Financial management method with remote access function

A technology of financial management and remote access, applied in communication between programs, program control design, data processing applications, etc., can solve problems such as inconvenience and event troubles, and achieve the effects of accurate identity determination, data security, and data security

Pending Publication Date: 2020-03-27
HENAN UNIV OF URBAN CONSTR
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Generally speaking, the financial statements in an enterprise are the secrets of each enterprise, and accountants keep them in a special file system, and no one can view them at will. Although this has sufficient security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Financial management method with remote access function
  • Financial management method with remote access function
  • Financial management method with remote access function

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] Example 1

[0037] This embodiment provides a financial management method with remote access function, and realizes the present invention through basic necessary technical features, so as to solve the problems raised in the technical background part of this application document.

[0038] Specific, such as figure 1 As shown, the embodiment of the present invention provides a financial management method with remote access function, including the following steps:

[0039] S1: Divide the identity levels of users connected to the company's computer intranet, and determine the identity levels that users of each identity level can connect to;

[0040] For example, for users at the financial director level, users of all employee levels in the financial department can be connected, while the employee level cannot connect to users of any level. The users that can be connected to a specific user level are set by those skilled in the art according to the needs of each company. set.

[0041]...

Example Embodiment

[0049] Example 2

[0050] This example is based on Example 1 and optimizes the implementation in Example 1, so that this example is more stable and has better performance during operation, but it is not limited to the one described in this example. Implementation mode.

[0051] Specifically, in step S4, the following steps are included:

[0052] S4-1: Monitor the operation of the accessed user through the monitor, and obtain the files required by the user's operation in real time;

[0053] The server monitors the user's operation through a built-in monitor, and when the user selects a file, the server obtains file information from the accessed user.

[0054] S4-2: Extract the file to be obtained by the user's operation, and obtain the type of the file to be obtained by the user's operation;

[0055] The server extracts the acquired file, that is, extracts the suffix of the file, converts the format of the file according to the suffix of the file, and finally extracts the keyword of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a financial management method with a remote access function. The method comprises the following steps: S1, carrying out the classification of the identity levels of computer intranet connection users of an enterprise, and determining the identity-level users which can be connected with the users at each identity level; S2, configuring a computer intranet of an enterprise toenable a user to identify the identity of the user before accessing the computer intranet, and determining the identity level of the currently accessed user according to the identity of the user; S3,displaying the user with the identity level which can be accessed by the user to the user, opening a port of the user which can be accessed for the user to select for access, and simultaneously providing the access of the user; S4, monitoring the operation of the user, and carrying out authority access on the user when the user checks the financial statement; and S5, after the user passes the permission access, executing the step S4, and when the user does not pass the permission access, cutting off the port of the currently accessed user to ensure the data safety of the financial statement.

Description

technical field [0001] The invention relates to the technical field of financial management, in particular to a financial management method with a remote access function. Background technique [0002] Financial management is the management of asset purchase, capital financing, operating cash flow and profit distribution under a certain overall goal. In financial management, accounting is a very important role and plays an important role in financial management. [0003] Generally speaking, the financial statements in an enterprise are the secrets of each enterprise, and accountants keep them in a special file system, and no one can view them at will. Although this has sufficient security, as an enterprise management It is also very inconvenient for investors to check the financial statements. It needs to be checked on the computer set in the enterprise, which will cause great troubles for some urgent events. Contents of the invention [0004] The purpose of the present i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q40/00G06F9/54G06F21/31
CPCG06Q40/125G06F9/547G06F21/31
Inventor 杜晨琳田夏晓付志霞董亚琼郭伟
Owner HENAN UNIV OF URBAN CONSTR
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products