CN114511392B - Financial data acquisition standard method - Google Patents

Financial data acquisition standard method Download PDF

Info

Publication number
CN114511392B
CN114511392B CN202210088417.2A CN202210088417A CN114511392B CN 114511392 B CN114511392 B CN 114511392B CN 202210088417 A CN202210088417 A CN 202210088417A CN 114511392 B CN114511392 B CN 114511392B
Authority
CN
China
Prior art keywords
acquisition
financial data
encryption
data
financial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210088417.2A
Other languages
Chinese (zh)
Other versions
CN114511392A (en
Inventor
王�琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongyou Jinshen Technology Co ltd
Original Assignee
Beijing Zhongyou Jinshen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongyou Jinshen Technology Co ltd filed Critical Beijing Zhongyou Jinshen Technology Co ltd
Priority to CN202210088417.2A priority Critical patent/CN114511392B/en
Publication of CN114511392A publication Critical patent/CN114511392A/en
Application granted granted Critical
Publication of CN114511392B publication Critical patent/CN114511392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a financial data acquisition standard method, which comprises the following steps: step S01: acquiring a financial target through a preset financial data platform, and determining a financial data pre-acquisition range according to the financial target; step S02: acquiring an encrypted acquisition type corresponding to the financial data acquisition range by encrypting and analyzing the pre-acquisition range; step S03: according to the encryption acquisition type, acquiring data in a corresponding financial data acquisition range to obtain financial data; step S04: generating a financial model according to the financial data, and performing standardized judgment to obtain standardized financial data; through carrying out the encryption collection to financial data to carry out the encryption collection that corresponds to different encryption grades, improved the security in the financial data acquisition process, reduced the risk of data leakage, improved the encryption collection efficiency of different data sections, carry out standardized analysis through establishing financial model, improved the suitability of the financial data who gathers.

Description

Financial data acquisition standard method
Technical Field
The invention relates to the technical field of big data calculation, in particular to a financial data acquisition standard method.
Background
At present, with the rapid development of the internet, on the basis of the high-speed increase of economy in China, digital economy becomes an important direction of times development, the development systems of the big data field and the block chain field are more and more perfect, and powerful support is provided for enterprises to carry out digital financial data acquisition; under the background of a new era, enterprises have higher requirements on financial digital management, acquisition, analysis and encryption protection of a large amount of financial data become indispensable links, in addition, effective analysis of the financial data is required to be beneficial to the enterprises to judge the self operating conditions, the development layout is adjusted in time, and the enterprise competitiveness is improved; for example, the application number "02110938811.6" is an enterprise electronic standing book financial data acquisition method based on the block chain technology, which acquires financial data according to different authorities, caches the financial data in a cloud server, performs standardized processing according to keyword retrieval, and encrypts and uploads the financial data; the method enhances the efficiency of acquisition, transmission and encryption in daily work of financial data of enterprises, but when facing a large amount of financial data of the enterprises, the financial data cannot be processed according to different scenes and purposes; the method and the system for acquiring and processing the financial data of the enterprise with the application number of '202110212412.1' adopt safer measures, submit the enterprise information to a block chain platform for chain loading and verification and confirm, and store and certify the chain loading of the acquisition process by establishing a trusted channel; the method aims to enhance the security of the enterprise financial data, but when a complex processing flow is encountered, the encryption time needs to be greatly prolonged, and the instantaneity of enterprise data acquisition is influenced; the invention classifies the enterprise financial data acquisition according to the acquisition scene and the application, and simultaneously carries out the grading encryption on the acquisition process and the acquired data, thereby protecting the key data, not influencing the data management speed, and simultaneously improving the applicability of the financial data.
Disclosure of Invention
The invention provides a financial data acquisition standard method, which is used for solving the problems that when financial data are excessive and a financial data use scene is complex, the financial data acquisition is effectively and safely carried out and the safety of each part of financial data acquisition is accurately ensured.
The invention provides a financial data acquisition standard method, which comprises the following steps:
step S01: acquiring a financial target through a preset financial data platform, and determining a financial data pre-acquisition range according to the financial target;
step S02: acquiring an encrypted acquisition type corresponding to the financial data acquisition range by encrypting and analyzing the pre-acquisition range;
step S03: according to the encryption acquisition type, data acquisition is carried out in a corresponding financial data acquisition range to obtain financial data;
step S04: and generating a financial model according to the financial data, performing standardized judgment, and acquiring standardized financial data.
As an embodiment of the present invention, the step S01 includes:
acquiring a financial target through a preset financial data platform, and performing data analysis on the financial target to acquire corresponding financial data pre-acquisition information; wherein,
the financial objectives include: financial structure, debt paying capacity, operation analysis, profit visualization and cash flow analysis;
the financial data pre-collection information: financial data pre-acquisition distribution, pre-acquisition range and data pre-acquisition time; wherein,
the financial data collection distribution comprises: performing data combination through a financial data source to determine target data distribution information; wherein,
and the financial data source is obtained by performing function classification on financial data through a financial platform.
As an embodiment of the present invention, the step S02 includes:
according to the financial data pre-acquisition information, performing acquisition category analysis and determining a financial data acquisition mode corresponding to a pre-acquisition range; wherein,
the financial data acquisition mode comprises the following steps: directional acquisition, sectional acquisition and continuous acquisition; wherein,
the directional acquisition comprises: acquiring data of a plurality of pre-acquisition ranges at a fixed frequency according to the preset time and the preset range;
the segmented acquisition comprises: acquiring time segments and range segments; wherein,
the time slice acquisition comprises: respectively carrying out financial data acquisition and acquisition stopping operation on a target pre-acquisition range according to a preset acquisition time period and a preset stopping time period;
the continuous acquisition comprises: continuous acquisition in time and continuous acquisition in a preset range.
As an embodiment of the present invention, in step S02, the method further includes:
carrying out encryption acquisition analysis according to the financial data pre-acquisition range and the financial data acquisition mode, and determining an encryption acquisition type corresponding to the financial data pre-acquisition range; wherein,
the encrypted acquisition types include: step encryption acquisition, fixed encryption acquisition and simplified encryption acquisition; wherein,
the fixed encryption acquisition comprises: carrying out encryption acquisition in a preset time in a fixed single encryption acquisition mode within a preset acquisition range;
the streamlined encrypted collection comprises: through the financial data of simplifying encryption collection, need input preset job number data and acquire the permission of looking over.
As an embodiment of the present invention, the step S03 includes:
according to the encryption acquisition types corresponding to different financial data pre-acquisition ranges, performing acquisition priority analysis on the financial data pre-acquisition range to obtain an acquisition priority corresponding to the pre-acquisition range; wherein,
the acquisition priority includes: a first priority, a second priority, a third priority; wherein,
the first priority has the highest priority level, and the third priority has the lowest priority level.
As an embodiment of the present technical solution, in that the S03 further includes:
according to the acquisition priority and the corresponding encrypted acquisition type, sequentially acquiring data within a pre-acquisition range to acquire financial data; wherein,
the financial data come from one or more pre-acquisition ranges, and according to the pre-acquisition ranges, the financial data are subjected to labeling analysis and added with financial data labels; wherein,
the data tag includes: a data source label and a data encryption acquisition type label.
As an embodiment of the present invention, the step S04 includes:
screening data, calculating a data effective value and judging the data effective value by comparing the collected financial data with comparison data in a preset financial database; wherein,
when the effective value is not within the preset threshold range, the effective value is invalid financial data, and the financial data validity is detected;
and when the effective value is within a preset threshold range, acquiring effective financial data.
As an embodiment of the present invention, in step S04, the method further includes:
establishing a financial data model according to the effective financial data, carrying out standardized analysis on the financial data model, calculating a model standard value, and judging; wherein,
when the model standard value is within a preset threshold range, the model standard value is a standardized model, and standardized financial data are obtained;
when the standard value of the model is not in the preset threshold range, carrying out standardized screening treatment;
the financial data model includes: a financial continuity model, a financial staging model, a financial expectation model, a financial matching model.
As an embodiment of the present technical solution, the step encryption acquisition includes the following steps:
step S100: carrying out data acquisition layering on the pre-acquisition range according to the financial target to obtain a financial data acquisition layer; wherein,
the data acquisition layering is used for acquiring an acquisition sequence by dividing the financial data acquisition process into different layers and sequentially acquiring according to the acquisition sequence;
the financial data collection layer comprises: the device comprises a head end acquisition layer, a middle end acquisition layer and a tail end acquisition layer; wherein,
the head end acquisition layer comprises: a first head end acquisition section, a second head end acquisition section and a third head end acquisition section;
step S200: according to the financial data acquisition layer, performing encryption analysis to determine an encryption step grade; wherein,
the encryption analysis is to perform subsection processing on the data acquisition layer according to the financial data pre-acquisition information to obtain financial data acquisition sections, sequentially judge the sections to obtain encryption grades of the sections, and determine encryption step grades according to the encryption grades;
the encryption ladder levels include: a first encryption ladder, a second encryption ladder, and a third encryption ladder; the first encryption ladder has the highest security level, and the third encryption ladder has the lowest security level;
step S300: according to the encryption ladder grade, carrying out ladder encryption processing on each data acquisition section in the financial data acquisition layer in sequence; wherein,
the data acquisition layer can comprise acquisition segments with different encryption ladder levels.
As an embodiment of the present technical solution, the label analysis includes the following steps:
the method comprises the following steps: performing labeling encryption judgment on the financial data to acquire encryption information; wherein,
when the mark of the financial data does not need to be encrypted, directly adding a financial data label;
when the mark of the financial data needs to be encrypted, acquiring encryption information;
step two: performing labeling encryption analysis according to the encryption information to obtain a labeling encryption grade; wherein,
the labeling encryption level comprises: first class labeling, second class labeling and third class labeling; wherein, the encryption grade of one type of label is the highest, and the encryption grade of the three types of labels is the lowest;
step three: and adding a financial data label to the pre-collection range, and encrypting the financial data label according to the labeling encryption level to generate an encryption label.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart of a financial data collection criteria method in an embodiment of the invention;
FIG. 2 is a diagram illustrating the steps of ladder encryption collection in a standard method for financial data collection according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating annotation analysis performed by a method for collecting financial data according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
It will be understood that when an element is referred to as being "secured to" or "disposed on" another element, it can be directly on the other element or be indirectly on the other element. When an element is referred to as being "connected to" another element, it can be directly or indirectly connected to the other element.
It will be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like, as used herein, refer to an orientation or positional relationship indicated in the drawings that is solely for the purpose of facilitating the description and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and is therefore not to be construed as limiting the invention.
Moreover, it is noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions, and "a plurality" means two or more unless specifically limited otherwise. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Example 1:
the embodiment of the invention provides a financial data acquisition standard method, which comprises the following steps:
step S01: acquiring a financial target through a preset financial data platform, and determining a financial data pre-acquisition range according to the financial target;
step S02: acquiring an encrypted acquisition type corresponding to the financial data acquisition range by encrypting and analyzing the pre-acquisition range;
step S03: according to the encryption acquisition type, data acquisition is carried out in a corresponding financial data acquisition range to obtain financial data;
step S04: generating a financial model according to the financial data, and performing standardized judgment to obtain standardized financial data;
the working principle of the technical scheme is as follows: in the prior art, generally, different parts of financial data are collected according to different templates, for example, a financial data collection method and system with application number "201910323625.4", where the collection template is defined in advance, the collected storage function and the collection account for inquiry are designed in detail after collection, and a financial statement is generated by the system; according to different technical schemes, financial data acquisition is analyzed according to data requirements of financial data, different financial data pre-acquisition ranges are divided according to acquisition targets, then encryption analysis is carried out on financial data acquisition blocks, encryption analysis is respectively carried out if a plurality of data pre-acquisition ranges are included, corresponding encryption acquisition types are obtained, data acquisition is carried out according to the corresponding encryption acquisition types, direct acquisition is carried out if encryption acquisition is not needed, meanwhile, subdivision is carried out in the encryption acquisition process, encryption acquisition of different degrees is carried out on different acquisition sections, financial data are obtained, finally, a financial model is generated according to the financial data, standardized judgment is carried out, standardized analysis is carried out if standardized conditions are not met, and standardized financial data are obtained if the standardized conditions are met;
the beneficial effects of the above technical scheme are: through encrypting the collection to financial data to carry out the encryption collection that corresponds to different encryption grades, improved the security among the financial data acquisition process, reduced the risk of data leakage, improved the encryption collection efficiency of different data sections, through establishing financial model and carrying out standardized analysis, improved the suitability of the financial data who gathers.
Example 2:
in one embodiment, the step S01 includes:
acquiring a financial target through a preset financial data platform, and performing data analysis on the financial target to acquire corresponding financial data pre-acquisition information; wherein,
the financial objectives include: financial structure, debt paying capacity, operation analysis, profit visualization and cash flow analysis;
the financial data pre-collection information: financial data pre-acquisition distribution, pre-acquisition range and data pre-acquisition time; wherein,
the financial data collection distribution comprises: performing data combination through a financial data source to determine target data distribution information; wherein,
the financial data source is obtained by performing function classification on financial data through a financial platform;
the working principle of the technical scheme is as follows: in the prior art, all collected data are usually screened one by one, and effective data are left according to purposes, but the time consumption is high and the safety is poor; above-mentioned technical scheme just separates the collection to the collection of financial data and the collection of other data from the beginning, through carrying out data analysis to the financial target, acquires the financial data information of gathering in advance that corresponds, and the financial target includes: financial structure, debt paying capacity, operation analysis, profit visualization and cash flow analysis; the financial data acquisition and distribution is performed by data combination through a financial data source, target data distribution information is obtained, and finally, the financial data source is obtained by performing function classification on the financial data;
the beneficial effects of the above technical scheme are: through financial data pre-collection information, the data collection range is reduced, the collection speed is accelerated, the financial data collection efficiency is improved, and the financial data collection range can be determined more quickly through a financial data source.
Example 3:
in one embodiment, the step S02 includes:
according to the financial data pre-acquisition information, performing acquisition category analysis and determining a financial data acquisition mode corresponding to a pre-acquisition range; wherein,
the financial data acquisition mode comprises the following steps: directional acquisition, sectional acquisition and continuous acquisition; wherein,
the directional acquisition comprises: acquiring data of a plurality of pre-acquisition ranges at a fixed frequency according to the preset time and the preset range;
the segmented acquisition comprises: acquiring time segments and range segments; wherein,
the time slice acquisition comprises: respectively carrying out financial data acquisition and acquisition stopping operation on a target pre-acquisition range according to a preset acquisition time period and a preset stopping time period;
the continuous acquisition comprises: continuous acquisition in time and continuous acquisition in a preset range;
the working principle of the technical scheme is as follows: in the prior art, the data is directly transmitted after being acquired, and the data is encrypted before being transmitted and decrypted after being transmitted so as to enhance the data security, but the data acquisition speed is greatly reduced by the method, so that the financial data is acquired slowly, and the timeliness of the financial data is reduced; in the above technical solution, according to the financial data pre-collection information, performing collection category analysis to determine the financial data collection mode corresponding to the pre-collection range, including: directional collection, sectional collection and continuous collection, wherein the directional collection comprises the following steps: acquiring data of a plurality of pre-acquisition ranges at a fixed frequency according to the preset time and the preset range; the segmented acquisition comprises the following steps: time sectional acquisition and pre-acquisition range sectional acquisition; the time-slice acquisition comprises: according to the preset collection time period and the stop time period, respectively carrying out financial data collection and collection stop operation on the target pre-collection range, wherein the continuous collection comprises the following steps: continuous acquisition in time and continuous acquisition in a preset range;
the beneficial effects of the above technical scheme are: according to different collection modes, the collection efficiency is enhanced by improving the pertinence of the collection modes, most of single collection scenes can be met through directional collection, a plurality of complex collection scenes can be solved through sectional collection, and the comprehensive collection efficiency is improved.
Example 4:
in one embodiment, the step S02 further includes:
carrying out encryption acquisition analysis according to the financial data pre-acquisition range and the financial data acquisition mode, and determining an encryption acquisition type corresponding to the financial data pre-acquisition range; wherein,
the encrypted acquisition types include: step encryption acquisition, fixed encryption acquisition and simplified encryption acquisition; wherein,
the fixed encryption acquisition comprises: within a preset acquisition range, carrying out encryption acquisition within preset time by a fixed single encryption acquisition mode;
the streamlined encrypted collection comprises: the method comprises the steps that through simplifying financial data collected through encryption, preset job number data need to be input to obtain viewing permission;
the working principle of the technical scheme is as follows: in the prior art, the financial data acquisition and encryption are usually completed in a single encryption mode, and the protection effect is realized by setting a single encrypted encryption password to be complex, but in the mode, if the encrypted password is complex, the financial data acquisition efficiency can be greatly reduced, but if the encrypted password is simple, the security risk can be caused; among the above-mentioned technical scheme, according to financial data information and financial data acquisition mode in advance, encrypt the collection analysis, confirm the encryption type of gathering that financial data gathers the scope and corresponds in advance, encrypt the collection type and include: the ladder encrypts collection, fixed encryption collection, retrench and encrypt the collection, and fixed encryption collection includes: carrying out encryption acquisition in a preset time in a fixed single encryption acquisition mode within a preset acquisition range; the simplified encryption acquisition comprises the following steps: the method comprises the steps that through simplifying financial data collected through encryption, preset job number data need to be input to obtain viewing permission;
the beneficial effects of the above technical scheme are: through different encryption collection types, the collection encryption pertinence in the collection process is improved, and the subsection safety and the overall safety of financial data collection are enhanced.
Example 5:
in one embodiment, the step S03 includes:
according to the encryption acquisition types corresponding to different financial data pre-acquisition ranges, performing acquisition priority analysis on the financial data pre-acquisition ranges to obtain acquisition priorities corresponding to the pre-acquisition ranges; wherein,
the acquisition priority includes: a first priority, a second priority, a third priority; wherein,
the first priority has the highest priority level, and the third priority has the lowest priority level;
the working principle of the technical scheme is as follows: according to the encryption acquisition types corresponding to different pre-acquisition ranges, analyzing the acquisition priority of the pre-acquisition range to obtain the acquisition priority corresponding to the pre-acquisition range, wherein the acquisition priority comprises the following steps: the first priority is higher than the second priority, and the second priority is higher than the third priority;
the beneficial effects of the above technical scheme are: by calculating the priority, the complex situation is simplified, and the acquisition efficiency is improved.
Example 6:
in one embodiment, the S03 further includes:
according to the acquisition priority and the corresponding encrypted acquisition type, data acquisition is carried out in a pre-acquisition range in sequence to obtain financial data; wherein,
the financial data come from one or more pre-acquisition ranges, and according to the pre-acquisition ranges, the financial data are subjected to labeling analysis and added with financial data labels; wherein,
the data tag includes: a data source label and a data encryption acquisition type label;
the working principle of the technical scheme is as follows: the method comprises the following steps that financial data are classified according to departments, according to the prior art, data collection is sequentially carried out on pre-collection ranges according to collection priorities and corresponding encryption collection types, financial data are obtained and analyzed, if the financial data come from one or more pre-collection ranges, the financial data are labeled and analyzed according to the pre-collection ranges, and financial data labels are added;
the beneficial effects of the above technical scheme are: through the label analysis, add the data label for financial data, improved the convenience that follow-up financial data used, also strengthened financial data's traceability.
Example 7:
in one embodiment, the step S04 includes:
screening data, calculating a data effective value and judging the data effective value by comparing the collected financial data with comparison data in a preset financial database; wherein,
when the effective value is not within the preset threshold range, the effective value is invalid financial data, and the financial data validity is detected;
when the effective value is within a preset threshold range, acquiring effective financial data;
the working principle of the technical scheme is as follows: the method comprises the steps of screening data through comparison data between collected financial data and preset financial databases, calculating effective values of the data, judging whether the effective values are within a preset threshold range, if so, acquiring effective financial data, and otherwise, detecting validity of the financial data for invalid financial data;
the calculating the effective value comprises the following steps:
step S10: acquiring and collecting financial data set { alpha } 12 ,…,α n And a preset financial data set { beta } in a preset financial database 12 ,…,β n Calculate the average amount of data
Figure BDA0003488155340000141
Figure BDA0003488155340000142
Wherein,
Figure BDA0003488155340000143
for collecting an average amount of financial data, alpha i For the ith financial data acquisition in the financial data group, i is variable and is more than or equal to 1 and less than or equal to n, omega α The average influence coefficient of the financial data is collected;
Figure BDA0003488155340000144
for presetting the average amount of financial data, beta i For the ith preset financial data in the preset financial data set,
Figure BDA0003488155340000145
setting a mean influence coefficient of the financial data;
step S20: according to the average quantity of the data
Figure BDA0003488155340000146
Calculating the data difference quantity mu:
Figure BDA0003488155340000147
wherein, mu α For collecting data differences of financial data, σ is the difference coefficient of deviation of the collected data differences, μ β The data difference is a preset data difference deviation coefficient of the financial data, and theta is a preset data difference deviation coefficient;
step S30: calculating a financial data effective value τ according to the data delta μ:
Figure BDA0003488155340000151
wherein,
Figure BDA0003488155340000152
is a first deviation coefficient, gamma is a second deviation coefficient;
the beneficial effects of the above technical scheme are: through carrying out effective analysis to the financial data who gathers, judge whether it belongs to financial data, improved follow-up financial data processing's accuracy, guaranteed the safety in the financial data use.
Example 8:
in one embodiment, the step S04 further includes:
establishing a financial data model according to the effective financial data, carrying out standardized analysis on the financial data model, calculating a model standard value, and judging; wherein,
when the model standard value is within a preset threshold range, the model standard value is a standardized model, and standardized financial data are obtained;
when the standard value of the model is not in the preset threshold range, carrying out standardized screening treatment;
the financial data model includes: a financial continuity model, a financial staging model, a financial expectation model, a financial matching model;
the working principle of the technical scheme is as follows: establishing a financial data model from the available financial data, the financial data model comprising: a financial continuity model, a financial staging model, a financial expectation model and a financial matching model; carrying out standardized analysis on the financial data model, calculating a model standard value, judging whether the model standard value is in a preset threshold range, if so, obtaining standardized financial data, and otherwise, carrying out standardized screening processing;
the standardized analysis comprises the following steps:
step S101: obtaining a valid set of financial data { p 1 ,p 2 ,…,p m Calculating a corresponding central standard value delta:
Figure BDA0003488155340000161
wherein, delta j For the jth valid financial data p in the valid financial data group j Corresponding central standard value, j is variable, j is more than or equal to 1 and less than or equal to m, p t T is the t-th effective financial data in the effective financial data group, t is a variable, t is more than or equal to 1 and less than or equal to j, and eta is a central standard influence parameter;
step S102: obtaining a characteristic data set { q ] corresponding to the effective financial data set 1 ,q 2 ,…,q m And calculating a standard deviation value lambda according to the central standard value delta:
Figure BDA0003488155340000162
wherein λ is 1 Is a first standard deviation value, λ 2 Is the second standard deviation value, δ t For the tth effective financial data p in the effective financial data group t Corresponding central criterion value, p l Is the first effective financial data in the effective financial data set, l is variable, l is more than or equal to 1 and less than or equal to f, f is the first characteristic number of the effective financial data, f is more than or equal to 1 and less than or equal to m, p k The k effective financial data in the effective financial data group is represented, k is a variable, k is more than or equal to 1 and less than or equal to g, g is a second characteristic number of the effective financial data, and g is more than or equal to 1 and less than or equal to m;
step S103: according to the standard deviation value lambda, deviation judgment is carried out; wherein,
when the standard deviation value lambda is within a preset threshold value range, the standard deviation value lambda is the standardized data
When the standard deviation value lambda is not within a preset threshold range, screening standardized data;
the beneficial effects of the above technical scheme are: through carrying out standardized judgement to financial model, improved financial data and got the continuity, improved financial data's application scope.
Example 9:
in one embodiment, the ladder encryption collection comprises the steps of:
step S100: carrying out data acquisition layering on the pre-acquisition range according to the financial target to obtain a financial data acquisition layer; wherein,
the data acquisition layering is used for acquiring an acquisition sequence by dividing the financial data acquisition process into different layers and sequentially acquiring according to the acquisition sequence;
the financial data collection layer comprises: the device comprises a head end acquisition layer, a middle end acquisition layer and a tail end acquisition layer; wherein,
the head end acquisition layer comprises: a first head end acquisition section, a second head end acquisition section and a third head end acquisition section;
step S200: according to the financial data acquisition layer, performing encryption analysis to determine an encryption step grade; wherein,
the encryption analysis is to perform subsection processing on the data acquisition layer according to the financial data pre-acquisition information to obtain financial data acquisition sections, sequentially judge the sections to obtain encryption grades of the sections, and determine encryption step grades according to the encryption grades;
the encryption ladder levels include: a first encryption ladder, a second encryption ladder, and a third encryption ladder; the first encryption ladder has the highest security level, and the third encryption ladder has the lowest security level;
step S300: according to the encryption ladder grade, carrying out ladder encryption processing on each data acquisition section in the financial data acquisition layer in sequence; wherein,
the data acquisition layer can comprise acquisition segments with different encryption step levels;
the working principle of the technical scheme is as follows: firstly, data acquisition layering is carried out on a pre-acquisition range according to a financial target, a financial data acquisition layer is obtained, the data acquisition layering is that the financial data acquisition process is divided into different layers, an acquisition sequence is obtained, acquisition is carried out in sequence according to the acquisition sequence, and the financial data acquisition layer comprises: head end acquisition layer, middle-end acquisition layer, tail end acquisition layer, wherein, head end acquisition layer includes: a first head end acquisition section, a second head end acquisition section, a third head end acquisition section, a middle end acquisition layer and a tail end acquisition layer are analogized in turn; secondly, according to financial data acquisition layer, carry out encryption analysis, confirm encryption ladder grade, encryption analysis carries out segmentation to data acquisition layer according to the information of gathering in advance, acquires financial data acquisition section to judge in proper order each section, acquire each section encryption grade, confirm encryption ladder grade according to encryption grade, secret ladder grade includes: the first encryption ladder is larger than the second encryption ladder, and the second encryption ladder is larger than the third encryption ladder; finally, the data acquisition layer can comprise acquisition sections with different encryption step grades, and the data acquisition sections in the financial data acquisition layer are sequentially subjected to step encryption processing according to the encryption step grades;
the beneficial effects of the above technical scheme are: through carrying out layering and segmentation to financial data acquisition, the matching corresponds must gather the encryption mode, has greatly improved some collection security and has synthesized the collection security, has strengthened suitability and the safe collection efficiency among the financial data.
Example 10:
in one embodiment, the annotation analysis comprises the steps of:
the method comprises the following steps: performing labeling encryption judgment on the financial data to acquire encryption information; wherein,
when the mark of the financial data does not need to be encrypted, directly adding a financial data label;
when the mark of the financial data needs to be encrypted, acquiring encryption information;
step two: carrying out labeling encryption analysis according to the encryption information to obtain a labeling encryption grade; wherein,
the labeling encryption level comprises: first class labeling, second class labeling and third class labeling; wherein, the encryption grade of one type of label is the highest, and the encryption grade of the three types of labels is the lowest;
step three: adding a financial data label to a pre-acquisition range, and encrypting the financial data label according to the labeling encryption level to generate an encryption label;
the working principle of the technical scheme is as follows: firstly, performing labeling encryption judgment on financial data to obtain encryption information, performing judgment, judging whether a mark of the financial data needs to be encrypted, if so, obtaining the encryption information, otherwise, directly adding a financial data label; then, carrying out label encryption analysis according to the encryption information to obtain a label encryption grade, comprising the following steps: the method comprises the following steps of first-class marking, second-class marking and third-class marking, wherein the grade of the first-class marking is greater than that of the second-class marking, and the grade of the second-class marking is greater than that of the third-class marking; and finally, adding a financial data label to the pre-acquisition range, encrypting the financial data label according to the labeling encryption level, and generating an encryption label
The beneficial effects of the above technical scheme are: through the mark analysis, confirm financial data label, improved the accuracy of data correspondence label, improved financial data convenience of tracing to the source, and the integration efficiency of financial data reply multi-scenario.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (3)

1. A financial data collection criteria method comprising the steps of:
step S01: acquiring a financial target through a preset financial data platform, and determining a financial data pre-acquisition range according to the financial target;
step S02: acquiring an encrypted acquisition type corresponding to the financial data acquisition range by encrypting and analyzing the pre-acquisition range;
step S03: according to the encryption acquisition type, data acquisition is carried out in a corresponding financial data acquisition range to obtain financial data;
step S04: generating a financial model according to the financial data, and performing standardized judgment to obtain standardized financial data;
the step S01 includes:
acquiring a financial target through a preset financial data platform, and performing data analysis on the financial target to acquire corresponding financial data pre-acquisition information; wherein,
the financial objectives include: financial structure, debt paying capacity, operation analysis, profit visualization and cash flow analysis;
the financial data pre-collection information: financial data pre-acquisition distribution, pre-acquisition range and data pre-acquisition time; wherein,
the financial data collection distribution comprises: performing data combination through a financial data source to determine target data distribution information; wherein,
the financial data source is obtained by performing function classification on financial data through a financial platform;
the step S02 includes:
according to the financial data pre-acquisition information, performing acquisition category analysis and determining a financial data acquisition mode corresponding to a pre-acquisition range; wherein,
the financial data acquisition mode comprises the following steps: directional acquisition, sectional acquisition and continuous acquisition; wherein,
the directional acquisition comprises: acquiring data of a plurality of pre-acquisition ranges at a fixed frequency according to the preset time and the preset range;
the segmented acquisition comprises: acquiring time segments and range segments; wherein,
the time slice acquisition comprises: respectively carrying out financial data acquisition and acquisition stopping operation on a target pre-acquisition range according to a preset acquisition time period and a preset stopping time period;
the continuous acquisition comprises: continuous acquisition in time and continuous acquisition in a preset range;
the step S02 further includes:
carrying out encryption acquisition analysis according to the financial data pre-acquisition range and the financial data acquisition mode, and determining an encryption acquisition type corresponding to the financial data pre-acquisition range; wherein,
the encrypted acquisition types include: step encryption acquisition, fixed encryption acquisition and simplified encryption acquisition; wherein,
the fixed encryption acquisition comprises: carrying out encryption acquisition in a preset time in a fixed single encryption acquisition mode within a preset acquisition range;
the streamlined encryption collection comprises: the method comprises the steps that through simplifying financial data collected through encryption, preset job number data need to be input to obtain viewing permission;
the step S03 includes:
according to the encryption acquisition types corresponding to different financial data pre-acquisition ranges, performing acquisition priority analysis on the financial data pre-acquisition range to obtain an acquisition priority corresponding to the pre-acquisition range; wherein,
the acquisition priority includes: a first priority, a second priority, a third priority; wherein,
the first priority has the highest priority level, and the third priority has the lowest priority level;
the S03 further includes:
according to the acquisition priority and the corresponding encrypted acquisition type, sequentially acquiring data within a pre-acquisition range to acquire financial data; wherein,
the financial data come from one or more pre-acquisition ranges, and according to the pre-acquisition ranges, the financial data are subjected to labeling analysis and added with financial data labels; wherein,
the data tag includes: a data source label and a data encryption acquisition type label;
the step S04 includes:
screening data, calculating a data effective value and judging the data effective value by comparing the collected financial data with comparison data in a preset financial database; wherein,
when the effective value is not within the preset threshold range, the effective value is invalid financial data, and the financial data validity is detected;
when the effective value is within a preset threshold range, acquiring effective financial data;
the step S04 further includes:
establishing a financial data model according to the effective financial data, carrying out standardized analysis on the financial data model, calculating a model standard value, and judging; wherein,
when the model standard value is within a preset threshold range, the model standard value is a standardized model, and standardized financial data are obtained;
when the standard value of the model is not in the preset threshold range, carrying out standardized screening treatment;
the financial data model includes: a financial continuity model, a financial staging model, a financial expectation model, a financial matching model.
2. A financial data collection standard method as claimed in claim 1, in which the step cipher collection includes the steps of:
step S100: carrying out data acquisition layering on the pre-acquisition range according to the financial target to obtain a financial data acquisition layer; wherein,
the data acquisition layering is used for acquiring an acquisition sequence by dividing the financial data acquisition process into different layers and sequentially acquiring according to the acquisition sequence;
the financial data collection layer comprises: the device comprises a head end acquisition layer, a middle end acquisition layer and a tail end acquisition layer; wherein,
the head end acquisition layer comprises: a first head end acquisition section, a second head end acquisition section and a third head end acquisition section;
step S200: according to the financial data acquisition layer, performing encryption analysis to determine an encryption step grade; wherein,
the encryption analysis is to perform subsection processing on the data acquisition layer according to the financial data pre-acquisition information to obtain financial data acquisition sections, sequentially judge the sections to obtain encryption grades of the sections, and determine encryption step grades according to the encryption grades;
the encryption ladder levels include: a first encryption ladder, a second encryption ladder, and a third encryption ladder; the first encryption ladder has the highest security level, and the third encryption ladder has the lowest security level;
step S300: according to the encryption ladder grade, carrying out ladder encryption processing on each data acquisition section in the financial data acquisition layer in sequence; wherein,
the data acquisition layer can comprise acquisition segments with different encryption ladder levels.
3. A financial data collection criteria method as claimed in claim 1, wherein said annotation analysis includes the steps of:
the method comprises the following steps: performing labeling encryption judgment on the financial data to acquire encryption information; wherein,
when the mark of the financial data does not need to be encrypted, directly adding a financial data label;
when the mark of the financial data needs to be encrypted, acquiring encryption information;
step two: carrying out labeling encryption analysis according to the encryption information to obtain a labeling encryption grade; wherein,
the labeling encryption level comprises: first class labeling, second class labeling and third class labeling; wherein, the encryption grade of one type of label is the highest, and the encryption grade of the three types of labels is the lowest;
step three: and adding a financial data label to the pre-collection range, and encrypting the financial data label according to the labeling encryption level to generate an encryption label.
CN202210088417.2A 2022-01-25 2022-01-25 Financial data acquisition standard method Active CN114511392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210088417.2A CN114511392B (en) 2022-01-25 2022-01-25 Financial data acquisition standard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210088417.2A CN114511392B (en) 2022-01-25 2022-01-25 Financial data acquisition standard method

Publications (2)

Publication Number Publication Date
CN114511392A CN114511392A (en) 2022-05-17
CN114511392B true CN114511392B (en) 2022-08-16

Family

ID=81549524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210088417.2A Active CN114511392B (en) 2022-01-25 2022-01-25 Financial data acquisition standard method

Country Status (1)

Country Link
CN (1) CN114511392B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204809B1 (en) * 2008-08-27 2012-06-19 Accenture Global Services Limited Finance function high performance capability assessment
CN109242661A (en) * 2018-08-22 2019-01-18 重庆满集网络科技有限公司 A kind of financial account tune account implementation method
CN112036995A (en) * 2020-08-20 2020-12-04 深圳市易链信息技术有限公司 Large-scale enterprise financial data management method and system based on block chain and readable storage medium
WO2021012746A1 (en) * 2019-07-24 2021-01-28 深圳壹账通智能科技有限公司 Blockchain-based data encryption method and apparatus, electronic device and storage medium
US10963956B1 (en) * 2016-03-04 2021-03-30 United Services Automobile Association (Usaa) Semantic computer language for exchanging platform-agnostic financial information
CN112950343A (en) * 2021-02-25 2021-06-11 重庆维知达科技有限公司 Enterprise financial data acquisition and processing method and system
CN113269623A (en) * 2021-04-29 2021-08-17 朱雪松 Enterprise financial analysis method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8635101B2 (en) * 2007-07-20 2014-01-21 Daphne A. Wright Apparatus and method for a financial planning faith-based rules database

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204809B1 (en) * 2008-08-27 2012-06-19 Accenture Global Services Limited Finance function high performance capability assessment
US10963956B1 (en) * 2016-03-04 2021-03-30 United Services Automobile Association (Usaa) Semantic computer language for exchanging platform-agnostic financial information
CN109242661A (en) * 2018-08-22 2019-01-18 重庆满集网络科技有限公司 A kind of financial account tune account implementation method
WO2021012746A1 (en) * 2019-07-24 2021-01-28 深圳壹账通智能科技有限公司 Blockchain-based data encryption method and apparatus, electronic device and storage medium
CN112036995A (en) * 2020-08-20 2020-12-04 深圳市易链信息技术有限公司 Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN112950343A (en) * 2021-02-25 2021-06-11 重庆维知达科技有限公司 Enterprise financial data acquisition and processing method and system
CN113269623A (en) * 2021-04-29 2021-08-17 朱雪松 Enterprise financial analysis method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于IMS行政交换网的国家电网财务数据集中管理系统的设计与实现;邹谊等;《新型工业化》;20170420(第04期);全文 *
基于大数据背景的企业财务风险管理研究――以华为技术有限公司为例;邓凡超;《商讯》;20200925(第27期);全文 *

Also Published As

Publication number Publication date
CN114511392A (en) 2022-05-17

Similar Documents

Publication Publication Date Title
WO2022134588A1 (en) Method for constructing information review classification model, and information review method
US11663364B2 (en) Whole-lifecycle encrypted big data analysis method and system for the data from the different sources
Maleki et al. A comprehensive literature review of the rank reversal phenomenon in the analytic hierarchy process
TWI662431B (en) Analysis method and device for open source license
CN110119413A (en) The method and apparatus of data fusion
CN111563074B (en) Data quality detection method and system based on multi-dimensional label
CN113392426A (en) Method and system for enhancing data privacy of an industrial or electrical power system
CN111937076A (en) Improved computing device
CN112422503A (en) Safety classification grading method and system for audit inspection data
CN118114126A (en) Network information integrated management system
Verdugo et al. Assessing data cybersecurity using ISO/IEC 25012
CN114511392B (en) Financial data acquisition standard method
Lahann et al. LSTM-based anomaly detection of process instances: benchmark and tweaks
CN114254909A (en) Risk management method and platform based on decision engine
Brandas et al. Intelligent decision support in auditing: Big Data and machine learning approach
CN117522329A (en) Enterprise management comprehensive application method for big data mining analysis modeling
CN108376140A (en) Government data carding method based on fuzzy matching and device
JP5510031B2 (en) Information security management support method and apparatus
CN114493853A (en) Credit rating evaluation method, credit rating evaluation device, electronic device and storage medium
CN113283677A (en) Index data processing method, device, equipment and storage medium
Qian et al. Green supply chain circular economy evaluation system based on industrial internet of things and blockchain technology under ESG concept. Processes. 2023; 11 (7): 1999
JP6987329B2 (en) Information processing equipment, information processing methods and information processing programs
US20090265201A1 (en) Method and apparatus for determining security solution
Banerjee et al. Improvising the Results of Misuse Case-Oriented Quality Requirements (MCOQR) Framework Metrics: Secondary Objective Perspective
Alyami et al. Implementing Integrity Assurance System for Big Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant