Search

CN-121981681-A - Electric power purchasing whole-flow data tracing device, method and medium based on internal mining special area

CN121981681ACN 121981681 ACN121981681 ACN 121981681ACN-121981681-A

Abstract

The invention discloses a full-flow data tracing device, a method and a medium for electric power purchasing based on an internal mining special area, which relate to the technical field of electric power purchasing data processing and fundamentally solve the problem of breaking of a compliance chain caused by cutting off of flow states and business facts, unhooking of evidence materials and time nodes and lack of verifiable basis in the prior art by constructing full-flow data tracing mechanisms of multi-source event acquisition, event normalization and business chain aggregation, evidence object generation and binding, compliance bundle modeling, on-line compliance verification, key gate verification, conflict detection and correction, compliance verification package generation and playback, flow mining and violation pattern library updating and violation pattern library recharging and strategy iteration.

Inventors

  • YI YONGQIANG
  • ZHANG SHENGYU
  • HE WEN
  • ZHENG HONG
  • LIU YINGJUN
  • LI YINAN
  • Lv Weikun
  • YUAN ZAIXIN

Assignees

  • 南方电网互联网服务有限公司

Dates

Publication Date
20260505
Application Date
20260123

Claims (10)

  1. 1. The utility model provides a full flow data traceability device of electric power purchasing based on interior mining private area which characterized in that includes: The multi-source event acquisition unit is used for acquiring related events of the power purchase compliance; The normalization unit is used for mapping the collected events into normative events and aggregating the normative events into service track objects according to service chain identifications; the evidence object generation unit is used for generating an evidence object when the submission of the evidence material is detected, and binding the evidence object with the corresponding node event; The modeling unit is used for structuring the system requirements into a compliance constraint model; the verification unit is used for calling the service track object, the evidence object and the compliance constraint model to execute a verification strategy when the key service propulsion point is triggered, and outputting a decision result; The conflict detection unit is used for detecting conflict between the complement evidence and the key action and executing grading treatment; The verification package generation unit is used for generating a compliance verification package containing event fingerprints, evidence fingerprints and verification results after the key milestones are completed; And the flow mining and violation pattern library unit is used for mining historical service tracks, identifying violation patterns, updating a compliance constraint model and a verification strategy.
  2. 2. The power purchasing full-flow data tracing device based on the internal mining area of claim 1, wherein the multi-source event collecting unit reserves source identification, arrival time and original load for the collected event.
  3. 3. The power purchasing whole-flow data tracing device based on the internal collection area of claim 1, wherein the evidence object generating unit extracts signature time and certificate identification for electronic signature materials and performs validity check, and marks materials which can not provide business document version fingerprints as low-credibility materials.
  4. 4. The electric power purchasing full-flow data tracing device based on the internal collection private area is characterized in that the evidence object comprises a material type, a material content fingerprint, signature or certificate information, signature time or trusted time stamp, a business document version fingerprint corresponding to the material, a material storage position index and a material verification state, the material type comprises a signature file, approval comments, meeting summary, exceptional authorization evidence and supplementary record description, the material content fingerprint is generated by carrying out hash operation on the whole material, the signature or certificate information comprises a signer identity mark and a certificate serial number, the business document version fingerprint corresponding to the material is generated by carrying out hash operation on the whole business document, the material verification state comprises whether a certificate is valid or not, and if the material cannot provide the business document version fingerprint, the material is marked as a low-reliability material which cannot be used for the release of a key gate.
  5. 5. The power purchasing full-flow data tracing device based on an internal mining private area, which is disclosed in claim 1, is characterized in that the modeling unit is used for structuring a system requirement, an internal control requirement and a supervision requirement into an executable compliance constraint model, wherein the compliance constraint model comprises a node pre-condition, a forbidden combination and an illegal migration, an exception urgent condition, a time sequence constraint and a version consistency constraint, the node pre-condition prescribes a node set which must be completed before a certain critical action occurs, a evidence object type which must be provided, a check condition which must be met by the evidence object and a state combination which must be executed or rechecked by the node, the forbidden combination and the illegal migration prescribes that the occurrence of the state combination is not allowed, the contract countersign is completed but the legal countersign is completed, the calibration issue is earlier than the conclusion formed by a comment committee, the exception urgent condition prescribes an authorization evidence element, an authorization evidence valid period, an authorizer role and a responsibility element which are required by the permission node, the time sequence constraint prescribes a relation between the node completion time and a downstream critical action time and an allowance window, and a rule is required for judging that the later-type of critical action, the evidence object must be executed by the corresponding version constraint document for the specific action.
  6. 6. The power purchasing full-flow data tracing device based on the internal mining area, which is disclosed in claim 1, is characterized in that the key service propulsion point comprises at least one of a scaling result issue, a contract text freeze or take effect, an external transaction declaration submission and a settlement checkout generation, and the verification policy comprises at least one of a node completeness verification, an evidence completeness verification, a time sequence verification, a version consistency verification and a forbidden combination verification.
  7. 7. The power purchasing full-flow data tracing device based on the mining area of claim 1, wherein the conflict detection unit generates a conflict record and triggers a correction task or state rollback when detecting that the time of the supplementary evidence is later than the critical pushing action.
  8. 8. The power purchasing full-flow data tracing device based on the internal collection special area according to claim 1, wherein the compliance verification package comprises a milestone type, a node set to be met, a completion event fingerprint of each node, a binding evidence object fingerprint and a verification result, a document version consistency verification result, an exception authorization verification fingerprint and an authorization range, and a verification package self fingerprint, and the milestone type comprises scaling release, contract validation, transaction declaration and settlement.
  9. 9. The power purchasing full-flow data tracing method based on the internal mining special area is characterized by comprising the following steps of: Collecting related events of power purchase compliance, mapping the collected events into standard events, and aggregating the standard events into a service track object according to service chain identification; generating an evidence object when the submission of the evidence material is detected, and binding the evidence object with a corresponding node event; Structuring the system requirements into a compliance constraint model, calling a service track object, an evidence object and the compliance constraint model when a key service propulsion point is triggered, executing a verification strategy, and outputting a decision result; detecting conflict between the complement evidence and the key action, and executing grading treatment; and identifying the violation pattern in the historical service track through flow mining, and updating the compliance constraint model and the verification strategy.
  10. 10. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements an electric power purchasing whole flow data tracing method based on an internal mining area as claimed in claim 9.

Description

Electric power purchasing whole-flow data tracing device, method and medium based on internal mining special area Technical Field The invention relates to the technical field of power purchasing data processing, in particular to a power purchasing whole-flow data tracing device, method and medium based on an internal mining area. Background The power purchasing inner mining special area is developed into a comprehensive business bearing platform integrating the requirements, budget control, compliance examination, legal meeting, evaluation and calibration, contract signing, transaction reporting, metering return and settlement accounting. The platform not only needs to meet the operation requirements of efficient and collaborative business, but also needs to ensure the auditability, traceability and legal effectiveness of the whole process under the constraint of degree rigidity. Especially under the trend of strengthening compliance management of enterprises and improving penetrating supervision capability of supervision authorities in China, the compliance judgment of purchasing flows is not limited to whether flow nodes are displayed to be completed or not, but focuses on whether materials on which the nodes are completed are truly effective or not, whether the materials correspond to service document versions which are effective when the nodes are supposed to be completed or not, whether preconditions of regulation of a system are met or not, and whether logic sequences and time sequences among the nodes meet internal control and supervision requirements or not. In the prior art, a Business Process Management (BPM) system is commonly adopted to model and execute a purchasing process, and an operation log is used for recording a user behavior track. The scheme truly realizes the flow visualization and basic trace-keeping functions to a certain extent in the early informatization construction stage, so that the business advancing process has preliminary traceability. Specifically, the BPM engine drives each approval node to circulate through a state machine mechanism, and simultaneously writes information such as user operation, node jump, approval comments and the like into a log database to form a so-called flow closed loop. However, this post-audit mode, which relies on flow state and operation log, exposes deep technical limitations in the face of increasingly complex exception handling, cross-system data splitting, and human intervention scenarios. The reason for this is that the flow engine and the underlying business data table usually belong to different systems or modules, and interact with each other only through a loose coupling interface, and a real-time linkage checking mechanism for business facts, evidence materials and rules of a system is lacking. Furthermore, in actual operation, situations such as bypassing of the compliance node due to urgent requirements, direct modification of the node state due to interface delay or operation and maintenance, and system repair after off-line signature is completed often occur, so that the flow state is displayed to be completed, but key evidence supporting the state is lost, version dislocation or time inversion is caused. For example, the contract countersignature state may be manually set to be completed, but the corresponding legal countersignature opinion is not yet uploaded, or the off-line signed meeting is completed after settlement and payment is completed and then the system is completed, and the timestamp is later than the key transaction action, so that the compliance reverse hanging of the first transaction and the second approval is formed. Under such a scenario, the conventional log can only record "a user clicks a button at a certain time, but cannot answer the core compliance question why the node is allowed to be skipped, what version of contract text is based at the time, whether the supplementary recording material truly reflects the history decision basis, and the like. The phenomena of closed loop and evidence broken chain in the state make enterprises difficult to self-certify and clean when facing audit and examination, and are extremely easy to cause difficulty in overtaking responsibility, negated transaction effectiveness and even serious compliance risks. The shortcomings of prior art solutions do not stem from incomplete logging, but rather their architectural design fails to incorporate flow states, business facts, evidence materials, regulatory constraints, and time sequences into a unified verification framework. The flow engine focuses on state migration, the business system focuses on data change, and compliance verification is placed in a passive position of post, off-line and manual splicing. The system cannot implement strong consistency verification at key service propulsion points due to the splitting, and cannot actively identify and block high-risk behaviors such as post-evidence-supplement, version drift, cha