically indicated otherwise. Furthermore, in some embodiments, the present invention may also be embodied as a program recorded in a recording medium, the program including machine-readable instructions for implementing a method according to the present invention. Thus, the present invention also covers a recording medium storing a program for executing the method according to the present invention.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to practitioners skilled in this art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (18)

1. A method for generating rights detail data, comprising:
carrying out shareholder penetration processing on a target enterprise to obtain a first penetration result;
verifying the first penetration result to obtain a first verification result;
and generating the stock right detail data of the target enterprise according to the first penetration result and the first verification result.
2. The method of claim 1, wherein the first penetration result comprises: k shareholder information sets of levels, wherein K is an integer greater than or equal to 1, and each shareholder information set comprises: the target enterprise comprises an object having a preset shareholder association relation with the target enterprise, and investment situation data corresponding to the object having the preset shareholder association relation with the target enterprise.
3. The method of claim 2,
the shareholder information set of level 1 includes: an object as an investor of the target enterprise, and investment situation data for the target enterprise as an investor of the target enterprise;
the shareholder information set of the (i + 1) th level comprises: the method comprises the steps that an object group corresponding to a first target object and investment situation data of objects in the object group corresponding to the first target object aiming at the first target object are obtained;
the first target object is an object of which the object type is a specified type in the shareholder information set of the ith hierarchy, and the object group corresponding to the first target object comprises an object of the shareholder serving as the first target object.
4. The method of claim 3,
the shareholder information set of the level 1 comprises: the number of the objects with the corresponding investment situation data in the shareholder information set of the level 1 in the N objects is M, N is an integer greater than or equal to 1, and M is an integer less than or equal to N;
the verifying the first penetration result to obtain a first verification result includes:
comparing M with N to obtain a first comparison result;
judging whether share proportion exists in M investment condition data corresponding to M objects with corresponding investment condition data in the shareholder information set of the level 1 in the N objects to obtain a first judgment result;
obtaining a first checking result according to the first comparison result and/or the first judgment result;
and/or the presence of a gas in the gas,
the object group corresponding to the first target object comprises: p objects, wherein the number of the objects with corresponding investment situation data in the shareholder information set at the i +1 th level is Q, P is an integer greater than or equal to 1, and Q is an integer less than or equal to P;
the verifying the first penetration result to obtain a first verification result includes:
comparing P with Q to obtain a second comparison result;
judging whether share proportion exists in Q investment condition data corresponding to Q objects with corresponding investment condition data in the shareholder information set of the (i + 1) th level in the P objects to obtain a second judgment result;
and acquiring a first checking result according to the second comparison result and/or the second judgment result.
5. The method according to claim 4, wherein the obtaining a first verification result according to the first comparison result and/or the first determination result comprises:
obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first comparison result representation M is smaller than N;
determining a first sum of the M share proportions in the M investment situation data when the first comparison result represents that M is equal to N and the first judgment result represents that the share proportions exist in the M investment situation data;
obtaining a first verification result used for representing that the verification of the first penetration result passes under the condition that the first sum value is equal to a preset value; otherwise, obtaining a first verification result used for representing that the verification of the first penetration result fails.
6. The method of claim 5, wherein generating the rights detail data of the target enterprise based on the first penetration result and the first verification result comprises:
under the condition that a first verification result used for representing that the verification of the first penetration result passes is obtained, generating the share detail data of the target enterprise according to the first penetration result;
acquiring the registered capital of the target enterprise under the condition that a first verification result for representing that the verification on the first penetration result is not passed is obtained, and the investment amount exists in the M pieces of investment situation data;
calculating M share proportions corresponding to the M objects according to the registered capital and M investment money in the M investment situation data, and determining a second sum of the calculated M share proportions;
updating the M share proportions in the M investment situation data to the calculated M share proportions to obtain the corrected first penetration result under the condition that the second sum value is equal to the preset value;
and generating the stock right detail data of the target enterprise according to the corrected first penetration result.
7. The method of claim 2, wherein each shareholder information set further comprises: hierarchical label information for objects in the shareholder information collection.
8. The method according to claim 1, wherein in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object comprises: the object exists in the object that has been penetrated.
9. The method according to claim 1, wherein in the process of performing shareholder penetration processing on the target enterprise, the penetration stop condition for any object comprises: the object type of the object is a non-specified type.
10. The method of claim 1, further comprising:
carrying out external investment penetration treatment on the target enterprise to obtain a second penetration result;
verifying the second penetration result to obtain a second verification result;
generating the share detail data of the target enterprise according to the first penetration result and the first verification result, wherein the generating comprises:
and generating the stock right detail data of the target enterprise according to the first penetration result, the first verification result, the second penetration result and the second verification result.
11. The method of claim 10, wherein the second penetration result comprises: r levels of investment information sets, wherein R is an integer greater than or equal to 1, and each investment information set comprises: the target enterprise is provided with an object with a preset investment incidence relation, and the investment situation data corresponding to the object with the preset investment incidence relation.
12. The method of claim 11,
the investment information set of level 1 includes: the object invested by the target enterprise and the investment situation data of the target enterprise aiming at the object invested by the target enterprise;
the investment information set of the j +1 th level comprises: the target group corresponding to a second target object and the investment situation data of the second target object aiming at the objects in the target group corresponding to the second target object;
wherein j is an integer greater than or equal to 1 and less than or equal to R-1, the second target object is an object having an external investment in the j-th level investment information set, and the object group corresponding to the second target object includes an object invested by the second target object.
13. The method of claim 11, wherein each investment information set further comprises: hierarchical label information for objects in the investment information set.
14. The method according to claim 10, wherein the breakthrough stopping condition of any object in the process of the outcoming investment breakthrough handling of the target enterprise comprises: the subject does not have an outinvestment.
15. An equity detail data generating apparatus, comprising:
the first penetration processing module is used for carrying out stockholder penetration processing on the target enterprise to obtain a first penetration result;
the first checking module is used for checking the first penetration result to obtain a first checking result;
and the generating module is used for generating the share detail data of the target enterprise according to the first penetration result and the first verification result.
16. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of generating rights detail data of any of the preceding claims 1 to 14 via execution of the executable instructions.
17. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the rights detail data generating method of any one of the preceding claims 1 to 14.
18. A computer program comprising computer readable code which, when run on a device, causes a processor in the device to execute instructions for carrying out the steps of the method of rights detail data generation as claimed in any one of claims 1 to 14.
CN202110849722.4A 2021-07-27 2021-07-27 Stock right detail data generation method and device and electronic equipment Active CN113538147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110849722.4A CN113538147B (en) 2021-07-27 2021-07-27 Stock right detail data generation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110849722.4A CN113538147B (en) 2021-07-27 2021-07-27 Stock right detail data generation method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113538147A true CN113538147A (en) 2021-10-22
CN113538147B CN113538147B (en) 2024-02-09

Family

ID=78089186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110849722.4A Active CN113538147B (en) 2021-07-27 2021-07-27 Stock right detail data generation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113538147B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10102575B1 (en) * 2013-06-24 2018-10-16 Dividex Analytics, LLC Securities claims identification, optimization and recovery system and methods
CN109189809A (en) * 2018-10-17 2019-01-11 北京金堤科技有限公司 A kind of matched method and apparatus of shareholder's names associate
CN110473098A (en) * 2019-08-08 2019-11-19 北京金堤科技有限公司 Company's equity data processing method and device
CN110648051A (en) * 2019-08-29 2020-01-03 北京金堤科技有限公司 Enterprise information analysis processing method and device, electronic equipment and storage medium
CN110781246A (en) * 2019-09-18 2020-02-11 上海生腾数据科技有限公司 Enterprise association relationship construction method and system
CN111382181A (en) * 2020-03-16 2020-07-07 中科天玑数据科技股份有限公司 Designated enterprise family affiliation analysis method and system based on stock right penetration
US20200380604A1 (en) * 2019-06-03 2020-12-03 Shoobx, Inc. Real-Time Equity Financing Planner
CN112183902A (en) * 2020-11-09 2021-01-05 中债金融估值中心有限公司 Stock right asset value prediction method, and related device and equipment
CN112634056A (en) * 2020-12-17 2021-04-09 企查查科技有限公司 Method, equipment and storage medium for rapidly calculating and updating enterprise share right structure
CN112732710A (en) * 2020-12-25 2021-04-30 北京知因智慧科技有限公司 Data processing method and device and electronic equipment
CN112991070A (en) * 2021-03-16 2021-06-18 武汉大学 Multi-layer stock right penetrating method for financial stock right knowledge large graph

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10102575B1 (en) * 2013-06-24 2018-10-16 Dividex Analytics, LLC Securities claims identification, optimization and recovery system and methods
CN109189809A (en) * 2018-10-17 2019-01-11 北京金堤科技有限公司 A kind of matched method and apparatus of shareholder's names associate
US20200380604A1 (en) * 2019-06-03 2020-12-03 Shoobx, Inc. Real-Time Equity Financing Planner
CN110473098A (en) * 2019-08-08 2019-11-19 北京金堤科技有限公司 Company's equity data processing method and device
CN110648051A (en) * 2019-08-29 2020-01-03 北京金堤科技有限公司 Enterprise information analysis processing method and device, electronic equipment and storage medium
CN110781246A (en) * 2019-09-18 2020-02-11 上海生腾数据科技有限公司 Enterprise association relationship construction method and system
CN111382181A (en) * 2020-03-16 2020-07-07 中科天玑数据科技股份有限公司 Designated enterprise family affiliation analysis method and system based on stock right penetration
CN112183902A (en) * 2020-11-09 2021-01-05 中债金融估值中心有限公司 Stock right asset value prediction method, and related device and equipment
CN112634056A (en) * 2020-12-17 2021-04-09 企查查科技有限公司 Method, equipment and storage medium for rapidly calculating and updating enterprise share right structure
CN112732710A (en) * 2020-12-25 2021-04-30 北京知因智慧科技有限公司 Data processing method and device and electronic equipment
CN112991070A (en) * 2021-03-16 2021-06-18 武汉大学 Multi-layer stock right penetrating method for financial stock right knowledge large graph

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
GOUTAM DUTTA 等: "Asset liability management model with decision support system for life insurance companies: Computational results", 《ELSEVIER》, vol. 128, pages 985 - 998 *
王庆: "基于投资图谱的信息挖掘研究", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 02, pages 138 - 2991 *
王赞明: "互联网金融风险信息共享和评估平台的设计与开发", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 01, pages 138 - 394 *
重庆银行股份有限公司互联网金融部课题组: "基于知识图谱构建商业银行大数据风控体系的研究与实践", 《当代金融研究》, no. 6, pages 89 - 96 *

Also Published As

Publication number Publication date
CN113538147B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN107885656B (en) Automatic product algorithm testing method and application server
CN109359277B (en) Data monitoring method, device and computer storage medium
CN116189079A (en) Abnormality detection method and device for monitoring equipment
CN108038655A (en) Recommendation method, application server and the computer-readable recording medium of department's demand
US9501390B1 (en) Enhancing automated mobile application testing
CN112561690B (en) Method, system, equipment and storage medium for testing credit card staged service interface
CN108847948B (en) Method and device for creating activity group, medium and computing equipment
CN113538147B (en) Stock right detail data generation method and device and electronic equipment
CN113011901A (en) Method and device for acquiring stock right data
CN111553491A (en) Vehicle maintenance record generation method and related device
CN111159169A (en) Data management method and equipment
CN113821443B (en) Function detection method, device, equipment and storage medium of application program
CN113450085B (en) Service processing method, system, storage medium and electronic equipment
CN113704123A (en) Interface test method, device, equipment and storage medium
CN113761854A (en) Method and device for realizing train control data processing
CN110807037B (en) Data modification method and device, electronic equipment and storage medium
CN107958142B (en) User account generation method and device
CN112286792A (en) Interface testing method, device, equipment and storage medium
CN111953637A (en) Application service method and device
CN115086436B (en) inter-API parameter verification method and device, computer equipment and storage medium
CN111966700B (en) Information processing method, system, device and electronic equipment
CN112132694B (en) Method, device, equipment and storage medium for confirming and checking policy and security case
CN110928788B (en) Service verification method and device
CN113806516B (en) Matching degree determining method and device, electronic equipment and computer readable storage medium
US12008606B2 (en) Volunteer connection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant