Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "Improve audit effect" patented technology

Document auditing method, device and system, equipment and storage medium

The embodiment of the invention discloses a document auditing method, device and system, equipment and a storage medium. The method comprises the following steps: acquiring an object numbered musicalnotation format document sent by a document analysis component, and acquiring a preset machine learning model and a document auditing rule matched with the object numbered musical notation format document according to a business scene of the object numbered musical notation format document; extracting key information in the object numbered musical notation format document through a preset machinelearning model; and generating a document auditing result through a rule engine according to the document auditing rule and the key information, and sending the document auditing result to the webpagecomponent. According to the embodiment of the invention, the matched preset machine learning model and document auditing rule can be obtained according to the business scene. The key information in the object numbered musical notation format document can be accurately extracted through the preset machine learning model, and then document auditing is carried out through the rule engine according to the document auditing rule and the key information, so that the document auditing requirements under different business scenes are met, and the document auditing effect and the document auditing efficiency are improved.
Owner:DATAGRAND TECH INC

Comparing method and comparing system of electronic invoice

InactiveCN101727650AImprove Auditing CapabilitiesImprove audit effectFinanceData shippingInvoice
The invention relates to comparing method and comparing system of electronic invoices, wherein the comparing method comprises the following steps of: inquiring an electronic invoice storage card, and obtaining the data of the electronic invoice conforming to an inquiry condition; inquiring whether the electronic invoice which corresponds to the obtained data of the electronic invoice and is provided with a reading tag exists in an acquisition subsystem, and if so, then reject to lead out the data of the electronic invoice and ending, wherein the reading tag is used for marking that the data of the electronic invoice is read by the acquisition subsystem from the electronic invoice storage card; otherwise, acquiring the data of the electronic invoice, and generating and storing the data of the electronic invoice with the reading tag; and transmitting the encrypted data of the electronic invoice to a comparing subsystem for carrying out comparing operation. The comparing system comprises the acquisition subsystem and the acquisition subsystem. The comparing method and the comparing system of the electronic invoices provided by the invention improve the auditing capability for invoice authenticity and simultaneously overcome the defect that the same invoice can be accepted for many times in the prior art.
Owner:MINSHENG BANKING CORP

Index conversion method for public data integrity checking

The invention discloses an index conversion method for public data integrity checking. The index conversion method for the public data integrity checking includes the following steps: a user side logs in a cloud server and an audit server, synchronizes a public key of a user to the cloud server and the audit server, receives a user request, and judges whether the user side is requested to execute the operation of uploading a file or requested to execute the operation of deleting the file according to the user request; if the user side is requested to execute the operation of uploading the file, the user side receives the file needing to be uploaded from the user, segments the file needing to be uploaded according to the public key and a private key of the user, calculates a label of each segment, and uploads the file needing to be uploaded and the label of each segment to the cloud server; and if the user side is requested to execute the operation of deleting the file, the user side receives the file needing to be deleted from the user, and deletes files, file labels and relevant file information in the cloud server and the audit server, wherein the files, the file labels and the relevant file information correspond to the file needing to be deleted. The index conversion method for the public data integrity checking is an improvement based on an existing privacy-preserving public auditing (PPPA) scheme, and the problem that the existing scheme does not support dynamic updating of data can be solved.
Owner:HUAZHONG UNIV OF SCI & TECH

General information acquisition system for internal network security monitoring

ActiveCN103749002BImprove efficiencyDoes not affect acquisition efficiencyData switching networksBiological activationSecurity monitoring
The invention provides a general information acquisition system for internal network security monitoring, including a logic management layer, a business agent layer, and a monitoring module recorder, which are connected through a business module communication bus, a peripheral equipment event analysis module, and a logic management layer The input and output modules in the network are connected; the business agent layer includes a corresponding number of event monitoring modules and monitoring backup modules; the online monitoring module not only reports the monitoring events, but also stores the monitoring events in the backup monitoring module group at a certain time interval. In the cache area of ​​the corresponding monitoring backup module. If the online monitoring module is attacked and paralyzed, the business management module in the logical management layer immediately activates the monitoring backup module corresponding to it in the backup monitoring module group and enters the activation state to replace the paralyzed online monitoring module to continue working. At the same time, the monitoring backup module The module reports the monitoring events stored in its buffer. It has scalability, anti-attack and reliability of information acquisition.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Multi-party secure computing implementation method based on block chain technology

The invention discloses a multi-party security computing implementation method based on a blockchain technology. The method specifically comprises the following steps: step 1, compiling an intelligentcontract, wherein the intelligent contract comprises node information of each contract party, tasks of each contract party for executing the intelligent contract and task execution relationships among the tasks; step 2, publishing the intelligent contract: publishing the intelligent contract on the block chain; 3, determining an executable state: after the intelligent contract is authorized by related nodes of each contract party of the intelligent contract, determining the intelligent contract as the executable state; step 4, executing the intelligent contract, wherein different contract parties have own unique business accounts, log in node servers of nodes through node accounts of the nodes and execute tasks of the intelligent contract on the blockchain; and step 5, carrying out verification and recording of an execution result, wherein the nodes which do not participate in the intelligent contract carry out verification and state recording of the contract execution result. According to the invention, the problems of data security and privacy in the data cooperation process are solved.
Owner:DATANG NETWORK CO LTD

Cloud storage self-auditing method based on SGX and Ethereum block chain

InactiveCN113285812ASupport for Integrity StatusGuaranteed verifiable randomnessUser identity/authority verificationDigital data protectionData packThird party
The invention discloses a cloud storage self-auditing method based on an SGX and an Ethereum block chain, and the method comprises the steps: public parameters are selected, and a key of an entity is generated; the user preprocesses data to be outsourced to generate an outsourced data packet and generate auxiliary information; the user sends the outsourcing data packet and the auxiliary information to the cloud server, and bidirectional identity authentication is completed between the user and an enclave deployed on the cloud server; the integrity of the outsourcing data packet and the correctness of the auxiliary information are verified, and after verification is passed, the cloud server stores the outsourcing data packet and loads the auxiliary information into the enclave; and according to a preset auditing period, the cloud server reads the random number of the block chain system to generate challenge information, and operates a self-auditing program in the enclave to complete integrity auditing of the sampled data block. According to the method disclosed by the invention, on the premise of not depending on any trusted third-party participant, the data owner is supported to periodically acquire the integrity state of the outsourcing data packet when the resources are limited.
Owner:SOUTHWEST PETROLEUM UNIV

Video auditing method, video auditing device and electronic equipment

The invention discloses a video auditing method, a video auditing device and electronic equipment, and relates to the technical field of video auditing. The video auditing method comprises the steps: acquiring N image frames of a video to be audited, wherein N is an integer greater than 1; obtaining an inter-frame difference change value of the N image frames, wherein the inter-frame difference change value is used for representing a difference degree between two adjacent image frames; and selecting an image frame corresponding to a target inter-frame difference change value as an auditing frame, wherein the target inter-frame difference change value is an inter-frame difference change value which is not greater than the adjacent inter-frame difference change value in the inter-frame difference change values of the N image frames. According to the method and the device, the inter-frame difference change value of the plurality of image frames of the to-be-audited video is acquired and is used as the basis for selecting the audit frame, so that the selected audit frame has relatively high stability, the video audit effect can be improved, and the problem that the video audit effect is relatively poor in the prior art is solved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Background live video auditing method

The invention discloses a background live video auditing method, which comprises the following steps that: a user initiates microphone connection, and sends a video, an audio and a video screenshot to a cloud end; machine auditing: performing detection through a picture recognition technology, and actively processing violation; manual auditing: binding a video room with an auditing worker, and then performing auditing by the auditing worker; group leader auditing: enabling the group leader to check the working condition of the auditing worker; and checking the auditing result of the auditing worker in a specified time period through the system, and checking whether misjudgment and misauditing exist or not. The method has the beneficial effects that machine auditing and manual auditing are combined, on one hand, the auditing efficiency is improved through machine auditing, the situation that manual auditing is not timely is avoided, and the labor intensity of manual auditing is reduced; the manual auditing solves the problem that content is difficult to audit through machine auditing; the auditing effect on the auditing content is improved; group leader auditing is mainly used for auditing an auditing result of the manual auditing, so that user actions are misjudged and the user is forced to be offline caused by subjective errors of manual auditing is prevented.
Owner:武汉氪细胞网络技术有限公司

Medical prescription auditing system and method

PendingCN112259253AImprove audit effectSolve the disadvantages of low efficiency during manual reviewDrug and medicationsDrug referencesDrug utilisationDatabase
The invention discloses a medical prescription auditing system and method, and relates to the technical field of medical treatment. The medical prescription auditing system comprises a first databasein which standard prescription information is pre-stored, a second database pre-storing historical treatment information, a storage module used for storing prescription information uploaded by a doctor, an auditing module used for auditing whether the prescription information is compliant, and a processing module used for outputting the final prescription to a distribution module used for distributing the medicines. The technical scheme provided by the invention has the beneficial effects that the requirements of policies are met, the existing electronic prescription circulation path is modified, the medication decision knowledge base is creatively built, the defect of low efficiency during original manual auditing is overcome, the auditing effect on the prescription reasonability is improved, the uniform auditing standard is realized, and the auditing efficiency is improved. Prescription external distribution of Internet hospitals and social pharmacy and prescription auditing in medical association are realized, subsequent prescription commenting work can be carried out, and rules of a medication decision knowledge base are maintained.
Owner:SHANGHAI SIXTH PEOPLES HOSPITAL

Database auditing system and method based on clustering analysis and association rules

The invention discloses a database auditing system and method based on clustering analysis and association rules, and relates to database auditing. The data acquisition probes are used for acquiring and outputting user data and behavior data; the first audit analysis module is used for identifying the user data by the machine learning model to obtain a user portrait, outputting a first analysis result when the user portrait is a normal user, otherwise, outputting a second analysis result; the second audit analysis module is used for matching the behavior data of the first analysis result witha rule base, outputting a third analysis result when matching is carried out, and outputting a fourth analysis result when matching cannot be carried out; the first alarm unit generates first alarm information according to the second analysis result; the second alarm unit generates second alarm information according to the fourth analysis result; and the audit report module generates an audit report according to the third analysis result, the first alarm information and the second alarm information. The performance of the database is improved, a guarantee is provided for safe operation of thedatabase, and real-time auditing and safety detection are achieved.
Owner:上海市大数据中心

An audit system and equipment based on risk factors

ActiveCN114022053BSolve the time-consuming and labor-intensive problem of manual risk auditImprove efficiencyFinanceResourcesData processing systemInformation processing
This application relates to the technical field of data processing systems or methods specially applicable to the financial field, and discloses an audit system and equipment based on risk factors, including: the collection module obtains the financial statements of the enterprise, the type of main business, and the financial statements contained in the financial statements The processing module determines the corresponding business data according to the fund change information, selects the corresponding risk factor set from the pre-stored risk factor database according to the main business type, and judges whether there is any relationship between the risk factor set and the business based on the business data. The risk factor corresponding to the data; if it exists, list the documents to be proved according to the risk factor, and select the corresponding witnesses; build the first audit process; if it does not exist, expand the variable according to the risk orientation corresponding to the business data, and list it in the enterprise personnel structure list Select the corresponding business personnel, obtain the risk rating of the business personnel, and mark the risk rating in the fund change information corresponding to the business personnel.
Owner:鲁信科技股份有限公司

Man-machine cooperation intelligent auditing analysis method for incomplete data

The invention discloses a man-machine cooperation intelligent auditing analysis method for incomplete data, and belongs to a core method in a digital auditing process. The method mainly comprises eight steps which are respectively completed by auditing personnel and a computer and sequentially comprise the following steps: constructing an auditing knowledge graph, integrating and preparing data, determining an auditing theme, generating an auditing model, generating a doubtful point list and calculating a compliance probability, confirming doubtful points and manually checking, additionally recording missing data or checking a conclusion and generating an auditing manuscript. According to the method, the limitation that the auditing cannot be carried out for incomplete data in the existing digital auditing technology is broken through, the compliance probability of the auditing point can be calculated through the current existing data, and auditing personnel are helped to determine the importance of doubtful points. After the auditor completes data additional recording, the auditing model can perform a new round of fuzzy matching and output a result, a progressive iteration type auditing point study and judgment process is formed, powerful reference is provided for the auditor to quickly identify and position problem points, and the auditor is assisted in performing compliance check.
Owner:ZHEJIANG LAB

Intelligent operation and maintenance auditing system based on intensive management of operation and maintenance personnel operation

The invention discloses an intelligent operation and maintenance auditing system based on intensive management of operation and maintenance personnel operation, which is characterized in that the system is erected between a client side and a server side, is respectively connected with the client side and the server side, and comprises an intelligent auditing module, a comprehensive auditing module and an operation and maintenance command statistics module, the intelligent auditing module comprises a command keyword module, a command grammar module, a command combination encryption module and a learning library. According to the method, the client and the server are separated by adopting a fortress machine mechanism, so that intrusion of outsiders is effectively avoided, the operation and maintenance command is managed by adopting a machine learning mode from the operation and maintenance command, the operation condition of operation and maintenance personnel is supervised, malicious damage of the operation and maintenance personnel to data is avoided, and the operation and maintenance efficiency is improved. And the pressure of the operation and maintenance personnel is relieved, and the time for the operation and maintenance personnel to check the operation and maintenance command is saved.
Owner:珠海市鸿瑞信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products