Disclosure of Invention
The embodiment of the invention provides a financial data synchronization method and a system, which can customize encryption strategies by combining different terminal information so as to flexibly and efficiently encrypt related financial data.
In a first aspect of an embodiment of the present invention, there is provided a financial data synchronization method, including:
the server analyzes the financial data in the data table to be synchronized, which is uploaded by the synchronization request end, and obtains the information of property, the financial category information and the financial numerical value information, and the server retrieves a preset synchronization data table corresponding to the synchronization request end, wherein columns of the preset synchronization data table have grade information and/or identity information;
dividing financial data in a data table to be synchronized into fixed encrypted financial data and dynamic unencrypted financial data based on the preset synchronous data table, and processing the preset synchronous data table based on the encrypted financial data and the unencrypted financial data to obtain a total synchronous data table;
the data authority structure corresponding to the total synchronous data table and the synchronous receiving end corresponding to the synchronous request end are called, specific identity information of each synchronous receiving end is obtained, and multidimensional data processing is carried out on the total synchronous data table based on the specific identity information and the data authority structure to obtain a specific synchronous data table;
comparing the specific synchronous data table with the total synchronous data table to generate corresponding online table processing information, and counting the online table processing information of all synchronous receiving ends to obtain online generation tables which are stored corresponding to the total synchronous data table;
And generating access links corresponding to each specific synchronous data table, sending the specific synchronous data tables and the access links to corresponding synchronous receiving terminals, and obtaining temporary synchronous data tables corresponding to the specific synchronous data tables based on an online generation table when judging that the synchronous receiving terminals access based on the access links.
Optionally, in one possible implementation manner of the first aspect, the classifying, based on the preset synchronization data table, the financial data in the to-be-synchronized data table into fixed encrypted financial data and dynamic non-encrypted financial data, and processing the preset synchronization data table based on the encrypted financial data and the non-encrypted financial data to obtain a total synchronization data table includes:
traversing the financial category information of the columns in the preset synchronous data table and comparing the financial category information with the financial category information in the data table to be synchronized, if the financial category information is consistent with the financial category information, adding a first label to the corresponding column in the preset synchronous data table, and if the financial category information is inconsistent with the financial category information, adding a second label to the corresponding column in the data table to be synchronized;
taking the financial data with no tag added in the data table to be synchronized as fixed encrypted financial data, and taking the financial data with a second tag added in the data table to be synchronized as dynamic unencrypted financial data;
And processing the preset synchronous data table based on the first label, the second label and the non-encrypted financial data to obtain a total synchronous data table.
Optionally, in a possible implementation manner of the first aspect, the processing the preset synchronization data table based on the first tag, the second tag, the encrypted financial data, and the unencrypted financial data to obtain a total synchronization data table includes:
Eliminating columns without a first label in a preset synchronous data table and financial category information in the columns, and merging the rest columns to obtain an encrypted column area;
sequentially traversing columns without adding a second label in the data table to be synchronized, extracting corresponding financial value information and property belonging information, and filling the corresponding financial value information and property belonging information into the columns corresponding to the financial category information in the preset synchronous data table;
a non-encryption column region is established at the lower part of the encryption column region, columns added with a second label in the data table to be synchronized are sequentially traversed, and corresponding financial category information, financial numerical value information and property information are extracted;
And establishing a corresponding column in the unencrypted column area based on the financial category information, the financial numerical information and the property information to obtain a total synchronous data table.
Optionally, in one possible implementation manner of the first aspect, the invoking the data authority structure corresponding to the total synchronization data table and the synchronization receiving end corresponding to the synchronization request end, obtaining specific identity information of each synchronization receiving end, and performing multidimensional data processing on the total synchronization data table based on the specific identity information and the data authority structure to obtain the specific synchronization data table includes:
The method comprises the steps of calling a data authority structure and a synchronous receiving end corresponding to synchronous request ends, wherein each synchronous request end is provided with a preset data authority structure and a synchronous receiving end;
Acquiring specific identity information of each synchronous receiving end, and copying the total synchronous data table to obtain a total synchronous data table corresponding to the specific identity information;
and carrying out multidimensional data processing on the copied total synchronous data table based on the specific identity information and the data authority structure to obtain the specific synchronous data table.
Optionally, in one possible implementation manner of the first aspect, the performing multidimensional data processing on the replicated total synchronization data table based on the specific identity information and the data authority structure to obtain a specific synchronization data table includes:
Determining that a non-encryption tag is added to a column corresponding to the property belonging information consistent with the specific identity information in the encrypted column area in the copied total synchronous data table;
Comparing the specific identity information with the data authority structure, and determining a node of a lower dimension corresponding to the specific identity information to obtain a node identity set;
determining that a non-encryption tag is added to a column corresponding to information of properties consistent with a node identity set in an encryption column region in a copied total synchronous data table, wherein the information of properties has corresponding identity information;
And encrypting the column without the non-encryption tag in the encrypted column area.
Optionally, in one possible implementation manner of the first aspect, the comparing the specific identity information with the data authority structure, determining a node of a lower dimension corresponding to the specific identity information to obtain a node identity set includes:
the data authority structure is a tree structure, and each node in the tree structure has corresponding identity information;
Determining a node corresponding to specific identity information in a tree structure as a first node, and counting connected nodes of a lower dimension corresponding to the first node as a second node;
And counting the identity information corresponding to all the second nodes to obtain a node identity set.
Optionally, in one possible implementation manner of the first aspect, the encrypting the column without the unencrypted tag in the encrypted column area includes:
counting the serial numbers of columns without non-encryption tags and corresponding financial numerical information, and sequencing all financial numerical information based on the serial numbers of the columns without the encryption tags to obtain a first character sequence;
acquiring label information of a node corresponding to each identity information in the node identity set, and sorting the label information in ascending order to obtain a second character sequence;
And after the first character sequence and the second character sequence are sequenced, encryption calculation is carried out to obtain encryption information, and encryption processing is carried out on columns without non-encryption labels in an encryption column area based on the encryption information.
Optionally, in one possible implementation manner of the first aspect, the comparing the specific synchronization data table with the total synchronization data table to generate corresponding online table processing information, counting online table processing information of all synchronization receiving ends to obtain online generation tables and storing the online generation tables corresponding to the total synchronization data table includes:
Comparing each specific synchronous data table with the total synchronous data table, and determining columns existing in the total synchronous data table and not existing in the specific synchronous data table to obtain corresponding online table processing information;
And counting online table processing information of all synchronous receiving ends to obtain an online generation table, and correspondingly storing the online generation table and the total synchronous data table so that the total synchronous data table is processed based on the online generation table after being called.
Optionally, in one possible implementation manner of the first aspect, the generating an access link corresponding to each specific synchronization data table, sending the specific synchronization data table and the access link to a corresponding synchronization receiving end, and when determining that the synchronization receiving end accesses based on the access link, obtaining, based on an online generation table, a temporary synchronization data table corresponding to the specific synchronization data table, including:
when judging that the synchronous receiving end accesses based on the access link, determining online list processing information of the synchronous receiving end corresponding to the access link in an online generation list;
and deleting the corresponding columns from the total synchronous data table based on the online table processing information to obtain a temporary synchronous data table which is browsed online and corresponds to the specific synchronous data table.
In a second aspect of an embodiment of the present invention, there is provided a financial data synchronization system including:
The analysis module is used for enabling the server to analyze the financial data in the data table to be synchronized, which is uploaded by the synchronization request end, so as to obtain information of property, financial category information and financial numerical value information, and the server is used for calling a preset synchronization data table corresponding to the synchronization request end, wherein columns of the preset synchronization data table have grade information and/or identity information;
The processing module is used for dividing the financial data in the data table to be synchronized into fixed encrypted financial data and dynamic unencrypted financial data based on the preset synchronous data table, and processing the preset synchronous data table based on the encrypted financial data and the unencrypted financial data to obtain a total synchronous data table;
The calling module is used for calling the data authority structure corresponding to the total synchronous data table and the synchronous receiving ends corresponding to the synchronous request ends, acquiring specific identity information of each synchronous receiving end, and carrying out multidimensional data processing on the total synchronous data table based on the specific identity information and the data authority structure to obtain the specific synchronous data table;
The generation module is used for comparing the specific synchronous data table with the total synchronous data table to generate corresponding online table processing information, and counting the online table processing information of all synchronous receiving ends to obtain online generation tables which are stored corresponding to the total synchronous data table;
And the sending module is used for generating access links corresponding to each specific synchronous data table, sending the specific synchronous data tables and the access links to corresponding synchronous receiving ends, and obtaining temporary synchronous data tables corresponding to the specific synchronous data tables based on an online generation table when judging that the synchronous receiving ends access based on the access links.
In a third aspect of an embodiment of the present invention, there is provided an electronic device including: a memory, a processor and a computer program stored in the memory, the processor running the computer program to perform the first aspect of the invention and the methods that the first aspect may relate to.
In a fourth aspect of embodiments of the present invention, there is provided a readable storage medium having stored therein a computer program for implementing the method of the first aspect and the various possible aspects of the first aspect when executed by a processor.
According to the scheme, dimension analysis is conducted on the data table to be synchronized of the synchronization request end to obtain property belonging information, financial category information and financial numerical information, then data differentiation is conducted on the data table to be synchronized through a preset synchronization data table corresponding to the synchronization request end to obtain encrypted data and unencrypted data, and the preset synchronization data table is processed to obtain a total synchronization data table. And simultaneously, the total synchronous data table is further processed by combining the authority and the corresponding synchronous receiving end to obtain a specific synchronous data table. By the method, the encryption strategy can be customized by combining the information of the data request terminal and the information of the data receiving terminal, and related financial data can be flexibly and efficiently encrypted. In addition, the scheme can also combine the comparison information of the specific synchronous data table and the total synchronous data table to obtain an online generation table for the corresponding synchronous receiving end to carry out online data retrieval.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein.
It should be understood that, in various embodiments of the present invention, the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present invention, "comprising" and "having" and any variations thereof are intended to cover non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements that are expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in the present invention, "plurality" means two or more. "and/or" is merely an association relationship describing an association object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. "comprising A, B and C", "comprising A, B, C" means that all three of A, B, C are comprised, "comprising A, B or C" means that one of A, B, C is comprised, "comprising A, B and/or C" means that any 1 or any 2 or 3 of A, B, C are comprised.
It should be understood that in the present invention, "B corresponding to a", "a corresponding to B", or "B corresponding to a" means that B is associated with a, from which B can be determined. Determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information. The matching of A and B is that the similarity of A and B is larger than or equal to a preset threshold value.
As used herein, the term "if" may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical scheme of the invention is described in detail below by specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
Referring to fig. 1, a flow chart of a financial data synchronization method according to an embodiment of the present invention is shown, where the method includes S1-S5:
S1, analyzing financial data in a data table to be synchronized, which is uploaded by a synchronization request end, by a server to obtain information of property, financial category information and financial numerical value information, and calling a preset synchronization data table corresponding to the synchronization request end by the server, wherein columns of the preset synchronization data table have grade information and/or identity information.
When the synchronization request end has the synchronization request of the financial data, the data table to be synchronized, namely the financial data, can be sent to the server, and after the server receives the data table to be synchronized, the financial data in the data table to be synchronized, which is uploaded by the synchronization request end, is analyzed by the server, so that the information of property, the information of financial category and the information of financial numerical value are obtained. The property information is, for example, a person to whom the financial data belongs, for example, zhang san, the financial category information is, for example, reimbursement, payroll, business, etc., and the financial numerical information is, for example, an amount. It should be noted that there may be multiple sets of the above-mentioned financial data in the data table to be synchronized.
The server also invokes a preset synchronization data table corresponding to the synchronization request end, wherein columns of the preset synchronization data table have grade information and/or identity information. It should be noted that different synchronization request ends have different preset synchronization data tables. For example, for finance, then it may be payroll finance data that is uploaded, and for sales, it may be sales finance data that is uploaded. The data in the preset synchronous data table is the data to be encrypted, and the data to be encrypted is compared with the data table to be synchronized later, so that the data to be encrypted at this time can be rapidly determined.
S2, dividing the financial data in the data table to be synchronized into fixed encrypted financial data and dynamic unencrypted financial data based on the preset synchronous data table, and processing the preset synchronous data table based on the encrypted financial data and the unencrypted financial data to obtain a total synchronous data table.
The scheme can be combined with a preset synchronous data table of the synchronous request end to distinguish financial data in the data table to be synchronized, and is divided into fixed encrypted financial data and dynamic unencrypted financial data. The fixed encrypted financial data refers to data needing encryption, and the dynamic unencrypted financial data refers to financial data which does not need encryption at the time.
And then, processing the preset synchronous data table by using the encrypted financial data and the unencrypted financial data to obtain a total synchronous data table.
In some embodiments, the financial data in the data table to be synchronized is divided into fixed encrypted financial data and dynamic unencrypted financial data based on the preset synchronization data table, and the total synchronization data table is obtained by processing the preset synchronization data table based on the encrypted financial data and the unencrypted financial data, including S21-S23:
s21, traversing and comparing the financial category information of the columns in the preset synchronous data table with the financial category information in the data table to be synchronized, if the financial category information is consistent with the financial category information, adding a first label to the corresponding column in the preset synchronous data table, and if the financial category information is inconsistent with the financial category information, adding a second label to the corresponding column in the data table to be synchronized.
According to the scheme, financial category information of columns in the preset synchronous data table is compared with financial category information in the to-be-synchronized data table, if the comparison is consistent, a first label is added to corresponding columns in the preset synchronous data table, and if the comparison is inconsistent, a second label is added to corresponding columns in the to-be-synchronized data table.
It should be noted that the column to which the first tag is added is data to be encrypted, and the data to which the second tag is added is data to be not encrypted.
S22, taking the financial data which is not added with the label in the data table to be synchronized as fixed encrypted financial data, and taking the financial data which is added with the second label in the data table to be synchronized as dynamic unencrypted financial data.
The scheme can take financial data which is not added with a label in the data table to be synchronized as fixed encrypted financial data, and the scheme without the label can also classify the financial data into lines and columns which need to be encrypted.
Meanwhile, the financial data added with the second tag in the data table to be synchronized can be used as dynamic non-encrypted financial data, namely data which does not need encryption.
S23, processing the preset synchronous data table based on the first label, the second label and the encrypted financial data and the unencrypted financial data to obtain a total synchronous data table.
The processing of the encrypted financial data and the unencrypted financial data on the preset synchronous data table based on the first tag and the second tag to obtain a total synchronous data table includes S231-S234:
S231, eliminating columns without the first label in the preset synchronous data table and financial category information in the columns, and merging the rest columns to obtain an encrypted column area.
According to the scheme, columns without the first tag in the preset synchronous data table and financial category information in the columns are deleted, namely data which does not need to be encrypted are deleted, and meanwhile, the rest columns are combined to obtain an encrypted column area.
S232, sequentially traversing columns without adding a second label in the data table to be synchronized, extracting corresponding financial value information and property belonging information, and filling the corresponding financial value information and property belonging information into the columns of corresponding financial type information in the preset synchronous data table.
Meanwhile, the scheme sequentially traverses columns without the second label in the data table to be synchronized and extracts corresponding financial numerical information and property information, and it is understood that the data without the second label is the data needing to be encrypted. According to the scheme, the corresponding financial value information and property belonging information are filled into the columns of the corresponding financial category information in the preset synchronous data table, and the columns of the category corresponding to the data table to be synchronized in the preset synchronous data table can be reserved and the financial value information and property belonging information are filled.
S233, a non-encryption column area is established at the lower part of the encryption column area, columns added with second labels in the data table to be synchronized are traversed in sequence, and corresponding financial category information, financial numerical value information and property information are extracted.
The scheme can establish a non-encryption column region at the lower part of the encryption column region, then sequentially traverse columns added with second labels in the data table to be synchronized and extract corresponding financial category information, financial numerical value information and property information.
S234, establishing a corresponding column in the unencrypted column area based on the financial category information, the financial numerical information and the property information to obtain a total synchronous data table.
It can be understood that, by the above manner, the data which does not need to be encrypted in the data table to be synchronized can be updated to the non-encrypted column area to establish the corresponding column so as to obtain the total synchronization data table.
And S3, the data authority structure corresponding to the total synchronous data table and the synchronous receiving end corresponding to the synchronous request end are called, specific identity information of each synchronous receiving end is obtained, and multidimensional data processing is carried out on the total synchronous data table based on the specific identity information and the data authority structure to obtain the specific synchronous data table.
When encrypting, the scheme also combines the data authority structure corresponding to the total synchronous data table and the synchronous receiving end corresponding to the synchronous request end to carry out multidimensional processing.
The synchronous receiving end refers to a receiving end of data sent by the synchronous request end, the scheme can obtain specific identity information of each synchronous receiving end, and multidimensional data processing is carried out on the total synchronous data table based on the specific identity information and the data authority structure to obtain the specific synchronous data table.
In some embodiments, the step of retrieving the data authority structure corresponding to the total synchronization data table and the synchronization receiving end corresponding to the synchronization request end, obtaining specific identity information of each synchronization receiving end, and performing multidimensional data processing on the total synchronization data table based on the specific identity information and the data authority structure to obtain the specific synchronization data table includes S31-S33:
S31, the data authority structure and the synchronous receiving end corresponding to the synchronous request ends are called, and each synchronous request end is provided with a preset data authority structure and a preset synchronous receiving end.
Firstly, the scheme can call the data authority structure and the synchronous receiving end corresponding to the synchronous request ends, and each synchronous request end is provided with a preset data authority structure and a preset synchronous receiving end.
The data authority structure may be a tree authority structure and is classified according to the structure of the company, for example, a is the upper level of B and C, then a is the upper level node of B and C, and so on.
S32, acquiring the specific identity information of each synchronous receiving end, and copying the total synchronous data table to obtain a total synchronous data table corresponding to the specific identity information.
The scheme can obtain the specific identity information of each synchronous receiving end, and then copies the total synchronous data table to obtain the total synchronous data table corresponding to the specific identity information. It should be noted that the following is multidimensional data processing on the replicated total synchronization data table.
S33, carrying out multidimensional data processing on the copied total synchronous data table based on the specific identity information and the data authority structure to obtain the specific synchronous data table.
The scheme can combine specific identity information and a data authority structure to carry out multidimensional data processing on the copied total synchronous data table to obtain the specific synchronous data table.
The step of performing multidimensional data processing on the copied total synchronous data table based on the specific identity information and the data authority structure to obtain a specific synchronous data table includes steps S331-S334:
s331, determining that a non-encryption tag is added to a column corresponding to the property belonging information consistent with the specific identity information in the encrypted column area in the copied total synchronous data table.
In the scheme, non-encryption tags are added to columns corresponding to property belonging information consistent with specific identity information in an encryption column area in a copied total synchronous data table. It can be understood that the scheme sends the copied total synchronous data table to the corresponding data receiving end, so that the data corresponding to the synchronous receiving end in the copied total synchronous data table can not be encrypted, and the scheme can add an unencrypted label to the data.
S332, comparing the specific identity information with the data authority structure, and determining the node of the lower dimension corresponding to the specific identity information to obtain a node identity set.
In order to determine the property belonging information consistent with the specific identity information, the scheme compares the specific identity information with the data authority structure, and determines the node of the lower dimension corresponding to the specific identity information to obtain the node identity set. It can be understood that the node of the lower dimension corresponding to the specific identity information is the node with the viewing authority, that is, the lower node, and the corresponding data does not need to be encrypted.
The comparing the specific identity information with the data authority structure, determining the node of the lower dimension corresponding to the specific identity information to obtain a node identity set includes:
the data authority structure is a tree structure, and each node in the tree structure has corresponding identity information. The identity information is A, B, C, for example.
And determining a node corresponding to the specific identity information in the tree structure as a first node, and counting the connected node of the lower dimension corresponding to the first node as a second node. I.e. all the lower nodes corresponding to the first node are found as second nodes.
And counting the identity information corresponding to all the second nodes to obtain a node identity set. It will be appreciated that in the manner described above, information pertaining to properties consistent with particular identity information may be found.
S333, determining that a non-encryption tag is added to a column corresponding to information of property belonging to the node identity set in an encryption column region in the copied total synchronous data table, wherein the information of property belonging to the node identity set has corresponding identity information.
In the scheme, in the copied total synchronous data table, a non-encryption tag is added to a column corresponding to information of properties consistent with the node identity set in an encryption column area, and the information of the properties has corresponding identity information.
S334, encrypting the column without the non-encryption tag in the encrypted column area. The scheme can encrypt the column without the non-encrypted label in the encrypted column area.
The encrypting the column without the non-encryption tag in the encryption column area comprises the following steps:
Counting the serial numbers of columns without the non-encryption tags and corresponding financial numerical information, and sequencing all the financial numerical information based on the serial numbers of the columns with the non-encryption tags to obtain a first character sequence.
Firstly, the method can count the serial numbers of columns without the non-encryption tag, each column has a corresponding serial number, meanwhile, corresponding financial numerical information can be counted, and then all the financial numerical information is sequenced by using the serial numbers of the columns without the encryption tag to obtain a first character sequence.
And obtaining the label information of the node corresponding to each identity information in the node identity set, and sorting the label information in ascending order to obtain a second character sequence.
The label information of the node corresponding to each identity information in the node identity set is obtained, and it is worth mentioning that each node has corresponding label information, for example, 01, 02, 03, 04, etc., and after the label information is obtained, the label information is sorted in ascending order to obtain the second character sequence.
And after the first character sequence and the second character sequence are sequenced, encryption calculation is carried out to obtain encryption information, and encryption processing is carried out on columns without non-encryption labels in an encryption column area based on the encryption information.
The first character sequence and the second character sequence are sequenced and then are subjected to encryption calculation to obtain encryption information, wherein the encryption calculation can be a hash encryption calculation method in the prior art, and the like, and the description is omitted.
After the encrypted information is obtained, the scheme can utilize the encrypted information to carry out hidden encryption processing on the column without the non-encrypted label in the encrypted column area. It should be noted that the above operations are performed on the replicated total synchronization data table, and the source data is circulated after processing, and is still retained in the server, which can be used for subsequent data verification. For example, when the copied total synchronous data table is in circulation, the data is lost or tampered, and the corresponding operation can be performed based on the data of the server.
S4, comparing the specific synchronous data table with the total synchronous data table to generate corresponding online table processing information, and counting the online table processing information of all synchronous receiving ends to obtain online generation tables which are stored corresponding to the total synchronous data table.
The scheme can compare the specific synchronous data table with the total synchronous data table to generate corresponding online table processing information, and then obtain online generation tables and the total synchronous data table by utilizing the online table processing information of all synchronous receiving ends for storage.
In some embodiments, the comparing the specific synchronization data table with the total synchronization data table to generate corresponding online table processing information, counting online table processing information of all synchronization receiving ends to obtain online generation tables, and storing the online generation tables corresponding to the total synchronization data table, including S41-S42:
S41, comparing each specific synchronous data table with the total synchronous data table, and determining columns existing in the total synchronous data table and not existing in the specific synchronous data table to obtain corresponding online table processing information.
It can be understood that the specific synchronous data table is sent to the corresponding synchronous receiving end, and the total synchronous data table is a summary table. The columns existing in the total synchronous data table and not existing in the specific synchronous data table refer to the types of information which do not need to be synchronized at the time.
S42, counting online list processing information of all synchronous receiving ends to obtain online generation lists, and storing the online generation lists and the total synchronous data list correspondingly so that the total synchronous data list is processed based on the online generation list after being called.
The method comprises the steps of counting online table processing information of all synchronous receiving ends to obtain online generation tables, and storing the online generation tables and the total synchronous data tables correspondingly, so that the total synchronous data tables are processed based on the online generation tables after being called.
S5, generating access links corresponding to each specific synchronous data table, sending the specific synchronous data tables and the access links to corresponding synchronous receiving ends, and obtaining temporary synchronous data tables corresponding to the specific synchronous data tables based on an online generation table when judging that the synchronous receiving ends access based on the access links.
In some embodiments, generating an access link corresponding to each specific synchronization data table, sending the specific synchronization data table and the access link to a corresponding synchronization receiving end, and obtaining a temporary synchronization data table corresponding to the specific synchronization data table based on an online generation table when the synchronization receiving end is judged to access based on the access link, including S51-S52:
s51, when judging that the synchronous receiving end accesses based on the access link, determining online list processing information of the synchronous receiving end corresponding to the access link in an online generation list.
When judging that the synchronous receiving end accesses based on the access link, the scheme can determine the online list processing information of the synchronous receiving end corresponding to the access link in the online generation list.
S52, determining corresponding columns based on the online list processing information to delete the columns of the total synchronous data list, and obtaining a temporary synchronous data list corresponding to the specific synchronous data list and browsed online.
And then, determining the corresponding columns by combining the online list processing information to delete the columns of the total synchronous data list, and obtaining the temporary synchronous data list corresponding to the specific synchronous data list and browsed online. By the method, online data retrieval of the synchronous receiving end can be realized.
Referring to fig. 2, a schematic structural diagram of a financial data synchronization system according to an embodiment of the present invention includes:
The analysis module is used for enabling the server to analyze the financial data in the data table to be synchronized, which is uploaded by the synchronization request end, so as to obtain information of property, financial category information and financial numerical value information, and the server is used for calling a preset synchronization data table corresponding to the synchronization request end, wherein columns of the preset synchronization data table have grade information and/or identity information;
The processing module is used for dividing the financial data in the data table to be synchronized into fixed encrypted financial data and dynamic unencrypted financial data based on the preset synchronous data table, and processing the preset synchronous data table based on the encrypted financial data and the unencrypted financial data to obtain a total synchronous data table;
The calling module is used for calling the data authority structure corresponding to the total synchronous data table and the synchronous receiving ends corresponding to the synchronous request ends, acquiring specific identity information of each synchronous receiving end, and carrying out multidimensional data processing on the total synchronous data table based on the specific identity information and the data authority structure to obtain the specific synchronous data table;
The generation module is used for comparing the specific synchronous data table with the total synchronous data table to generate corresponding online table processing information, and counting the online table processing information of all synchronous receiving ends to obtain online generation tables which are stored corresponding to the total synchronous data table;
And the sending module is used for generating access links corresponding to each specific synchronous data table, sending the specific synchronous data tables and the access links to corresponding synchronous receiving ends, and obtaining temporary synchronous data tables corresponding to the specific synchronous data tables based on an online generation table when judging that the synchronous receiving ends access based on the access links.
The invention also provides an electronic device, comprising: a processor, a memory and a computer program; the memory is used for storing the computer program, and the memory can also be a flash memory (flash). Such as application programs, functional modules, etc. implementing the methods described above.
And the processor is used for executing the computer program stored in the memory to realize each step executed by the equipment in the method. Reference may be made in particular to the description of the embodiments of the method described above.
In the alternative, the memory may be separate or integrated with the processor.
When the memory is a device separate from the processor, the apparatus may further include:
and the bus is used for connecting the memory and the processor.
The present invention also provides a readable storage medium having stored therein a computer program for implementing the methods provided by the various embodiments described above when executed by a processor.
The storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media can be any available media that can be accessed by a general purpose or special purpose computer. For example, a storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an Application SPECIFIC INTEGRATED Circuits (ASIC). In addition, the ASIC may reside in a user device. The processor and the storage medium may reside as discrete components in a communication device. The storage medium may be read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tape, floppy disk, optical data storage device, etc.
The present invention also provides a program product comprising execution instructions stored in a storage medium. The at least one processor of the device may read the execution instructions from the storage medium, the execution instructions being executed by the at least one processor to cause the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the terminal or the server, it should be understood that the Processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (english: DIGITAL SIGNAL Processor, abbreviated as DSP), application specific integrated circuits (english: application SPECIFIC INTEGRATED Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.