CN104408062B - Security file processing method and device - Google Patents

Security file processing method and device Download PDF

Info

Publication number
CN104408062B
CN104408062B CN201410594392.9A CN201410594392A CN104408062B CN 104408062 B CN104408062 B CN 104408062B CN 201410594392 A CN201410594392 A CN 201410594392A CN 104408062 B CN104408062 B CN 104408062B
Authority
CN
China
Prior art keywords
file
security
target
database
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410594392.9A
Other languages
Chinese (zh)
Other versions
CN104408062A (en
Inventor
蒋玉树
吴磊
陈德栋
王振骞
范钟艺
葛亮
罗海南
彭建恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN201410594392.9A priority Critical patent/CN104408062B/en
Publication of CN104408062A publication Critical patent/CN104408062A/en
Application granted granted Critical
Publication of CN104408062B publication Critical patent/CN104408062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention provides a security file processing method and a security file processing device, wherein the method comprises the following steps: analyzing the security file, and storing file attribute information obtained by analysis in a database attribute table of the security file; searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file; searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table; and executing the target splitting process, and acquiring at least one splitting result field for carrying out business processing on the security file from a database attribute table of the security file and/or a database business table of the security file. The invention can process security documents with high efficiency and low error rate.

Description

Security file processing method and device
Technical Field
The invention relates to the field of computers, in particular to a security file processing method and device.
Background
With the continuous development of financial field business, the transaction amount of various businesses is continuously increased, various transaction data is continuously increased, so that banks are required to be used as third parties of transactions to represent the interests of property owners, custody of managed properties, clearing of funds under the names of the managed properties, accounting and valuation of the managed properties are completed through a custody system, investment operation of managers is supervised, the interests of property clients are ensured, and certain custody fees are collected. The daily splitting processing mainly aims at differences of various trade documents of an exchange, a deep exchange, a shanghai shang, a Shenzhen shang, a dealer and an insurance company, and carries out analysis processing according to dimensions such as a trade market, a stock category, a service category and the like to form splitting result data in a unified format so as to be convenient for subsequent fund instructions and stock accounts to be registered and used. The splitting in the prior escrow system is mostly realized by manual splitting, the problems of low processing efficiency and high error rate can occur, and a method with high processing efficiency and low error rate is needed to support the daily splitting processing requirement in the face of massive transaction data generated by numerous security types and business types.
Disclosure of Invention
The embodiment of the invention provides a security file processing method and device, which can realize high-efficiency and low-error-rate processing on security files so as to support the requirement of daily splitting.
The invention provides a security file processing method in a first aspect, which comprises the following steps:
analyzing the security file, and storing file attribute information obtained by analysis in a database attribute table of the security file;
searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
and executing the target splitting process, and acquiring at least one splitting result field for carrying out business processing on the security file from a database attribute table of the security file and/or a database business table of the security file.
A second aspect of the present invention provides a security document processing apparatus, which may include:
the analysis unit is used for analyzing the security file and storing the file attribute information obtained by analysis in a database attribute table of the security file;
the first query unit is used for searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
the second query unit is used for searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
and the execution unit is used for executing the target splitting process and obtaining at least one splitting result field for carrying out business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a security document processing method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of another security document processing method in accordance with an embodiment of the present invention;
FIG. 3 is a schematic flow chart diagram of another security document processing method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security document processing apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The security documents mentioned in the embodiments of the present invention may include, but are not limited to: a stock trading data file, a treasury trading data file, or a fund trading data file. The application scenario of the security document processing method of the embodiment of the present invention may be, but is not limited to, in a hosting system of a bank.
Fig. 1 is a schematic flow chart of a security document processing method in an embodiment of the present invention, and as shown in the figure, the security document processing method in the embodiment may include:
s101, analyzing the security file, and storing the file attribute information obtained by analysis in a database attribute table of the security file.
The file attribute information may include, but is not limited to, one or more of a security code, a security category, and a trading place. For example, a security file is transmitted to a hosting system by a Shanghai security exchange, the security file is analyzed by triggering a start operation by a user, and the security category and the trading place obtained by analyzing the security file are stored in a database attribute table corresponding to the security file.
S102, searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the database configuration table is queried according to the file attribute information obtained in step S101 to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example, the file attribute information obtained by analyzing the security file of the Shanghai security exchange includes the security category and the trading place, the business type corresponding to the file is inquired according to the mapping relation between the security category and the trading place in the database configuration table and the business type, and the business type is stored in the database business table corresponding to the security file.
Optionally, when a new service security file appears, before the new service security file is processed, the file attribute information of the new service security file and the corresponding target service information are inserted into the database configuration table, so that after the new service security file is analyzed, the file attribute information of the new service security file obtained through analysis is used for searching the corresponding target service information.
S103, searching a target splitting flow corresponding to the target service information according to the mapping relation between the preset service information and the splitting flow in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting process, and the database configuration table is queried according to the target service information obtained in step S102 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
Optionally, when a new service security file appears, before the new service security file is processed, the target service information of the new service security file and the corresponding target splitting process thereof may be inserted into the database configuration table, so that the target service information of the obtained new service security file is used to search the corresponding target splitting process thereof.
S104, executing the target splitting process, and obtaining at least one splitting result field for carrying out business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, according to the target splitting flow queried in step S103, the target splitting flow is executed, and at least one splitting result field corresponding to each step in the target splitting flow is obtained from the database attribute table in which the file attribute information is stored in step S101 and/or the database service table in which the target service information is stored in step S102. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Fig. 2 is a schematic flow chart of another security document processing method in an embodiment of the present invention, and as shown in the figure, the security document processing method in the embodiment may include:
s201, obtaining the file type of the security file.
The above file types may include, but are not limited to: DBF format, TXT format, EXCEL format, WORD format.
S202, analyzing the security file by using a corresponding analysis mode according to the file type of the security file, and storing the file attribute information obtained by analysis in a database attribute table.
And analyzing the security file by using a corresponding file analysis mode according to the file type obtained in the step S201. For example, if the file type of the file is in the DBF format, the security file is analyzed in an analysis mode corresponding to the DBF format file, and the file attribute information obtained through analysis is stored in the database attribute table.
S203, searching target business information corresponding to the file attribute information of the security file according to the mapping relation between the preset file attribute information and the business information in the database configuration table, and storing the target business information in the database business table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the database configuration table is queried according to the file attribute information obtained in step S202 to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example: the method comprises the steps that file attribute information obtained after analysis of a stock file of a Shanghai stock exchange comprises stock types and trading places, business types corresponding to the stock file are inquired according to the mapping relation between the stock types, the trading places and the business types in a database configuration table, and the business types are stored in a database business table corresponding to the stock file.
And S204, searching a target splitting process corresponding to the target service information according to the mapping relation between the preset service information and the splitting process in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting process, and the database configuration table is queried according to the target service information obtained in step S203 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
S205, executing the target splitting process, and obtaining at least one splitting result field for performing business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, according to the target splitting flow queried in step S204, the target splitting flow is executed, and at least one splitting result field corresponding to each step in the target splitting flow is obtained from the database attribute table in which the file attribute information is stored in step S202 and/or the database service table in which the target service information is stored in step S203. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Fig. 3 is a schematic flow chart of another security document processing method in an embodiment of the present invention, and as shown in the figure, the security document processing method in the embodiment may include:
s301, acquiring the file type of the security file.
The above file types may include, but are not limited to: DBF format, TXT format, EXCEL format, WORD format.
S302, analyzing the security file by using a corresponding analysis mode according to the file type of the security file, and storing the file attribute information obtained by analysis in a database attribute table.
And analyzing the security file by using a corresponding file analysis mode according to the file type obtained in the step S301. For example, if the file type of the file is in the DBF format, the security file is analyzed in an analysis mode corresponding to the DBF format file, and the file attribute information obtained through analysis is stored in the database attribute table.
S303, searching target business information corresponding to the file attribute information of the security file according to the mapping relation between the preset file attribute information and the business information in the database configuration table, and storing the target business information in the database business table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the database configuration table is queried according to the file attribute information obtained in step S302 to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example: the method comprises the steps that file attribute information obtained after analysis of a stock file of a Shanghai stock exchange comprises stock types and trading places, business types corresponding to the stock file are inquired according to the mapping relation between the stock types, the trading places and the business types in a database configuration table, and the business types are stored in a database business table corresponding to the stock file.
S304, searching a target splitting flow corresponding to the target service information according to the preset mapping relation between the service information and the splitting flow in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting process, and the database configuration table is queried according to the target service information obtained in step S303 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
S305, searching a target splitting rule corresponding to the target service information according to the mapping relation between the preset service information and the splitting rule in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting rule, and the database configuration table is queried according to the target service information obtained in step S303 to obtain the corresponding target splitting rule. The splitting rule refers to business rules for confirming whether trade data needs to be cleared or not, whether stock accounts need to be registered or not, clearing dates and delivery dates and the like under dimensions such as trade places, stock categories, buying and selling directions and business types in splitting.
Optionally, when a new service security file appears, before the new service security file is processed, the target service information of the new service security file and the corresponding target splitting rule thereof may be inserted into the database configuration table, so that the obtained target service information of the new service security file is used to search the corresponding target splitting rule thereof.
S306, a processing object is constructed according to the target splitting process, the target splitting process is executed by the processing object, and at least one splitting result field used for carrying out business processing on the security file is obtained from a database attribute table of the security file and/or a database business table of the security file.
Specifically, the target splitting process obtained in step S305 is executed according to the query obtained target splitting rule to construct a processing object, the processing object executes the target splitting process, and at least one splitting result field for performing business processing on the security file is obtained from the database attribute table in which the file attribute information is stored in step S302 and/or the database business table in which the target business information is stored in step S303. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
For example, one step in the target splitting process is to calculate bond interest, and the target splitting rule is bond interest-face value-face rate-time, where the bond face value, the face value-face rate, and the time can be obtained through the database attribute table and/or the database business table, and the bond interest obtained by calculating the above formula is the obtained at least one splitting result field.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
Fig. 4 is a schematic structural diagram of a security document processing apparatus according to an embodiment of the present invention, which may include: parsing unit 402, first querying unit 403, second querying unit 404 and executing unit 405.
The parsing unit 402 is configured to parse the security file, and store file attribute information obtained through parsing in a database attribute table of the security file.
The file attribute information may include, but is not limited to, one or more of a security code, a security category, and a trading place. For example, a security file transmitted by the shanghai security exchange is transmitted to the hosting system, and the parsing unit 402 starts parsing the security file by a user triggering start operation, and stores the security category and the trading place obtained by parsing the security file in the database attribute table corresponding to the security file.
The first query unit 403 is configured to search, according to a mapping relationship between file attribute information and service information preset in a database configuration table, target service information corresponding to the file attribute information of the security file, and store the target service information in a database service table of the security file.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the file attribute information and the service information, and the first query unit 403 queries the database configuration table according to the file attribute information obtained by the analysis unit 402, so as to obtain the corresponding target service information. The service information includes, but is not limited to, one or more of service category, transaction direction and settlement. For example, the file attribute information obtained by analyzing the security file of the Shanghai security exchange includes the security category and the trading place, the business type corresponding to the file is inquired according to the mapping relation between the security category and the trading place in the database configuration table and the business type, and the business type is stored in the database business table corresponding to the security file.
A second query unit 404, configured to search a target splitting flow corresponding to the target service information according to a mapping relationship between service information and the splitting flow preset in the database configuration table.
Specifically, before processing a file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between service information and a splitting process, and the second querying unit 404 queries the database configuration table according to the target service information obtained by the first querying unit 403 to obtain a corresponding target splitting process. For example, the processing flow of a common stock trading file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; and calculating clearing funds. For another example, the processing flow of the treasury trade file may include: acquiring basic information of a transaction; acquiring a corresponding asset combination according to the shareholder account; judging whether clearing is performed or not, whether a stock account needs to be registered or not, and acquiring a post-house date; calculating various fees; calculating clearing funds; calculating bond interest; calculating the buyback income, constituting buyback due data and the like.
An executing unit 405, configured to execute the target splitting process, and obtain at least one splitting result field used for performing business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, the executing unit 405 executes the target splitting flow according to the target splitting flow queried by the second querying unit 404, and obtains at least one splitting result field corresponding to each step in the target splitting flow from the database attribute table in which the first querying unit 403 stores the file attribute information and/or the database service table in which the second querying unit 404 stores the target service information. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
Optionally, the apparatus may further include an obtaining unit 401, configured to obtain a file type of the security file, so that the parsing unit 402 parses the file to be split according to the file type of the file to be processed in a corresponding parsing manner, and stores file content obtained through parsing in a database attribute table. The above file types may include, but are not limited to: DBF format, TXT format, EXCEL format, WORD format.
Optionally, the apparatus may further include a third query unit 406, configured to search for a target splitting rule corresponding to the target service information according to a mapping relationship between service information and the splitting rule preset in the database configuration table.
Specifically, before processing the file, a database configuration table is established in the database, where the database configuration table includes a mapping relationship between the service information and the splitting rule, and the database configuration table is queried according to the target service information obtained by the first querying unit 403 to obtain the corresponding target splitting rule. The splitting rule refers to business rules for confirming whether trade data needs to be cleared or not, whether stock accounts need to be registered or not, clearing dates and delivery dates and the like under dimensions such as trade places, stock categories, buying and selling directions and business types in splitting.
Further optionally, the executing unit 405 may be configured to construct a processing object according to the target splitting procedure, execute the target splitting procedure by the processing object, and obtain at least one splitting result field used for performing business processing on the security file from the database attribute table of the security file and/or the database business table of the security file.
Specifically, the executing unit 405 constructs a processing object according to the target splitting process obtained by querying by the second querying unit 404, executes the target splitting process obtained by the third querying unit 406 by using the processing object, and obtains at least one splitting result field for performing business processing on the security file from the database attribute table in which the file attribute information is stored in the parsing unit 402 and/or the database business table in which the target business information is stored in the first querying unit 403. The at least one split result field includes, but is not limited to: one or more of a security code, a security type, a transaction location, a business category, a transaction direction, and a clearance.
For example, one step in the target splitting process is to calculate bond interest of national bonds, and the target splitting rule is bond interest-face value-face time, where the bond face value, the face value-face value and the face value-face time can be obtained through the database attribute table and/or the database business table, and the bond interest obtained through calculating the above formula is the obtained at least one splitting result.
The embodiment of the invention analyzes the security file, queries the preset database configuration table by the file attribute information obtained by analysis to obtain the corresponding target business information, queries the preset database configuration table by the target business information to obtain the corresponding target splitting process, executes the target splitting process to obtain at least one splitting result field for carrying out business processing on the security file, completes the processing on the security file by utilizing the association between the database tables, and improves the processing efficiency and the accuracy.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. A security document processing method, comprising:
analyzing the security file, and storing file attribute information obtained by analysis in a database attribute table of the security file;
searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
searching a target splitting rule corresponding to the target service information according to a mapping relation between preset service information and the splitting rule in the database configuration table;
and executing the target splitting process according to the target splitting rule, so as to obtain file attribute information and/or target business information which accord with the target splitting rule from a database attribute table and/or a database business table of the security file, and then obtaining at least one splitting result field for carrying out business processing on the security file according to the file attribute information and/or the target business information which accord with the target splitting rule.
2. The method of claim 1, wherein parsing the security file and storing the parsed file attribute information in a database attribute table of the security file comprises:
and acquiring the file type of the security file, analyzing the security file in a corresponding analysis mode according to the file type of the security file, and storing file attribute information obtained by analysis in a database attribute table.
3. The method of claim 1, wherein the file attribute information comprises a security code, a security type, or a trading floor.
4. The method of claim 1, wherein the traffic information comprises a traffic category, a transaction direction, or a settlement.
5. The method of claim 1, wherein said performing the target splitting procedure to obtain at least one split result field from a database attribute table of the security file and/or a database business table of the security file for business processing of the security file comprises:
and constructing a processing object according to the target splitting flow, executing the target splitting flow by the processing object, and acquiring at least one splitting result field for carrying out business processing on the security file from a database attribute table of the security file and/or a database business table of the security file.
6. A security document processing apparatus, comprising:
the analysis unit is used for analyzing the security file and storing the file attribute information obtained by analysis in a database attribute table of the security file;
the first query unit is used for searching target business information corresponding to the file attribute information of the security file according to a mapping relation between preset file attribute information and business information in a database configuration table, and storing the target business information in a database business table of the security file;
the second query unit is used for searching a target splitting flow corresponding to the target service information according to a mapping relation between preset service information and the splitting flow in the database configuration table;
the third query unit is used for searching a target splitting rule corresponding to the target service information according to a mapping relation between preset service information and the splitting rule in the database configuration table;
and the execution unit is used for executing the target splitting process according to the target splitting rule, acquiring file attribute information and/or target business information which accord with the target splitting rule from a database attribute table and/or a database business table of the security file, and then obtaining at least one splitting result field for carrying out business processing on the security file according to the file attribute information and/or the target business information which accord with the target splitting rule.
7. The apparatus according to claim 6, further comprising an obtaining unit configured to obtain a file type of the security file, so that the parsing unit parses the security file according to the file type of the security file by using a corresponding parsing method, and stores the parsed file attribute information in a database attribute table.
8. The apparatus of claim 6, wherein the file attribute information comprises a security code, a security type, or a trading floor.
9. The apparatus of claim 6, wherein the traffic information comprises a traffic class, a transaction direction, or a settlement.
10. The apparatus according to claim 6, wherein the execution unit is configured to construct a processing object according to the target splitting procedure, execute the target splitting procedure by the processing object, and obtain at least one splitting result field for performing business processing on the security file from a database attribute table of the security file and/or a database business table of the security file.
CN201410594392.9A 2014-10-29 2014-10-29 Security file processing method and device Active CN104408062B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410594392.9A CN104408062B (en) 2014-10-29 2014-10-29 Security file processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410594392.9A CN104408062B (en) 2014-10-29 2014-10-29 Security file processing method and device

Publications (2)

Publication Number Publication Date
CN104408062A CN104408062A (en) 2015-03-11
CN104408062B true CN104408062B (en) 2020-01-21

Family

ID=52645694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410594392.9A Active CN104408062B (en) 2014-10-29 2014-10-29 Security file processing method and device

Country Status (1)

Country Link
CN (1) CN104408062B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274291B (en) * 2017-06-21 2020-08-04 况客科技(北京)有限公司 Cross-platform valuation table analysis method, storage medium and application server
CN108304554B (en) * 2018-02-02 2020-07-28 平安证券股份有限公司 File splitting method and device, computer equipment and storage medium
CN112099848B (en) * 2020-09-11 2024-03-05 杭州海康威视数字技术股份有限公司 Service processing method, device and equipment
CN112463809A (en) * 2020-12-03 2021-03-09 中国建设银行股份有限公司 Bond information maintenance method, device, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007059978A1 (en) * 2005-11-23 2007-05-31 Ubs Ag Computer-implemented system for producing, processing and managing structured data sets
CN101216907A (en) * 2007-12-29 2008-07-09 中国建设银行股份有限公司 Service data processing method and its system
CN102707993A (en) * 2012-04-11 2012-10-03 招商银行股份有限公司 System and method for centralized processing of service

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398812B (en) * 2007-09-27 2012-05-30 国际商业机器公司 Apparatus and method for generating electric table with service logic

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007059978A1 (en) * 2005-11-23 2007-05-31 Ubs Ag Computer-implemented system for producing, processing and managing structured data sets
CN101216907A (en) * 2007-12-29 2008-07-09 中国建设银行股份有限公司 Service data processing method and its system
CN102707993A (en) * 2012-04-11 2012-10-03 招商银行股份有限公司 System and method for centralized processing of service

Also Published As

Publication number Publication date
CN104408062A (en) 2015-03-11

Similar Documents

Publication Publication Date Title
CN109543096B (en) Data query method, device, computer equipment and storage medium
US10825093B2 (en) Mapping consumer ownership of financial assets to geographic localities and computer-implemented methods and computer systems thereof
CN104408062B (en) Security file processing method and device
CN111382279A (en) Order examination method and device
US20240185342A1 (en) Systems and methods for trades priced relative to a reference benchmark value associated with an underlying index future
Katselas et al. Know your industry: The implications of using static GICS classifications in financial research
US20150046304A1 (en) Analysis of e-receipts for charitable donations
Jakobsen Does democracy moderate the obsolescing bargain mechanism?--an empirical analysis, 1983-2001
US20200104735A1 (en) Systems and methods for fuzzy symbol mapping and architecture
KR20130082719A (en) Apparatus and method for financial data inquiry
Rizkiana et al. Analyzing the impact of investor sentiment in social media to stock return: Survival analysis approach
US20180137564A1 (en) Systems and computer-implemented processes for occupational risk assessment
CN114417089A (en) Query method, query device, terminal equipment and computer readable storage medium
KR20130135810A (en) System and a method for trading stocks automatically based on opinion mining, and a storage medium storing a program thereof
CA2894797C (en) Trading opportunities based on public ticker data
KR20150062637A (en) Real Time Stock Information Analysis System Based on Big Data considering Reliability
CN111369370A (en) Estimation table processing method, device, server and storage medium
Kontonikas et al. Treasuries variance decomposition and the impact of monetary policy
US20230117941A1 (en) System and Process For Tracking Liquidity Pool Tokens
US20140258053A1 (en) System and method for accounting of financial instruments
US20220067748A1 (en) System and method for document management and collaboration
KR102107551B1 (en) Stock number calculation method for determining accurate share ratio
US20140214699A1 (en) Managing intellectual property asset transaction information in a networked computing environment
Freybote et al. Dispositional joint ventures as REIT financing strategy
CN116703415A (en) Inquiry letter information processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant