CN104408062B - Security file processing method and device - Google Patents
Security file processing method and device Download PDFInfo
- Publication number
- CN104408062B CN104408062B CN201410594392.9A CN201410594392A CN104408062B CN 104408062 B CN104408062 B CN 104408062B CN 201410594392 A CN201410594392 A CN 201410594392A CN 104408062 B CN104408062 B CN 104408062B
- Authority
- CN
- China
- Prior art keywords
- file
- security
- target
- database
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention provides a security file processing method and a security file processing device, wherein the method comprises the following steps: analyzing the security file, and storing file attribute information obtained by analysis in a database attribute table of the security file; searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file; searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table; and executing the target splitting process, and acquiring at least one splitting result field for carrying out business processing on the security file from a database attribute table of the security file and/or a database business table of the security file. The invention can process security documents with high efficiency and low error rate.
Description
Technical Field
The invention relates to the field of computers, in particular to a security file processing method and device.
Background
With the continuous development of financial field business, the transaction amount of various businesses is continuously increased, various transaction data is continuously increased, so that banks are required to be used as third parties of transactions to represent the interests of property owners, custody of managed properties, clearing of funds under the names of the managed properties, accounting and valuation of the managed properties are completed through a custody system, investment operation of managers is supervised, the interests of property clients are ensured, and certain custody fees are collected. The daily splitting processing mainly aims at differences of various trade documents of an exchange, a deep exchange, a shanghai shang, a Shenzhen shang, a dealer and an insurance company, and carries out analysis processing according to dimensions such as a trade market, a stock category, a service category and the like to form splitting result data in a unified format so as to be convenient for subsequent fund instructions and stock accounts to be registered and used. The splitting in the prior escrow system is mostly realized by manual splitting, the problems of low processing efficiency and high error rate can occur, and a method with high processing efficiency and low error rate is needed to support the daily splitting processing requirement in the face of massive transaction data generated by numerous security types and business types.
Disclosure of Invention
The embodiment of the invention provides a security file processing method and device, which can realize high-efficiency and low-error-rate processing on security files so as to support the requirement of daily splitting.
The invention provides a security file processing method in a first aspect, which comprises the following steps:
analyzing the security file, and storing file attribute information obtained by analysis in a database attribute table of the security file;
searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
and executing the target splitting process, and acquiring at least one splitting result field for carrying out business processing on the security file from a database attribute table of the security file and/or a database business table of the security file.
A second aspect of the present invention provides a security document processing apparatus, which may include:
the analysis unit is used for analyzing the security file and storing the file attribute information obtained by analysis in a database attribute table of the security file;
the first query unit is used for searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
the second query unit is used for searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
and the execution unit is used for executing the target splitting process and obtaining at least one splitting result field for carrying out business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a security document processing method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of another security document processing method in accordance with an embodiment of the present invention;
FIG. 3 is a schematic flow chart diagram of another security document processing method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security document processing apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The security documents mentioned in the embodiments of the present invention may include, but are not limited to: a stock trading data file, a treasury trading data file, or a fund trading data file. The application scenario of the security document processing method of the embodiment of the present invention may be, but is not limited to, in a hosting system of a bank.
Fig. 1 is a schematic flow chart of a security document processing method in an embodiment of the present invention, and as shown in the figure, the security document processing method in the embodiment may include:
s101, analyzing the security file, and storing the file attribute information obtained by analysis in a database attribute table of the security file.
The file attribute information may include, but is not limited to, one or more of a security code, a security category, and a trading place. For example, a security file is transmitted to a hosting system by a Shanghai security exchange, the security file is analyzed by triggering a start operation by a user, and the security category and the trading place obtained by analyzing the security file are stored in a database attribute table corresponding to the security file.
S102, searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the database configuration table is queried according to the file attribute information obtained in step S101 to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example, the file attribute information obtained by analyzing the security file of the Shanghai security exchange includes the security category and the trading place, the business type corresponding to the file is inquired according to the mapping relation between the security category and the trading place in the database configuration table and the business type, and the business type is stored in the database business table corresponding to the security file.
