Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pluggable intelligent financial auditing platform

A financial and intelligent technology, applied in the field of financial information management systems, can solve the serious security problems of the Internet of Things, difficult "device, edge, cloud IoT basic software and hardware environments, and business applications that lack a systematic security and trustworthy framework dynamic trust assessment Mechanism and other issues

Active Publication Date: 2021-07-13
STATE GRID HEBEI ELECTRIC POWER CO LTD +1
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since 2019, in order to meet the specific requirements of building a world-class energy Internet company, one of the key points in the construction of ubiquitous power Internet of Things is to expand emerging business applications similar to photovoltaic cloud networks and Internet of Vehicles, and to connect with the society through service opening and data sharing to drive new technologies. value creation, and the existing isolation-based security protection system is completely unable to meet the needs of this development
In the process of building the ubiquitous power Internet of Things, traditional protection measures are difficult to effectively deal with the growing security risks in the above-mentioned environment under the characteristics of ubiquitous connection, open sharing and other characteristics of massive heterogeneous terminal, edge and cloud IoT basic software and hardware environments. Unable to defend against new unknown malicious codes, and unable to eliminate the vulnerability of massive heterogeneous computing environments from the root of computing architecture, it is necessary to introduce a trusted computing security protection mechanism to solve the above problems
[0006] (2) The existing security protection methods cannot fundamentally solve the security risks brought about by the simplification of computing node architecture
As the inheritance and development of the Internet, the Internet of Things did not take "security" as the primary consideration when the Internet was created, which has led to the existence of "security immunity defects" similar to the Internet since the beginning of the Internet of Things. The root cause of the computing architecture is to solve the problem of security risks. Under the specific conditions of the Internet of Things itself, this "security immune defect" is further amplified, and the security problems faced by the Internet of Things are more serious and complex.
[0007] (3) Business applications lack the support of a systematic security and trustworthy framework and a dynamic trust evaluation mechanism for operating status
Some power companies have carried out research on power trusted computing technology in the direction of servers and cloud platforms, but have not yet carried out targeted in-depth exploration of the ubiquitous power Internet of Things terminal and edge fields, and the previous research work did not include the dynamics of the computing environment. Evaluation, starting from the security of the computing node itself rather than solving problems systematically and interactively, it is difficult to meet the application requirements of the ubiquitous open and interconnected new formats
[0008] In the prior art, there are already many disclosed technical solutions for the basic process of the financial audit system and the corresponding operation interface module. However, the technical solutions provided by these existing financial audit systems are difficult to be directly applied to the new form of "terminal, Edge and cloud IoT basic software and hardware environment”

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pluggable intelligent financial auditing platform
  • Pluggable intelligent financial auditing platform
  • Pluggable intelligent financial auditing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] First of all, it needs to be explained that in the prior art, the financial audit application in the financial audit platform of the power company is the most widely connected business application system with various business applications in the power information network. It is deployed as a first-level system and configured in the information On the intranet side, the financial audit application implements financial audit process management according to configuration rules by exchanging financial audit data with each business application system in its second-level system and third-level system. exemplary, such as figure 1 The structure of the existing financial audit platform shown in the information intranet side runs a secondary system including business applications such as production management system and collaborative office system, and a tertiary system including business applications such as financial management system and sales management system. Each business ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of electric power internet of things, and relates to a pluggable intelligent financial auditing platform, which comprises a business server and a business client of financial auditing application, and a security interaction platform for establishing a security channel for the business server and the business client, the business server side obtains financial auditing data from the second-level system and / or the third-level system of the financial auditing application and makes a business response to the business request of the business client side on the secure channel; the business server side is arranged in an information intranet or an information extranet of the electric power information network, the business client side is arranged in the Internet, and the safety interaction platform is arranged on the edge of one side, communicated with the Internet, of the information extranet. The technical scheme of the invention can be applied to a new form of'end, edge and cloud 'Internet of Things basic software and hardware environment, and has relatively low migration cost in the process of adjusting a financial auditing application architecture from an internal and external network mode to a'end, edge and cloud' mode.

Description

technical field [0001] The invention belongs to the technical field of electric power internet of things, and in particular relates to a financial information management system spanning an information internal network and an information external network. Background technique [0002] With the rise of the Internet of Things (IoT), the Internet of Everything allows traditional network security to extend to various Internet of Things fields such as infrastructure, industrial development, people's livelihood services, and residents' lives, especially in industries such as transportation, water conservancy, energy, electricity, and communications. The security situation of the Internet of Things is becoming increasingly severe, and sudden Internet of Things security issues may affect the stability of the entire economy and society. [0003] In recent years, global Internet of Things security incidents have occurred frequently, with great destructive power, and the security situat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G16Y30/10G16Y10/35G16Y10/50G06Q40/00
CPCH04L63/0807H04L63/10H04L67/12G16Y30/10G16Y10/35G16Y10/50G06Q40/125Y04S10/50
Inventor 刘义江
Owner STATE GRID HEBEI ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products