Optionally, when a new service security file appears, before the new service security file is processed, the file attribute information of the new service security file and the corresponding target service information are inserted into the database configuration table, so that after the new service security file is analyzed, the file attribute information of the new service security file obtained through analysis is used for searching the corresponding target service information.
S103, searching a target splitting flow corresponding to the target service information according to the mapping relation between the preset service information and the splitting flow in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting process, and the database configuration table is queried according to the target service information obtained in step S102 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
Optionally, when a new service security file appears, before the new service security file is processed, the target service information of the new service security file and the corresponding target splitting process thereof may be inserted into the database configuration table, so that the target service information of the obtained new service security file is used to search the corresponding target splitting process thereof.
S104, executing the target splitting process, and obtaining at least one splitting result field for carrying out business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, according to the target splitting flow queried in step S103, the target splitting flow is executed, and at least one splitting result field corresponding to each step in the target splitting flow is obtained from the database attribute table in which the file attribute information is stored in step S101 and/or the database service table in which the target service information is stored in step S102. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Fig. 2 is a schematic flow chart of another security document processing method in an embodiment of the present invention, and as shown in the figure, the security document processing method in the embodiment may include:
s201, obtaining the file type of the security file.
The above file types may include, but are not limited to: DBF format, TXT format, EXCEL format, WORD format.
S202, analyzing the security file by using a corresponding analysis mode according to the file type of the security file, and storing the file attribute information obtained by analysis in a database attribute table.
And analyzing the security file by using a corresponding file analysis mode according to the file type obtained in the step S201. For example, if the file type of the file is in the DBF format, the security file is analyzed in an analysis mode corresponding to the DBF format file, and the file attribute information obtained through analysis is stored in the database attribute table.
S203, searching target business information corresponding to the file attribute information of the security file according to the mapping relation between the preset file attribute information and the business information in the database configuration table, and storing the target business information in the database business table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the database configuration table is queried according to the file attribute information obtained in step S202 to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example: the method comprises the steps that file attribute information obtained after analysis of a stock file of a Shanghai stock exchange comprises stock types and trading places, business types corresponding to the stock file are inquired according to the mapping relation between the stock types, the trading places and the business types in a database configuration table, and the business types are stored in a database business table corresponding to the stock file.
And S204, searching a target splitting process corresponding to the target service information according to the mapping relation between the preset service information and the splitting process in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting process, and the database configuration table is queried according to the target service information obtained in step S203 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
S205, executing the target splitting process, and obtaining at least one splitting result field for performing business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, according to the target splitting flow queried in step S204, the target splitting flow is executed, and at least one splitting result field corresponding to each step in the target splitting flow is obtained from the database attribute table in which the file attribute information is stored in step S202 and/or the database service table in which the target service information is stored in step S203. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Fig. 3 is a schematic flow chart of another security document processing method in an embodiment of the present invention, and as shown in the figure, the security document processing method in the embodiment may include:
s301, acquiring the file type of the security file.
The above file types may include, but are not limited to: DBF format, TXT format, EXCEL format, WORD format.
S302, analyzing the security file by using a corresponding analysis mode according to the file type of the security file, and storing the file attribute information obtained by analysis in a database attribute table.
And analyzing the security file by using a corresponding file analysis mode according to the file type obtained in the step S301. For example, if the file type of the file is in the DBF format, the security file is analyzed in an analysis mode corresponding to the DBF format file, and the file attribute information obtained through analysis is stored in the database attribute table.
S303, searching target business information corresponding to the file attribute information of the security file according to the mapping relation between the preset file attribute information and the business information in the database configuration table, and storing the target business information in the database business table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the database configuration table is queried according to the file attribute information obtained in step S302 to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example: the method comprises the steps that file attribute information obtained after analysis of a stock file of a Shanghai stock exchange comprises stock types and trading places, business types corresponding to the stock file are inquired according to the mapping relation between the stock types, the trading places and the business types in a database configuration table, and the business types are stored in a database business table corresponding to the stock file.
S304, searching a target splitting flow corresponding to the target service information according to the preset mapping relation between the service information and the splitting flow in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting process, and the database configuration table is queried according to the target service information obtained in step S303 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
S305, searching a target splitting rule corresponding to the target service information according to the mapping relation between the preset service information and the splitting rule in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting rule, and the database configuration table is queried according to the target service information obtained in step S303 to obtain the corresponding target splitting rule. The splitting rule refers to business rules for confirming whether trade data needs to be cleared or not, whether stock accounts need to be registered or not, clearing dates and delivery dates and the like under dimensions such as trade places, stock categories, buying and selling directions and business types in splitting.
Optionally, when a new service security file appears, before the new service security file is processed, the target service information of the new service security file and the corresponding target splitting rule thereof may be inserted into the database configuration table, so that the obtained target service information of the new service security file is used to search the corresponding target splitting rule thereof.
S306, a processing object is constructed according to the target splitting process, the target splitting process is executed by the processing object, and at least one splitting result field used for carrying out business processing on the security file is obtained from a database attribute table of the security file and/or a database business table of the security file.
Specifically, the target splitting process obtained in step S305 is executed according to the query obtained target splitting rule to construct a processing object, the processing object executes the target splitting process, and at least one splitting result field for performing business processing on the security file is obtained from the database attribute table in which the file attribute information is stored in step S302 and/or the database business table in which the target business information is stored in step S303. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
For example, one step in the target splitting process is to calculate bond interest, and the target splitting rule is bond interest-face value-face rate-time, where the bond face value, the face value-face rate, and the time can be obtained through the database attribute table and/or the database business table, and the bond interest obtained by calculating the above formula is the obtained at least one splitting result field.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Fig. 4 is a schematic structural diagram of a security document processing apparatus according to an embodiment of the present invention, which may include: parsing unit 402, first querying unit 403, second querying unit 404 and executing unit 405.
The parsing unit 402 is configured to parse the security file, and store file attribute information obtained through parsing in a database attribute table of the security file.
The file attribute information may include, but is not limited to, one or more of a security code, a security category, and a trading place. For example, a security file transmitted by the shanghai security exchange is transmitted to the hosting system, and the parsing unit 402 starts parsing the security file by a user triggering start operation, and stores the security category and the trading place obtained by parsing the security file in the database attribute table corresponding to the security file.
The first query unit 403 is configured to search, according to a mapping relationship between file attribute information and service information preset in a database configuration table, target service information corresponding to the file attribute information of the security file, and store the target service information in a database service table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the first query unit 403 queries the database configuration table according to the file attribute information obtained by the analysis unit 402, so as to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example, the file attribute information obtained by analyzing the security file of the Shanghai security exchange includes the security category and the trading place, the business type corresponding to the file is inquired according to the mapping relation between the security category and the trading place in the database configuration table and the business type, and the business type is stored in the database business table corresponding to the security file.
A second query unit 404, configured to search a target splitting flow corresponding to the target service information according to a mapping relationship between service information and the splitting flow preset in the database configuration table.
Specifically, before processing a file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between service information and a splitting process, and the second querying unit 404 queries the database configuration table according to the target service information obtained by the first querying unit 403 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
An executing unit 405, configured to execute the target splitting process, and obtain at least one splitting result field used for performing business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, the executing unit 405 executes the target splitting flow according to the target splitting flow queried by the second querying unit 404, and obtains at least one splitting result field corresponding to each step in the target splitting flow from the database attribute table in which the first querying unit 403 stores the file attribute information and/or the database service table in which the second querying unit 404 stores the target service information. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
Optionally, the apparatus may further include an obtaining unit 401, configured to obtain a file type of the security file, so that the parsing unit 402 parses the file to be split according to the file type of the file to be processed in a corresponding parsing manner, and stores file content obtained through parsing in a database attribute table. The above file types may include, but are not limited to: DBF format, TXT format, EXCEL format, WORD format.
Optionally, the apparatus may further include a third query unit 406, configured to search for a target splitting rule corresponding to the target service information according to a mapping relationship between service information and the splitting rule preset in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting rule, and the database configuration table is queried according to the target service information obtained by the first querying unit 403 to obtain the corresponding target splitting rule. The splitting rule refers to business rules for confirming whether trade data needs to be cleared or not, whether stock accounts need to be registered or not, clearing dates and delivery dates and the like under dimensions such as trade places, stock categories, buying and selling directions and business types in splitting.
Further optionally, the executing unit 405 may be configured to construct a processing object according to the target splitting procedure, execute the target splitting procedure by the processing object, and obtain at least one splitting result field used for performing business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, the executing unit 405 constructs a processing object according to the target splitting process obtained by querying by the second querying unit 404, executes the target splitting process obtained by the third querying unit 406 by using the processing object, and obtains at least one splitting result field for performing business processing on the security file from the database attribute table in which the file attribute information is stored in the parsing unit 402 and/or the database business table in which the target business information is stored in the first querying unit 403. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
For example, one step in the target splitting process is to calculate bond interest of national bonds, and the target splitting rule is bond interest-face value-face time, where the bond face value, the face value-face value and the face value-face time can be obtained through the database attribute table and/or the database business table, and the bond interest obtained through calculating the above formula is the obtained at least one splitting result.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.
Claims (10)
1. A security document processing method, comprising:
analyzing the security file, and storing file attribute information obtained by analysis in a database attribute table of the security file;
searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
searching a target splitting rule corresponding to the target service information according to a mapping relation between preset service information and the splitting rule in the database configuration table;
and executing the target splitting process according to the target splitting rule, so as to obtain file attribute information and/or target business information which accord with the target splitting rule from a database attribute table and/or a database business table of the security file, and then obtaining at least one splitting result field for carrying out business processing on the security file according to the file attribute information and/or the target business information which accord with the target splitting rule.
2. The method of claim 1, wherein parsing the security file and storing the parsed file attribute information in a database attribute table of the security file comprises:
and acquiring the file type of the security file, analyzing the security file in a corresponding analysis mode according to the file type of the security file, and storing file attribute information obtained by analysis in a database attribute table.
3. The method of claim 1, wherein the file attribute information comprises a security code, a security type, or a trading floor.
4. The method of claim 1, wherein the traffic information comprises a traffic category, a transaction direction, or a settlement.
5. The method of claim 1, wherein said performing the target splitting procedure to obtain at least one split result field from a database attribute table of the security file and/or a database business table of the security file for business processing of the security file comprises:
and constructing a processing object according to the target splitting flow, executing the target splitting flow by the processing object, and acquiring at least one splitting result field for carrying out business processing on the security file from a database attribute table of the security file and/or a database business table of the security file.
6. A security document processing apparatus, comprising:
the analysis unit is used for analyzing the security file and storing the file attribute information obtained by analysis in a database attribute table of the security file;
the first query unit is used for searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
the second query unit is used for searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
the third query unit is used for searching a target splitting rule corresponding to the target service information according to a mapping relation between preset service information and the splitting rule in the database configuration table;
and the execution unit is used for executing the target splitting process according to the target splitting rule, acquiring file attribute information and/or target business information which accord with the target splitting rule from a database attribute table and/or a database business table of the security file, and then obtaining at least one splitting result field for carrying out business processing on the security file according to the file attribute information and/or the target business information which accord with the target splitting rule.
7. The apparatus according to claim 6, further comprising an obtaining unit configured to obtain a file type of the security file, so that the parsing unit parses the security file according to the file type of the security file by using a corresponding parsing method, and stores the parsed file attribute information in a database attribute table.
8. The apparatus of claim 6, wherein the file attribute information comprises a security code, a security type, or a trading floor.
9. The apparatus of claim 6, wherein the traffic information comprises a traffic class, a transaction direction, or a settlement.
10. The apparatus according to claim 6, wherein the execution unit is configured to construct a processing object according to the target splitting procedure, execute the target splitting procedure by the processing object, and obtain at least one splitting result field for performing business processing on the security file from a database attribute table of the security file and/or a database business table of the security file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410594392.9A CN104408062B (en) | 2014-10-29 | 2014-10-29 | Security file processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410594392.9A CN104408062B (en) | 2014-10-29 | 2014-10-29 | Security file processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104408062A CN104408062A (en) | 2015-03-11 |
CN104408062B true CN104408062B (en) | 2020-01-21 |
Family
ID=52645694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410594392.9A Active CN104408062B (en) | 2014-10-29 | 2014-10-29 | Security file processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104408062B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107274291B (en) * | 2017-06-21 | 2020-08-04 | 况客科技(北京)有限公司 | Cross-platform valuation table analysis method, storage medium and application server |
CN108304554B (en) * | 2018-02-02 | 2020-07-28 | 平安证券股份有限公司 | File splitting method and device, computer equipment and storage medium |
CN112099848B (en) * | 2020-09-11 | 2024-03-05 | 杭州海康威视数字技术股份有限公司 | Service processing method, device and equipment |
CN112463809A (en) * | 2020-12-03 | 2021-03-09 | 中国建设银行股份有限公司 | Bond information maintenance method, device, equipment and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007059978A1 (en) * | 2005-11-23 | 2007-05-31 | Ubs Ag | Computer-implemented system for producing, processing and managing structured data sets |
CN101216907A (en) * | 2007-12-29 | 2008-07-09 | 中国建设银行股份有限公司 | Service data processing method and its system |
CN102707993A (en) * | 2012-04-11 | 2012-10-03 | 招商银行股份有限公司 | System and method for centralized processing of service |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398812B (en) * | 2007-09-27 | 2012-05-30 | 国际商业机器公司 | Apparatus and method for generating electric table with service logic |
-
2014
- 2014-10-29 CN CN201410594392.9A patent/CN104408062B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007059978A1 (en) * | 2005-11-23 | 2007-05-31 | Ubs Ag | Computer-implemented system for producing, processing and managing structured data sets |
CN101216907A (en) * | 2007-12-29 | 2008-07-09 | 中国建设银行股份有限公司 | Service data processing method and its system |
CN102707993A (en) * | 2012-04-11 | 2012-10-03 | 招商银行股份有限公司 | System and method for centralized processing of service |
Also Published As
Publication number | Publication date |
---|---|
CN104408062A (en) | 2015-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109543096B (en) | Data query method, device, computer equipment and storage medium | |
US10825093B2 (en) | Mapping consumer ownership of financial assets to geographic localities and computer-implemented methods and computer systems thereof | |
CN104408062B (en) | Security file processing method and device | |
CN111382279A (en) | Order examination method and device | |
US20240185342A1 (en) | Systems and methods for trades priced relative to a reference benchmark value associated with an underlying index future | |
Katselas et al. | Know your industry: The implications of using static GICS classifications in financial research | |
US20150046304A1 (en) | Analysis of e-receipts for charitable donations | |
Jakobsen | Does democracy moderate the obsolescing bargain mechanism?--an empirical analysis, 1983-2001 | |
US20200104735A1 (en) | Systems and methods for fuzzy symbol mapping and architecture | |
KR20130082719A (en) | Apparatus and method for financial data inquiry | |
Rizkiana et al. | Analyzing the impact of investor sentiment in social media to stock return: Survival analysis approach | |
US20180137564A1 (en) | Systems and computer-implemented processes for occupational risk assessment | |
CN114417089A (en) | Query method, query device, terminal equipment and computer readable storage medium | |
KR20130135810A (en) | System and a method for trading stocks automatically based on opinion mining, and a storage medium storing a program thereof | |
CA2894797C (en) | Trading opportunities based on public ticker data | |
KR20150062637A (en) | Real Time Stock Information Analysis System Based on Big Data considering Reliability | |
CN111369370A (en) | Estimation table processing method, device, server and storage medium | |
Kontonikas et al. | Treasuries variance decomposition and the impact of monetary policy | |
US20230117941A1 (en) | System and Process For Tracking Liquidity Pool Tokens | |
US20140258053A1 (en) | System and method for accounting of financial instruments | |
US20220067748A1 (en) | System and method for document management and collaboration | |
KR102107551B1 (en) | Stock number calculation method for determining accurate share ratio | |
US20140214699A1 (en) | Managing intellectual property asset transaction information in a networked computing environment | |
Freybote et al. | Dispositional joint ventures as REIT financing strategy | |
CN116703415A (en) | Inquiry letter information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |