CN115329390B - Financial privacy information security auditing method and device based on privacy protection calculation - Google Patents

Financial privacy information security auditing method and device based on privacy protection calculation Download PDF

Info

Publication number
CN115329390B
CN115329390B CN202211269658.3A CN202211269658A CN115329390B CN 115329390 B CN115329390 B CN 115329390B CN 202211269658 A CN202211269658 A CN 202211269658A CN 115329390 B CN115329390 B CN 115329390B
Authority
CN
China
Prior art keywords
information
privacy
auditing
audited
privacy information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211269658.3A
Other languages
Chinese (zh)
Other versions
CN115329390A (en
Inventor
田鑫林
王帅
郑灏
王爽
李帜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Weiwei Information Technology Co ltd
Original Assignee
Beijing Nuowei Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Nuowei Information Technology Co ltd filed Critical Beijing Nuowei Information Technology Co ltd
Priority to CN202211269658.3A priority Critical patent/CN115329390B/en
Publication of CN115329390A publication Critical patent/CN115329390A/en
Application granted granted Critical
Publication of CN115329390B publication Critical patent/CN115329390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a financial privacy information security auditing method and device based on privacy protection calculation. The method is applied to the electronic equipment and comprises the following steps: acquiring information to be checked from preset first privacy information; the first privacy information represents financial privacy information which is stored in the electronic equipment by the user in advance; auditing the information to be audited to obtain a first auditing result of the information to be audited; if the first audit result is that the audit is passed, the first audit result is sent to the server; the first audit result is used for triggering the audit of the second privacy information to obtain a second audit result; the second privacy information represents financial privacy information acquired by the server. According to the method and the device, a part of financial privacy information is audited by the electronic equipment, and the financial privacy information is prevented from being leaked in the process of transmitting the financial privacy information to the server. The electronic equipment is used for auditing other financial privacy information by the server after the auditing is passed, so that the financial privacy information is audited step by step, and the auditing efficiency and precision are improved.

Description

Financial privacy information security auditing method and device based on privacy protection calculation
Technical Field
The application relates to big data technology, in particular to a financial privacy information security auditing method and device based on privacy protection calculation.
Background
In the context of the big data age, each user corresponds to financial privacy information. When a user applies for handling some services, a service handling mechanism is required to evaluate the user and determine whether the user can handle the services.
At present, the financial privacy information can be checked by transmitting the financial privacy information to a server by a user and then verifying the financial privacy information by the server. But the process of transmitting the financial privacy information to the server may have the risk of information leakage, resulting in poor information security.
Disclosure of Invention
The application provides a security auditing method and device of financial privacy information based on privacy protection calculation, which are used for improving the security of the financial privacy information.
In a first aspect, the present application provides a security auditing method for financial private information based on privacy protection calculation, where the method is applied to an electronic device, and includes: acquiring information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by a user in advance; auditing the information to be audited to obtain a first auditing result of the information to be audited; if the first auditing result is determined to be approved, sending the first auditing result to a server; the first auditing result is used for triggering the auditing of the preset second privacy information to obtain a second auditing result; the second privacy information is used for representing the financial privacy information acquired by the server.
In a second aspect, the present application provides a security auditing method for financial private information based on privacy protection calculation, where the method is applied to a server, and the method includes: receiving a privacy information auditing instruction sent by the electronic equipment; the privacy information auditing instruction comprises first privacy information of a user; acquiring a current credit score of a user from a preset user credit score database, and if the current credit score is greater than a preset credit score threshold value, sending an instruction of allowing audit to the electronic equipment; the instruction allowing the audit is used for triggering the electronic equipment to acquire information to be audited from preset first privacy information, auditing the information to be audited to obtain a first audit result of the information to be audited, and if the first audit result is that the audit is passed, sending the first audit result to a server; and responding to the first audit result, acquiring preset second privacy information, and auditing the second privacy information in a preset trusted execution environment to obtain a second audit result.
In a third aspect, the present application provides a security auditing apparatus for financial private information based on privacy protection calculation, where the apparatus is applied to an electronic device, and the apparatus includes: the information acquisition module is used for acquiring information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by a user in advance; the first result obtaining module is used for auditing the information to be audited to obtain a first audit result of the information to be audited; the first result sending module is used for sending the first audit result to a server if the first audit result is determined to be approved; the first auditing result is used for triggering the auditing of the preset second privacy information to obtain a second auditing result; the second privacy information is used for representing the financial privacy information acquired by the server.
In a fourth aspect, the present application provides a security auditing apparatus for financial private information based on privacy protection calculation, where the apparatus is applied to a server, and the apparatus includes: the auditing instruction receiving module is used for receiving the privacy information auditing instruction sent by the electronic equipment; the privacy information auditing instruction comprises first privacy information of a user; the credit score determining module is used for acquiring the current credit score of the user from a preset credit score database of the user, and if the current credit score is larger than a preset credit score threshold value, sending an instruction of allowing audit to the electronic equipment; the instruction allowing the audit is used for triggering the electronic equipment to acquire information to be audited from preset first privacy information, auditing the information to be audited to obtain a first audit result of the information to be audited, and if the first audit result is that the audit is passed, sending the first audit result to a server; and the second audit result determining module is used for responding to the first audit result, acquiring preset second privacy information, and auditing the second privacy information in a preset trusted execution environment to obtain a second audit result.
In a fifth aspect, the present application provides an electronic device, comprising: a processor, and a memory communicatively coupled to the processor; the memory stores computer-executable instructions; the processor executes the computer-executable instructions stored in the memory to implement the security auditing method for financial privacy information based on privacy protection calculation according to the first aspect of the application.
In a sixth aspect, the present application provides a computer-readable storage medium, having stored therein computer-executable instructions, which when executed by a processor, are configured to implement a security auditing method for financial privacy information based on privacy protection calculation according to the first aspect of the present application.
In a seventh aspect, the present application provides a computer program product, including a computer program, which when executed by a processor, implements the method for security auditing of financial private information based on privacy protection calculation according to the first aspect of the present application.
According to the security auditing method and device for the financial privacy information based on privacy protection calculation, the information to be audited is obtained from a part of the financial privacy information through the electronic equipment, and the electronic equipment audits the information to be audited to obtain a first auditing result. If the first audit result is that the audit is passed, the server can be notified to continue the audit. The problems of server resource waste, high server pressure and the like caused by the fact that the server checks all information in the prior art are solved. When the electronic equipment performs information auditing, the information audited by the electronic equipment does not need to be sent to the server, so that the situations of information leakage and the like caused by transmitting a large amount of data to the server can be reduced, and the safety of privacy protection calculation is improved. Through the audit of the electronic equipment, the financial privacy information is preliminarily audited, the first audit result is convenient to screen out users who do not pass the audit, the users who do not pass the preliminary audit do not need to prepare data for audit, and only the users who pass the preliminary audit need to prepare further data for audit, such as paper stamping, signature data and the like, so that the workload of the users can be reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flowchart of a security auditing method for financial private information based on privacy protection calculation according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a security auditing method for financial private information based on privacy protection calculation according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a security auditing method for financial privacy information based on privacy protection calculation according to an embodiment of the present application;
fig. 4 is a schematic diagram of information interaction between an electronic device and a server according to an embodiment of the present application;
fig. 5 is a schematic flowchart of a security auditing method for financial private information based on privacy protection calculation according to an embodiment of the present application;
fig. 6 is a block diagram illustrating a security auditing device for financial private information based on privacy protection calculation according to an embodiment of the present application;
fig. 7 is a block diagram illustrating a security auditing device for financial private information based on privacy protection calculation according to an embodiment of the present application;
fig. 8 is a block diagram illustrating a security auditing apparatus for financial private information based on privacy protection calculation according to an embodiment of the present application;
fig. 9 is a block diagram of an electronic device according to an embodiment of the present disclosure;
fig. 10 is a block diagram of an electronic device according to an embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
In the description of the present application, it is to be understood that the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not necessarily used to describe a particular order or sequence, nor are they to be construed as indicating or implying relative importance. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as the case may be. Further, in the description of the present application, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, a and/or B, which may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
It should be noted that, for the sake of brevity, this description does not exhaust all alternative embodiments, and it should be understood by those skilled in the art after reading this description that any combination of features may constitute an alternative embodiment as long as the features are not mutually inconsistent. The following examples are described in detail.
The user may transact various services through a financial institution that requires personal financial evaluation of the user before transacting the service, which may include, for example, credit evaluation and repayment ability evaluation. At present, the evaluation mode of personal finance is mainly that a user transmits own user information to a server, and the server performs information verification. The method for transmitting the user information to the server for auditing is likely to have the risk of information leakage, such as the conditions of malicious user information spam, internal employee leakage, hacking and the like, and the security of privacy protection calculation is low.
Under the background of big data era, personal information safety is threatened while people enjoy life convenience brought by big data. If the personal information of the user is to be protected, the user information can not be transmitted to the electronic equipment of the user, and the information verification is completed on the electronic equipment. However, the computing power of the electronic device is far less than that of the server, and the efficiency and the accuracy of information auditing are influenced.
The application provides a financial privacy information security auditing method and device based on privacy protection calculation, and aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of a security auditing method for financial privacy information based on privacy protection calculation according to an embodiment of the present application, which is applied to an electronic device and can be executed by a security auditing apparatus for financial privacy information based on privacy protection calculation. As shown in fig. 1, the method comprises the steps of:
s101, obtaining information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by the user in advance.
Illustratively, the user may upload a portion of the user information to the electronic device, and store the portion of the user information locally on the electronic device, which may be, for example, important financial privacy information. The user information stored in the electronic device is first privacy information. In this embodiment, the user information is information related to financial privacy of the user, for example, the user information may be financial privacy information such as an account balance of the user. First privacy information needing to be uploaded to the electronic equipment is preset, and the first privacy information can be user information which is greatly related to the privacy of a user, for example, the first privacy information can be running water and balance of the user. First privacy information which needs to be uploaded to the electronic equipment by a user can be determined according to actual requirements. The electronic equipment acquires first privacy information which is stored in advance from local, and acquires information to be checked from the first privacy information. The information to be audited is at least one piece of information in the first privacy information, and the information to be audited may be information in a text format. The first privacy information may be stored in the electronic device in a picture format, and the electronic device may extract text from the picture of the first privacy information as information to be audited. The first privacy information may also be stored in the electronic device in a text format, and the electronic device may obtain the information to be checked from the text of the first privacy information.
All texts in the first privacy information can be determined as to-be-audited information, or the to-be-audited information to be acquired can be preset, for example, the position of the to-be-audited information in the first privacy information can be preset, and texts are extracted from the preset position; or, presetting a field name of the information to be checked, and acquiring text content corresponding to the field name from the first privacy information to serve as the information to be checked.
In this embodiment, acquiring information to be checked from preset first privacy information includes: identifying text information in the first privacy information; and determining the information to be checked from the text information in the first privacy information according to a preset information screening rule.
Specifically, the first privacy information may be in a picture format, a text format, or the like, and the content of the text information exists in the first privacy information, for example, the first privacy information is a screenshot of a user pipeline, and the screenshot of the user pipeline includes text information such as a pipeline time and an amount of money of the user. The text information can be identified from the first privacy information in the picture format based on a preset text identification algorithm. If the first privacy information is information in a text format, the text information can be directly obtained from the first privacy information.
The electronic device may obtain a plurality of first privacy information, and each of the first privacy information may include a plurality of text information. After the text information in the first privacy information is obtained, the obtained text information may be screened, and the information to be audited is determined from the text information. The information screening rules can be preset, and the text information can be screened according to the information screening rules. For example, the information filtering rule may be preset with an information name to be acquired, and according to the information name, information corresponding to the information name is acquired from the obtained text information and is used as the information to be audited. The information filtering rule may further include a location of the information to be obtained, for example, a first line and a second line of the information to be obtained in the text information of the first privacy information. And determining information corresponding to the information position from the text information according to the information position required to be acquired, and taking the information as the information to be audited.
The method has the advantages that the text information in the first privacy information is screened to obtain the information which needs to be audited by the electronic equipment, the electronic equipment is prevented from auditing useless information, and the efficiency and the precision of information auditing are improved.
In this embodiment, before obtaining information to be audited from preset first privacy information, the method further includes: receiving a private information auditing instruction sent by a user, and sending the private information auditing instruction to a server; the method comprises the steps that a privacy information auditing instruction comprises first privacy information of a user, the privacy information auditing instruction is used for triggering a server to obtain a current credit score of the user from a preset user credit score database, and if the current credit score is larger than a preset credit score threshold value, an instruction allowing auditing is sent to electronic equipment; and receiving an instruction which is sent by the server and allows the audit, and executing to-be-audited information acquisition from the preset first privacy information.
Specifically, a user sends a privacy information auditing instruction through the electronic equipment, requests to audit the privacy information, uploads own first privacy information, and the electronic equipment receives the privacy information auditing instruction and audits the first privacy information.
The electronic equipment can also send the privacy information auditing instruction containing the first privacy information to the server after receiving the privacy information auditing instruction. After receiving the privacy information auditing instruction, the server acquires the first privacy information of the user, namely, determines the user requesting to audit. The credit score of the user can be updated according to the repayment situation of the user, and the credit score can be used for indicating the credit level of the user in financial business. The server is provided with a user credit score database in advance, and the user credit score database stores the current credit scores of all users. The server may determine the current credit score of the user requesting the audit from a user credit score database.
The method comprises the steps that a credit score threshold value is preset in a server, if the current credit score of a user is larger than the preset credit score threshold value, an instruction allowing to be checked is sent to electronic equipment, the electronic equipment obtains information to be checked from preset first privacy information, and the first privacy information of the user is checked. And if the current credit score of the user is equal to or less than the preset credit score threshold value, the server directly checks the first privacy information of the user, sends the checking result of the first privacy information to the electronic equipment, and the electronic equipment informs the user. If the verification result of the first privacy information is that the verification is passed, the server can continue to verify the second privacy information. Namely, on the side of the server, the server receives a privacy information auditing instruction sent by the electronic equipment; the private information auditing instruction comprises first private information of a user. Acquiring the current credit score of the user from a preset credit score database of the user, and if the current credit score is greater than a preset credit score threshold value, sending an instruction for allowing audit to the electronic equipment; the instruction allowing the audit is used for triggering the electronic device to acquire the information to be audited from the preset first private information, auditing the information to be audited to obtain a first audit result of the information to be audited, and if the first audit result is audit pass, sending the first audit result to the server. And the server responds to the first auditing result to acquire preset second privacy information, and audits the second privacy information in a preset trusted execution environment to obtain a second auditing result and finish all auditing processes.
The method has the advantages that the user with high credit score can be audited by the electronic equipment, the user with low credit score needs the server to audit, and the error of auditing the user with low credit score by the electronic equipment is avoided, namely, the auditing requirement of the user with low credit score is improved, and the auditing precision is improved.
S102, auditing the information to be audited to obtain a first auditing result of the information to be audited.
Illustratively, after the information to be audited is obtained, the information to be audited is audited, whether the information to be audited meets the preset requirement of business transaction is determined, and the auditing result of the information to be audited is obtained and serves as the first auditing result. The first audit result may be that the audit is passed or that the audit is not passed. According to the requirement of business handling, the auditing condition of the information to be audited can be preset, and whether the information to be audited meets the preset auditing condition is judged. For example, the format of the information to be audited is preset to be 12 digits, and if the obtained information to be audited is 12 digits, the first auditing result is determined to be that the auditing is passed; and if the obtained information to be audited is not a 12-bit number, determining that the first audit result is that the audit is not passed. The first privacy information can be a plurality of pieces of information to be audited, each piece of information to be audited can correspond to the auditing requirement of the corresponding piece of information to be audited, and accurate auditing of each piece of information to be audited is achieved.
In this embodiment, the number of the information to be audited is at least one; the method for auditing the information to be audited to obtain a first auditing result of the information to be audited includes the following steps: matching the information to be audited with the corresponding information template according to the preset incidence relation between the information to be audited and the information template; if the information to be audited is determined to exist in the corresponding information template, determining an information auditing rule corresponding to each information to be audited according to the preset incidence relation between the information to be audited and the information auditing rule; and auditing the information to be audited according to the information auditing rule corresponding to the information to be audited to obtain a first auditing result of the information to be audited.
Specifically, a plurality of information templates are preset, each information template corresponds to information to be audited, for example, the information to be audited is information of a user flow, and the information of the user flow corresponds to a flow information template; the information to be checked is information of the user account, and the information of the user account corresponds to an account information template. And pre-storing the association relation between each piece of information to be audited and the information auditing template. And determining the information type represented by the currently obtained information to be audited, for example, if the information to be audited represents the running water of the user, determining that the information template corresponding to the information to be audited is a running water information template.
A plurality of information contents which can be audited can be preset in one information auditing template. And after a plurality of pieces of information to be audited are obtained, determining an information auditing template associated with each piece of information to be audited according to the pre-stored association relationship between the information to be audited and the information auditing template. And matching the content of the information to be audited with a plurality of information contents in the corresponding information auditing template, and determining whether the content of the information to be audited exists in the corresponding information auditing template. For example, the information auditing template is an auditing template of user name information, and the information auditing template comprises all user names of registered financial institution accounts. The information to be audited is the user name obtained from the first privacy information, and whether the obtained user name exists in the information auditing template is judged. And if the information to be audited does not exist in the corresponding information auditing template, the information to be audited is determined not to pass the auditing, and the electronic equipment can send prompt information to remind a user of checking.
And presetting various information auditing rules, wherein the information auditing rules are used for expressing calculation rules for auditing the information to be audited. Different types of information to be audited correspond to different information auditing rules, and the association relation between each type of information to be audited and the information auditing rules is stored in advance. And if the information to be audited is determined to exist in the corresponding information auditing template, determining the information auditing rule corresponding to each information to be audited according to the preset incidence relation between the information to be audited and the information auditing rule. And according to the information auditing rule, auditing the content of each information to be audited to obtain a first auditing result of the information to be audited. If the information to be audited passes the information auditing rule, determining that a first auditing result of the information to be audited is approved; and if the information to be audited does not pass the information auditing rule, determining that the first auditing result of the information to be audited is that the auditing is not passed. For example, for information to be audited representing account balance, the information auditing rule is that the account balance is greater than a preset balance threshold. And if the numerical value of the information to be audited is not greater than the preset balance threshold value, determining that the first auditing result of the information to be audited is that the audit is not passed.
The method has the advantages that the information auditing template is firstly passed, the result to be audited is primarily screened, if the result to be audited passes the primary screening, the first auditing result is determined according to the information auditing rule, the accuracy of the information auditing is improved, the calculation amount according to the information auditing rule is reduced, and the information auditing efficiency is improved.
S103, if the first auditing result is determined to be approved, sending the first auditing result to a server; the first auditing result is used for triggering the auditing of the preset second privacy information to obtain a second auditing result; the second privacy information is used for representing the financial privacy information acquired by the server.
For example, if it is determined that the first review result is that the audit is not passed, the electronic device may issue a prompt message that the audit is not passed to the user, for example, a popup may be issued on the electronic device. And prompting the user to continuously improve the first privacy information, avoiding the user from auditing the full amount of user information, quickly screening some users which do not meet the requirements, and subsequently, the server does not need to perform detailed analysis on the full amount of users. Namely, the first audit result is that the user who does not pass the audit does not need to provide detailed information, and the resource waste of the server is reduced. For example, if there are one hundred people reviewing the electronic device and only thirty people are eligible, then these thirty people may continue to provide the data review without the remaining seventies continuing to operate.
If the first audit result is that the audit is passed, the electronic device may send the first audit result to the server, and prompt the server to continue to audit the user who passes the audit. Namely, the first review result may be used to trigger the server to review the preset second privacy information. The second privacy information is the user information that the server needs to examine, and can be determined according to actual requirements. After the user determines that the electronic device passes the audit, the user can send the preset second privacy information to the server, and the server obtains the audit result of the server according to the preset server audit rule, which is the second audit result. The server audit rules can be pre-stored in the server, and can be adjusted according to actual requirements. Since the second privacy information is information that needs to be uploaded to the server, the second privacy information may be user information that is less relevant to the user privacy.
In the embodiment, the auditing can be performed through the electronic equipment first, and then the auditing is performed through the server, so that the two-time auditing of the user information is realized, the pressure of the server is reduced, the electronic equipment is not required to provide large calculation power, and the information auditing precision and efficiency are improved.
According to the safety auditing method for the financial privacy information based on privacy protection calculation, provided by the embodiment of the application, the electronic equipment acquires the information to be audited from part of the financial privacy information, and the electronic equipment audits the information to be audited to obtain a first auditing result. If the first audit result is that the audit is passed, the server can be notified to continue the audit. The problems of server resource waste, high server pressure and the like caused by auditing of all information by the server in the prior art are solved. When the electronic equipment performs information auditing, the information audited by the electronic equipment does not need to be sent to the server, so that the situations of information leakage and the like caused by the transmission of a large amount of data to the server can be reduced. Through the audit of the electronic equipment, the financial privacy information is preliminarily audited, the first audit result is convenient to screen out users who do not pass the audit, the users who do not pass the preliminary audit do not need to prepare data for audit, and only the users who pass the preliminary audit need to prepare further data for audit, such as paper stamping, signature data and the like, so that the workload of the users can be reduced.
Fig. 2 is a schematic flowchart of a security auditing method for financial private information based on privacy protection calculation according to an embodiment of the present application, which is an alternative embodiment based on the foregoing embodiment.
In the embodiment, the data format of the first privacy information stored in the electronic device by the user is a picture format; obtaining the information to be checked from the preset first privacy information, and can be detailed as follows: according to picture area selection operation made by a user on the first privacy information, obtaining a selected picture area from the first privacy information; and performing text recognition on the selected picture area to obtain the information in the selected picture area, wherein the information is the information to be audited.
As shown in fig. 2, the method comprises the steps of:
s201, according to picture area selection operation made by a user on the first privacy information, obtaining a selected picture area from the first privacy information.
For example, the first privacy information may be information in a picture format, for example, the first privacy information is information obtained by a user by screenshot of preset application software, and the captured picture may include user information such as a running amount and an account name of the user. The user may store the captured picture or the photographed picture containing the user information as the first privacy information in the electronic device. The electronic equipment can perform information identification on the picture of the first privacy information to obtain the information to be audited.
The first privacy information may include a plurality of pieces of information in the picture, for example, a file name is written on the top of the picture, an account of the user's person is written in the middle of the picture, and a privacy agreement is written below the picture. The information identification can be carried out only on one or a plurality of areas in the picture, and the calculation amount of the information identification is reduced.
The user may perform a selection operation of the picture region on the first privacy information through the electronic device, for example, the user may perform a circling operation on the first privacy information with the electronic brush, and the circled region is the picture region selected by the user. The user can select a plurality of picture areas on the first privacy information, and the selected picture areas are determined according to the picture area selection operation of the user. For example, the selected picture region may be determined based on the start and end points of the electronic brush.
In this embodiment, acquiring the selected picture region from the first privacy information according to the picture region selection operation performed by the user on the first privacy information includes: generating an identification frame, and determining the area of the identification frame on the first privacy information according to the identification frame adjustment operation executed by the user on the first privacy information; the identification frame adjusting operation comprises a position adjusting operation of the identification frame and a size adjusting operation of the identification frame; and determining the area where the identification frame on the first privacy information is located as the selected picture area on the first privacy information.
Specifically, a recognition frame is preset, the recognition frame can be a rectangular frame, and the size of the recognition frame can be adjusted. The user may generate the identification box on the picture of the first privacy information, for example, the user may click on an identification box generation instruction, generate a rectangular box, or the user may hand-draw the identification box. The user can move the identification frame on the first privacy information, move the identification frame to the area where the information to be audited is located, and adjust the size of the identification frame to enable the identification frame to surround the information to be audited to be acquired. That is, the user may perform an adjustment operation on the recognition frame, and the recognition frame adjustment operation may include a position adjustment operation of the recognition frame and a size adjustment operation of the recognition frame. The position adjustment operation of the recognition frame may be dragging the recognition frame to move on the picture, and the size adjustment operation of the recognition frame may be controlling the recognition frame to be enlarged or reduced. And after the identification frame on the first privacy information is determined to be adjusted, obtaining the area where the identification frame on the first privacy information is located.
After the area where the identification frame on the first privacy information is located is determined, the area where the identification frame is located is determined as the picture area selected on the first privacy information. That is, information in the area where the recognition frame is located needs to be acquired.
The beneficial effect that sets up like this lies in, the user can independently select the picture region, avoids carrying out information identification to whole picture, improves the flexibility that the region was selected, and then has improved the efficiency and the precision that information was examined and verified.
S202, text recognition is carried out on the selected picture area, and information in the selected picture area is obtained and is information to be checked.
Illustratively, after determining the selected picture region on the first privacy information, text recognition is performed on the information in the selected picture region. For example, a text recognition algorithm may be preset for recognizing text on a picture. And determining the identified information as the information to be audited. A picture can comprise a plurality of selected picture areas, so that a plurality of pieces of information to be audited can be obtained in a first privacy message. By selecting the picture area, all texts on the first privacy information can be prevented from being identified, the text identification efficiency is improved, and the information auditing efficiency is further improved.
S203, auditing the information to be audited to obtain a first auditing result of the information to be audited.
For example, this step may refer to step S102 described above, and is not described again.
S204, if the first auditing result is determined to be approved, sending the first auditing result to a server; the first audit result is used for triggering the audit of the preset second privacy information to obtain a second audit result; the second privacy information is used for representing the financial privacy information acquired by the server.
For example, if it is determined that the first review result is that the review passes, it is determined that the review process of the electronic device is completed, and the server may continue to perform the review.
In this embodiment, after determining that the first review result is that the review passes, the method further includes: and identifying the image repairing operation on the first privacy information, and if the first privacy information is determined not to be subjected to the image repairing operation, sending the first examination result to the server.
Specifically, if the first privacy information is a picture, after the first review result is determined to be that the review is passed, whether the first privacy information passes the picture repairing can be further judged. Namely, the first privacy information is identified by the image repairing operation, and whether the image repairing operation exists on the first privacy information is determined. If the first privacy information is determined not to be subjected to the image modifying operation, sending a first auditing result which passes the auditing to a server; and if the first privacy information is determined to be subjected to the image modifying operation, determining that the first privacy information is not approved, prompting the user to check by the electronic equipment, and avoiding the need of subsequent examination by the server.
The cropping operation may refer to information on the picture being added, deleted, or modified, e.g., an account balance on the picture being tampered with. The first privacy information of the repaired image cannot guarantee the authenticity of the information, and therefore cannot pass the audit.
The beneficial effect who sets up like this lies in, whether exist on discerning first privacy information and repair the picture operation, can guarantee first privacy information's authenticity, avoids someone to upload the user information of making fake, guarantees to carry out strict audit to user information, improves the precision and the credibility that information audits.
In this embodiment, the identifying the first privacy information by the graph repairing operation includes: determining text information of each text in the selected picture area in the first privacy information as first text information; the first text information comprises the font type, the font size, the character track thickness and the text definition of each text in the selected picture area; if the first text information among the texts in the selected picture area is inconsistent, determining that the first privacy information has a picture repairing operation; or determining background information in the selected picture area in the first privacy information as first background information; the first background information comprises the background color and the background brightness in the selected picture area; and if the selected picture area has inconsistent first background information, determining that the first privacy information has a picture repairing operation.
Specifically, when a retouching operation is performed on a picture, the typeface, font size, and the like of the retouched portion are different from those of the text on the original image. Therefore, the text information such as the font and the font size of the text in the selected picture area in the first privacy information may be determined as the first text information. The text information may include a font type, a font size, a character track thickness, a text definition, and the like, and the first text information may include a font type, a font size, a character track thickness, a text definition, and the like of each text in the selected picture area. Determining whether first text information such as fonts and/or word sizes of all texts in a selected picture area is consistent, and if the first text information such as the fonts and the word sizes are consistent, determining that no retouching operation exists in the selected picture area; and if at least the same first text information exists in the font and the font size and is inconsistent, determining that the selected picture area has a picture trimming operation. If all the selected picture areas in a picture of the first privacy information do not have the picture repairing operation, determining that the first privacy information does not have the picture repairing operation; if a picture of the first privacy information has a picture repairing operation in a selected picture area, determining that the first privacy information has the picture repairing operation.
The selected picture area of the first privacy information is determined to be subjected to local area division, background information of each local area in the selected picture area of the first privacy information is determined, and whether the first privacy information has the picture repairing operation or not is judged. In a picture of the first privacy information, first background information such as background color and background brightness in any selected picture area is obtained, for example, background information of a part except a text can be determined. The background information may include a background color and a background brightness, etc., and the first background information may include a background color and a background brightness in the selected picture region. And acquiring the pixel value of the pixel point of the first background information, and determining whether the first background information of each local area in the selected picture area is consistent or not according to the pixel value of the pixel point of the first background information. If the privacy information is consistent with the first privacy information, determining that the picture of the first privacy information is not subjected to the picture repairing operation; and if the private information is inconsistent with the private information, determining that the picture trimming operation exists in the picture of the first private information. And judging whether the first privacy information has a picture repairing operation or not according to the background information of each selected picture area in a picture of the first privacy information as the first background information. The first background information of the background part of each selected picture area in a picture of the first privacy information may be acquired, and the part other than the text may be determined as the background part. And acquiring pixel values of the pixel points of each background part, and determining whether the backgrounds of the selected picture areas are consistent or not according to the pixel values of the pixel points of each background part. If the privacy information is consistent with the first privacy information, determining that the picture of the first privacy information is not subjected to the picture repairing operation; and if the private information is inconsistent with the private information, determining that the picture trimming operation exists in the picture of the first private information.
In this embodiment, the identifying the first privacy information by the graph repairing operation includes: determining first text information of each text in the selected picture area in the first privacy information; determining adjacent areas of the selected picture areas in the first privacy information, and determining text information of texts in the adjacent areas as second text information; the second text information comprises the font type, the font size, the character track thickness and the text definition of the text in the adjacent area; if the first text information is inconsistent with the second text information, determining that the first privacy information has a picture repairing operation; or determining first background information in the selected picture area in the first privacy information; determining adjacent areas of the selected picture areas in the first privacy information, and determining background information of texts in the adjacent areas as second background information; wherein the second background information comprises background color and background brightness in adjacent areas; and if the first background information is inconsistent with the second background information, determining that the first privacy information has a picture repairing operation.
Specifically, when determining whether any text in the picture region is clipped, adjacent texts on the left and right sides of the text may be determined, and font identification and font size identification may be performed on the text and the adjacent texts. Areas with preset area sizes on two sides of the selected picture area in the first privacy information may be used as adjacent areas, for example, an area where a first text on the left side of the selected picture area in the first privacy information is located may be used as an adjacent area. And determining text information of the text in the adjacent area as second text information. The second text information includes the font type, font size, character track thickness, text definition, and the like of the text in the adjacent area. The background information of the text in the adjacent area can also be determined as second background information. If the first text information is consistent with the second text information, determining that the picture area selected from the first privacy information is not decorated; and if the first text information inconsistent with the second text information exists, determining that the selected picture area in the first privacy information is clipped. If the text of the clipped image exists in the selected image area, the image clipping operation exists in the selected image area.
The background information of the adjacent area may be acquired as the second background information, and the second background information may include a background color, a background brightness, and the like in the adjacent area. Comparing the first background information with the second background information, and if the first background information and the second background information are consistent, not modifying the selected picture area in the first privacy information; and if the first background information inconsistent with the second background information exists, determining that the selected picture area in the first privacy information is decorated. If the text of the clipped image exists in the selected image area, the image clipping operation exists in the selected image area.
The method has the advantages that whether the first privacy information is subjected to image retouching or not is determined by identifying text information such as fonts and word sizes of the text in the selected picture area and background information, authenticity of the first privacy information is guaranteed, and accuracy and credibility of information auditing are improved.
In this embodiment, the recognizing the first privacy information by the image retouching operation includes: and determining the definition of the text in the selected picture area in the first privacy information, and if the text with inconsistent definition exists, determining that the first privacy information has the operation of repairing the picture.
Specifically, if the image modifying operation exists in the picture, the pixel definition of the modified part is different from the pixel definition of the unmodified part. Therefore, the definition of each pixel point in the selected picture region can be obtained, that is, the definition of each text in the selected picture region can be obtained. It is determined whether the sharpness of each text is consistent in a selected picture region. If the text with inconsistent definition exists in the selected picture area, the selected picture area is determined to have a picture repairing operation, and the first privacy information where the selected picture area is located has a picture repairing operation. If the definition of each text is uniform in a selected picture area, the selected picture area has no map repairing operation. And if the picture area selected in the first privacy information does not have the picture repairing operation, determining that the first privacy information does not have the picture repairing operation.
The beneficial effect that sets up like this lies in, confirms whether first privacy information is repaiied the picture through the definition of image, avoids omitting the condition of artificially making a fake to first privacy information, improves the credibility that information audits.
Whether the image repairing operation exists in the first privacy information can be judged according to the background of each selected image area in one image of the first privacy information. In a picture of the first privacy information, a background part of each selected picture area may be obtained, and a part other than the text may be determined as the background part. And acquiring pixel values of the pixel points of the background part, and determining whether the backgrounds of the selected picture areas are consistent or not according to the pixel values of the pixel points of the background part. If the first privacy information is consistent with the second privacy information, determining that the picture of the first privacy information is not subjected to picture repairing operation; and if the private information is inconsistent with the private information, determining that the picture trimming operation exists in the picture of the first private information.
In this embodiment, after determining that the first privacy information has the operation of repairing the graph, the method further includes: sending the first privacy information to a server; the first privacy information is used for triggering the server to perform recognition of a map repairing operation on the first privacy information in a trusted execution environment based on a preset map repairing detection rule, and if the server determines that the first privacy information does not have the map repairing operation, the server sends feedback information passing the map repairing recognition to the electronic equipment; receiving feedback information which passes the image repairing identification and is sent by the server, determining that the first privacy information does not carry out image repairing operation, and sending a first examination result to the server.
Specifically, after the electronic device determines that the first privacy information has the image modifying operation, the server may perform another check to determine whether the first privacy information has the image modifying operation. The electronic device may send first privacy information that the retouching operation is considered to exist to the server. The method comprises the steps that a pattern trimming detection rule is preset in a server, and after first privacy information is received, pattern trimming operation recognition is conducted on the first privacy information in a preset trusted execution environment on the basis of the preset pattern trimming detection rule. The cropping detection rules can also be detection of the font, font size, sharpness of the text, and detection of the background. If the server determines that the first privacy information does not have the image repairing operation, sending feedback information which passes the image repairing identification to the electronic equipment; and the server determines that the first privacy information has the operation of repairing the image, and then sends feedback information that the image repairing identification does not pass to the electronic equipment. If the electronic equipment receives feedback information which is sent by the server and passes the image repairing identification, it is determined that the first privacy information is not subjected to image repairing operation, a first auditing result which passes the auditing can be sent to the server, and the server performs subsequent auditing; and if the electronic equipment receives feedback information which is sent by the server and cannot be identified by the repair picture, determining that the current verification of the user fails, and sending prompt information that the verification cannot be passed to the user for the user to check.
The beneficial effects of the arrangement are that after the electronic equipment determines that the first privacy information has the image repairing operation, the server detects the first privacy information, so that the accurate identification of the image repairing operation is ensured, the first privacy information without image repairing is prevented from being determined as the first privacy information of the image repairing, and the information auditing precision is effectively improved.
According to the financial privacy information safety method based on privacy protection calculation, the electronic equipment obtains information to be checked from a part of financial privacy information, and the electronic equipment checks the information to be checked to obtain a first checking result. If the first audit result is that the audit is passed, the server can be notified to continue the audit. The problems of server resource waste, high server pressure and the like caused by the fact that the server checks all information in the prior art are solved. When the electronic equipment performs information auditing, the information audited by the electronic equipment does not need to be sent to the server, so that the situations of information leakage and the like caused by the transmission of a large amount of data to the server can be reduced. Through the audit of the electronic equipment, the financial privacy information is preliminarily audited, the first audit result is convenient to screen out users who do not pass the audit, the users who do not pass the preliminary audit do not need to prepare data for audit, and only the users who pass the preliminary audit need to prepare further data for audit, such as paper stamping, signature data and the like, so that the workload of the users can be reduced.
Fig. 3 is a schematic flowchart of a security auditing method for financial private information based on privacy protection calculation according to an embodiment of the present application, which is an alternative embodiment based on the foregoing embodiment.
In this embodiment, after sending the first audit result to the server, the following may be added: and receiving a second auditing result sent by the server, and sending a checking notice of the auditing result to the user according to the second auditing result.
As shown in fig. 3, the method comprises the steps of:
s301, obtaining information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by the user in advance.
For example, this step may refer to step S101 described above, and is not described again.
S302, auditing the information to be audited to obtain a first auditing result of the information to be audited.
For example, this step may refer to step S102 described above, and is not described again.
S303, if the first auditing result is determined to be approved, sending the first auditing result to a server; the first auditing result is used for triggering the auditing of the preset second privacy information to obtain a second auditing result; the second privacy information is used for representing the financial privacy information acquired by the server.
Exemplarily, if the first audit result is that the audit is passed, the first audit result is sent to the server, and the first audit result triggers the server to audit the second privacy information. Fig. 4 is a schematic diagram of information interaction between an electronic device and a server. In fig. 4, the electronic device is a user side at the user side, the server is a server side, and the user side performs a first audit, and after the audit is passed, the server side is notified to perform a second audit. The auditing result obtained by the server is a second auditing result, and the second auditing result can be sent to the electronic equipment.
In the embodiment, the server receives second privacy information uploaded to the server by a user; or the server acquires the second privacy information from a preset user information database.
Specifically, the second privacy information of the user may be pre-stored in the user information database, and after receiving the first audit result, the server may actively obtain the preset second privacy information from the user information database for auditing. The information auditing automation is realized, and the information auditing efficiency is improved.
After the electronic device obtains the first audit result that is approved, prompt information can be sent to the user to remind the user to upload second privacy information to the server. After receiving the first verification result, the server may wait for the user to upload the second privacy information. And after receiving second privacy information uploaded by the user, auditing the second privacy information. That is, the server may actively acquire the second privacy information, or may passively wait for the second privacy information.
S304, receiving a second auditing result sent by the server, and sending a checking notice of the auditing result to the user according to the second auditing result.
Illustratively, the second audit result may be that the audit is passed or not passed. After the server obtains the second audit result, the server can send the second audit result to the electronic device, and the electronic device determines the final audit result of the user information according to the first audit result and the second audit result. If the second audit result is that the audit is passed, determining that the final audit result is that the audit is passed; and if the second audit result is that the audit is not passed, determining that the final audit result is that the audit is not passed. The electronic device can send a review result viewing notification to the user according to the final review result.
After the server obtains the second audit result, the server can determine the final audit result by itself. If the second audit result is that the audit is passed, determining that the final audit result is that the audit is passed; and if the second audit result is that the audit does not pass, determining that the final audit result is that the audit does not pass.
The server can send the final audit result to the electronic equipment, and the electronic equipment sends an audit result viewing notification to the user according to the final audit result, so that the user can view the audit result, and the information can be completed conveniently.
According to the safety auditing method for the financial privacy information based on privacy protection calculation, provided by the embodiment of the application, the electronic equipment acquires the information to be audited from part of the financial privacy information, and the electronic equipment audits the information to be audited to obtain a first auditing result. If the first audit result is that the audit is passed, the server can be notified to continue the audit. The problems of server resource waste, high server pressure and the like caused by auditing of all information by the server in the prior art are solved. When the electronic equipment performs information auditing, the information audited by the electronic equipment does not need to be sent to the server, so that the situations of information leakage and the like caused by the transmission of a large amount of data to the server can be reduced. Through the auditing of the electronic equipment, the initial auditing of the financial privacy information is realized, users who do not pass the auditing as a first auditing result can be screened conveniently, the users who do not pass the initial auditing do not need to prepare data for auditing, only the users who pass the initial auditing need to prepare further data for auditing, such as paper stamping, signature data and the like, and the workload of the users can be reduced.
Fig. 5 is a schematic flowchart of a security auditing method for financial privacy information based on privacy protection calculation according to an embodiment of the present application, which is applied to a server and can be executed by a security auditing apparatus for financial privacy information based on privacy protection calculation. As shown in fig. 5, the method comprises the steps of:
s501, receiving a privacy information auditing instruction sent by electronic equipment; the private information auditing instruction comprises first private information of a user.
Illustratively, the electronic equipment receives a privacy information auditing instruction sent by a user and sends the privacy information auditing instruction to the server. The private information auditing instruction can comprise the first private information of the user. After receiving the privacy information auditing instruction, the server acquires the first privacy information of the user from the privacy information auditing instruction, and determines the user requesting to audit.
In this embodiment, after sending the instruction of allowing the audit to the electronic device, the method further includes: if feedback information of the image repairing operation of the first privacy information sent by the electronic equipment is received, detecting the image repairing operation of the selected image area in the first privacy information in a preset trusted execution environment to obtain a detection result of whether the image repairing operation of the first privacy information exists; the feedback information of the first privacy information image modifying operation comprises the position of the selected picture area in the first privacy information and the image of the selected picture area.
Specifically, if the electronic device considers that the picture of the first privacy information has the image modifying operation, the electronic device may send feedback information of the image modifying operation of the first privacy information to the server, where the feedback information may include a position of a selected picture area in the first privacy information and an image of the selected picture area. After receiving the feedback information, the server may perform detection of a retouching operation on the selected picture area of the first privacy information in a preset trusted execution environment, that is, determine whether the retouching operation exists in the selected picture area of the first privacy information.
The text information of each text in the selected picture area in the first privacy information can be determined as first text information; the text information comprises a font type, a font size, a character track thickness and a text definition; if the first text information among the texts in the selected picture area is inconsistent, determining that the first privacy information has a picture repairing operation; or determining the background information in the selected picture area in the first privacy information as the first background information; wherein the background information comprises a background color and a background brightness; and if the selected picture area has inconsistent background information, determining that the first privacy information has a picture repairing operation.
The adjacent area of the selected picture area in the first privacy information can be determined; determining text information of texts in adjacent areas, wherein the text information is second text information, and if the first text information is inconsistent with the second text information, determining that the first privacy information has a picture repairing operation; or determining background information of the text in the adjacent area as second background information, and if the first background information is inconsistent with the second background information, determining that the first privacy information has a picture repairing operation. If the server determines that the first privacy information has the image repairing operation, determining that the user does not pass the verification; and if the first privacy information is determined to have no image modifying operation, the second privacy of the user can be continuously checked.
The secondary detection of the image repairing operation is carried out on the first privacy information through the server, the situation that the user cannot pass the audit due to the fact that the detection of the image repairing operation by the electronic equipment is wrong is avoided, the detection precision is improved, and the user experience is further improved.
S502, obtaining the current credit score of the user from a preset credit score database of the user, and if the current credit score is larger than a preset credit score threshold value, sending an instruction for allowing audit to the electronic equipment; the instruction allowing the audit is used for triggering the electronic device to acquire the information to be audited from the preset first private information, auditing the information to be audited to obtain a first audit result of the information to be audited, and if the first audit result is audit pass, sending the first audit result to the server.
Illustratively, the credit score of the user can be updated according to the repayment situation of the user, and the credit score can be used for indicating the credit level of the user in financial business. The server is provided with a user credit score database in advance, and the user credit score database stores the current credit scores of all users. The server may determine the current credit score of the user requesting the audit from a user credit score database.
The method comprises the steps that a credit score threshold value is preset in a server, if the current credit score of a user is larger than the preset credit score threshold value, an instruction allowing to be checked is sent to electronic equipment, the electronic equipment obtains information to be checked from preset first privacy information, and the first privacy information of the user is checked. And if the current credit score of the user is equal to or less than the preset credit score threshold value, the server directly checks the first privacy information of the user, sends the checking result of the first privacy information to the electronic equipment, and the electronic equipment informs the user. If the first privacy information is approved, the server can continue to examine the second privacy information.
S503, responding to the first audit result, acquiring preset second privacy information, and auditing the second privacy information in a preset trusted execution environment to obtain a second audit result.
Illustratively, the first review result may be used to trigger the server to review the preset second privacy information. And if the server responds to the first auditing result which passes the auditing, the second privacy information of the user can be acquired for auditing. The second privacy information is the user information that the server needs to examine, and can be determined according to actual requirements. After the user determines that the electronic device passes the audit, the user can send the preset second privacy information to the server, and the server obtains the audit result of the server according to the preset server audit rule, which is the second audit result. The server audit rules can be pre-stored in the server, and can be adjusted according to actual requirements. Since the second privacy information is information that needs to be uploaded to the server, the second privacy information may be user information that has little association with the privacy of the user. It should be noted that the auditing environment of the server is a preset trusted execution environment.
In this embodiment, the auditing can be performed by the electronic device first, and then the auditing is performed by the server, so that two times of auditing of the user information are realized, the pressure of the server is reduced, the electronic device is not required to provide large computing power, and the information auditing precision and efficiency are improved.
Fig. 6 is a block diagram of a structure of a security auditing apparatus for financial private information based on privacy protection calculation according to an embodiment of the present application, where the apparatus is applied to an electronic device. For ease of illustration, only portions that are relevant to embodiments of the present disclosure are shown. Referring to fig. 6, the apparatus includes: an information obtaining module 601, a first result obtaining module 602, and a first result sending module 603.
The information acquisition module 601 is configured to acquire information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by a user in advance;
a first result obtaining module 602, configured to perform audit on the information to be audited to obtain a first audit result of the information to be audited;
a first result sending module 603, configured to send the first review result to a server if it is determined that the first review result is approved; the first auditing result is used for triggering the auditing of the preset second privacy information to obtain a second auditing result; the second privacy information is used for representing the financial privacy information acquired by the server.
Fig. 7 is a block diagram of a security apparatus for financial privacy information based on privacy protection calculation according to an embodiment of the present application, where based on the embodiment shown in fig. 6, a data format of first privacy information stored in an electronic device by a user is a picture format, and as shown in fig. 7, an information obtaining module 601 includes an area selecting unit 6011 and a text recognizing unit 6012.
An area selecting unit 6011, configured to obtain, according to a picture area selecting operation performed by a user on first privacy information, a selected picture area from the first privacy information;
a text recognition unit 6012, configured to perform text recognition on the selected picture area, to obtain information in the selected picture area, where the information is to-be-checked information.
In an example, the area selecting unit 6011 is specifically configured to:
generating an identification frame, and determining the area of the identification frame on the first privacy information according to the identification frame adjustment operation executed by a user on the first privacy information; the identification frame adjusting operation comprises a position adjusting operation of the identification frame and a size adjusting operation of the identification frame;
and determining the area where the identification frame on the first privacy information is located as the selected picture area on the first privacy information.
In an example, the information obtaining module 601 is further specifically configured to:
identifying text information in the first privacy information;
and determining information to be checked from the text information in the first privacy information according to a preset information screening rule.
In one example, the number of the information to be audited is at least one;
a first result obtaining module 602, comprising:
the template matching unit is used for matching the information to be audited with the corresponding information template according to the incidence relation between the preset information and the information template;
the rule determining unit is used for determining an information auditing rule corresponding to each piece of information to be audited according to the association relationship between preset information and the information auditing rule if the information to be audited is determined to exist in the corresponding information template;
and the first audit result determining unit is used for auditing the information to be audited according to the information audit rule corresponding to the information to be audited to obtain a first audit result of the information to be audited.
In one example, the apparatus further comprises:
and the image modifying and identifying module is used for identifying the image modifying operation on the first privacy information after the first reviewing result is determined to be approved, and sending the first reviewing result to a server if the first privacy information is determined not to be subjected to the image modifying operation.
In one example, the repair pattern recognition module is specifically configured to:
determining text information of each text in the selected picture area in the first privacy information as first text information; the first text information comprises the font type, the font size, the character track thickness and the text definition of each text in the selected picture area;
if the first text information among the texts in the selected picture area is inconsistent, determining that the first privacy information has a picture repairing operation; or,
determining background information in the selected picture area in the first privacy information as first background information; wherein the first background information comprises background color and background brightness in the selected picture area;
if the selected picture area has inconsistent background information, determining that the first privacy information has a picture repairing operation; or,
determining first text information of each text in the selected picture area in the first privacy information; determining adjacent areas of the selected picture areas in the first privacy information, and determining text information of texts in the adjacent areas as second text information; the second text information comprises the font type, the font size, the character track thickness and the text definition of the text in the adjacent area;
if the first text information is inconsistent with the second text information, determining that the first privacy information has a picture repairing operation; or,
determining first background information in a selected picture area in the first privacy information; determining adjacent areas of the selected picture areas in the first privacy information, and determining background information of texts in the adjacent areas as second background information; wherein the second background information includes a background color and a background brightness in neighboring regions;
and if the first background information is inconsistent with the second background information, determining that the first privacy information has a picture repairing operation.
In one example, the apparatus includes:
the secondary image repairing and identifying module is used for sending the first privacy information to a server after determining that the first privacy information has image repairing operation; the first privacy information is used for triggering the server to perform image repairing operation identification on the first privacy information in a trusted execution environment based on a preset image repairing detection rule, and if the server determines that the first privacy information does not have the image repairing operation, the server sends feedback information passing the image repairing identification to the electronic equipment;
and receiving feedback information which passes the image repairing identification and is sent by the server, determining that the first privacy information does not carry out image repairing operation, and sending the first examination result to the server.
In one example, the apparatus further comprises:
and the second audit result receiving module is used for receiving the second audit result sent by the server after sending the first audit result to the server, and sending a checking notification of the audit result to the user according to the second audit result.
In one example, the server receives second privacy information uploaded to the server by the user; or the server acquires the second privacy information from a preset user information database.
Fig. 8 is a block diagram of a security auditing device for financial private information based on privacy protection calculation according to an embodiment of the present application, where the device is applied to a server. For ease of illustration, only portions that are relevant to embodiments of the present disclosure are shown. Referring to fig. 8, the apparatus includes: an audit instruction receiving module 801, a credit score determining module 802 and a second audit result determining module 803.
An audit instruction receiving module 801, configured to receive a privacy information audit instruction sent by the electronic device; the privacy information auditing instruction comprises first privacy information of a user;
a credit score determining module 802, configured to obtain a current credit score of a user from a preset user credit score database, and send an instruction allowing auditing to an electronic device if the current credit score is greater than a preset credit score threshold; the instruction allowing the audit is used for triggering the electronic equipment to acquire information to be audited from preset first privacy information, auditing the information to be audited to obtain a first audit result of the information to be audited, and if the first audit result is that the audit is passed, sending the first audit result to a server;
the second audit result determining module 803 is configured to respond to the first audit result, obtain preset second privacy information, and audit the second privacy information in a preset trusted execution environment to obtain a second audit result.
In one example, the apparatus includes:
the secondary image modification detection module is used for detecting image modification operation on a selected image area in first private information in a preset trusted execution environment after sending an instruction allowing audit to an electronic device and if receiving that the first private information sent by the electronic device has feedback information of the image modification operation, so as to obtain a detection result of whether the first private information has the image modification operation; the feedback information of the first privacy information with the picture repairing operation comprises the position of the selected picture area in the first privacy information and the image of the selected picture area.
Fig. 9 is a block diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 9, the electronic device includes: a memory 91, a processor 92; a memory 91 for storing instructions executable by the processor 92.
Wherein the processor 92 is configured to perform the methods provided in the embodiments described above. The electronic device further comprises a receiver 93 and a transmitter 94. The receiver 93 is used for receiving instructions and data transmitted from other devices, and the transmitter 94 is used for transmitting instructions and data to an external device.
FIG. 10 is a block diagram illustrating an electronic device, which may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like, in accordance with an exemplary embodiment.
Device 1000 may include one or more of the following components: processing component 1002, memory 1004, power component 1006, multimedia component 1008, audio component 1010, input/output (I/O) interface 1012, sensor component 1014, and communications component 1016.
The processing component 1002 generally controls the overall operation of the device 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 1002 may include one or more processors 1020 to execute instructions to perform all or a portion of the steps of the methods described above. Further, processing component 1002 may include one or more modules that facilitate interaction between processing component 1002 and other components. For example, the processing component 1002 may include a multimedia module to facilitate interaction between the multimedia component 1008 and the processing component 1002.
The memory 1004 is configured to store various types of data to support operation at the device 1000. Examples of such data include instructions for any application or method operating on device 1000, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1004 may be implemented by any type or combination of volatile or non-volatile storage devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 1006 provides power to the various components of the device 1000. The power components 1006 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device 1000.
The multimedia component 1008 includes a screen that provides an output interface between the device 1000 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1008 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 1000 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1010 is configured to output and/or input audio signals. For example, the audio component 1010 may include a Microphone (MIC) configured to receive external audio signals when the device 1000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 1004 or transmitted via the communication component 1016. In some embodiments, audio component 1010 also includes a speaker for outputting audio signals.
I/O interface 1012 provides an interface between processing component 1002 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 1014 includes one or more sensors for providing various aspects of status assessment for the device 1000. For example, the sensor assembly 1014 may detect an open/closed state of the device 1000, the relative positioning of components, such as a display and keypad of the device 1000, the sensor assembly 1014 may also detect a change in position of the device 1000 or a component of the device 1000, the presence or absence of user contact with the device 1000, orientation or acceleration/deceleration of the device 1000, and a change in temperature of the device 1000. The sensor assembly 1014 may include a proximity sensor configured to detect the presence of a nearby object in the absence of any physical contact. The sensor assembly 1014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1014 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
Communications component 1016 is configured to facilitate communications between device 1000 and other devices in a wired or wireless manner. The device 1000 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1016 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1016 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the device 1000 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 1004 comprising instructions, executable by the processor 1020 of the device 1000 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer-readable storage medium having instructions that, when executed by a processor of a terminal device, enable the terminal device to perform a method of securing financial privacy information based on privacy preserving computation of the terminal device.
The application also discloses a computer program product comprising a computer program which, when executed by a processor, implements the method as described in the embodiments.
Various implementations of the systems and techniques described here above may be realized in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present application may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or electronic device.
In the context of this application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data electronic device), or that includes a middleware component (e.g., an application electronic device), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include a client and an electronic device. The client and the electronic device are generally remote from each other and typically interact through a communication network. The relationship of client and electronic devices arises by virtue of computer programs running on the respective computers and having a client-electronic device relationship to each other. The electronic device may be a cloud electronic device, which is also called a cloud computing electronic device or a cloud host, and is a host product in a cloud computing service system, so as to solve the defects of high management difficulty and weak service extensibility in a traditional physical host and a VPS service ("Virtual Private Server", or "VPS" for short). The electronic device may also be a distributed system of electronic devices or an electronic device incorporating a blockchain. It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present application can be achieved, and the present invention is not limited herein.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (9)

1. A safety auditing method for financial privacy information based on privacy protection calculation is applied to electronic equipment, and comprises the following steps:
acquiring information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by a user in advance;
auditing the information to be audited to obtain a first auditing result of the information to be audited;
if the first auditing result is determined to be approved, sending the first auditing result to a server; the first auditing result is used for triggering the auditing of the preset second privacy information to obtain a second auditing result; the second privacy information is used for representing financial privacy information acquired by the server;
the information to be audited is at least one, a plurality of information templates are preset, each information template corresponds to one audit information, a plurality of information audit rules are preset, and the information audit rules are used for expressing rules for auditing and calculating the information to be audited;
auditing the information to be audited to obtain a first auditing result of the information to be audited, and the auditing method comprises the following steps:
matching the information to be audited with the corresponding information template according to the incidence relation between the preset information and the information template;
if the information to be audited is determined to exist in the corresponding information template, determining an information auditing rule corresponding to each information to be audited according to the association relation between the preset information and the information auditing rule;
and auditing the information to be audited according to the information auditing rule corresponding to the information to be audited to obtain a first auditing result of the information to be audited.
2. The method according to claim 1, wherein the data format of the first privacy information stored in the electronic device by the user is a picture format;
obtaining information to be audited from preset first privacy information, including:
according to picture area selection operation made by a user on first privacy information, obtaining a selected picture area from the first privacy information;
and performing text recognition on the selected picture area to obtain the information in the selected picture area, wherein the information is to-be-audited information.
3. The method of claim 2, wherein obtaining the selected picture region from the first privacy information according to the picture region selection operation made by the user on the first privacy information comprises:
generating an identification frame, and determining the area of the identification frame on the first privacy information according to the identification frame adjustment operation executed by a user on the first privacy information; the identification frame adjusting operation comprises an identification frame position adjusting operation and an identification frame size adjusting operation;
and determining the area where the identification frame on the first privacy information is located as the selected picture area on the first privacy information.
4. The method of claim 2, after determining that the first review result is a review pass, further comprising:
and identifying the first privacy information by the image modifying operation, and if the first privacy information is determined not to be subjected to the image modifying operation, sending the first examination result to a server.
5. The method of claim 4, wherein identifying the first privacy information for the image pruning operation comprises:
determining text information of each text in the selected picture area in the first privacy information as first text information; the first text information comprises the font type, the font size, the character track thickness and the text definition of each text in the selected picture area;
if the first text information among the texts in the selected picture area is inconsistent, determining that the first privacy information has a picture repairing operation; or,
determining background information in the selected picture area in the first privacy information as first background information; wherein the first background information comprises background color and background brightness in the selected picture area;
if the selected picture area has inconsistent first background information, determining that the first privacy information has a picture repairing operation; or,
determining first text information of each text in the selected picture area in the first privacy information, determining an adjacent area of the selected picture area in the first privacy information, and determining text information of texts in the adjacent area as second text information; the second text information comprises the font type, the font size, the character track thickness and the text definition of the text in the adjacent area;
if the first text information is inconsistent with the second text information, determining that the first privacy information has a picture repairing operation; or,
determining first background information in a selected picture area in the first privacy information, determining an adjacent area of the selected picture area in the first privacy information, and determining background information of a text in the adjacent area as second background information; wherein the second background information includes a background color and a background brightness in neighboring regions;
and if the first background information is inconsistent with the second background information, determining that the first privacy information has a picture repairing operation.
6. The method of claim 5, after determining that the first private information exists in the graph repairing operation, further comprising:
sending the first privacy information to a server; the first privacy information is used for triggering the server to perform image repairing operation identification on the first privacy information in a trusted execution environment based on a preset image repairing detection rule, and if the first privacy information is determined to have no image repairing operation, feedback information passing the image repairing identification is sent to the electronic equipment;
and receiving feedback information which passes the image repairing identification and is sent by the server, determining that the first privacy information does not carry out image repairing operation, and sending the first examination result to the server.
7. A safety auditing method for financial privacy information based on privacy protection calculation is applied to a server, and comprises the following steps:
receiving a privacy information auditing instruction sent by electronic equipment; the privacy information auditing instruction comprises first privacy information of a user;
acquiring the current credit score of a user from a preset credit score database of the user, and if the current credit score is greater than a preset credit score threshold value, sending an instruction of allowing audit to the electronic equipment; the instruction allowing the audit is used for triggering the electronic equipment to acquire information to be audited from preset first privacy information, auditing the information to be audited to obtain a first audit result of the information to be audited, and if the first audit result is that the audit is passed, sending the first audit result to a server;
responding to the first audit result, acquiring preset second privacy information, and auditing the second privacy information in a preset trusted execution environment to obtain a second audit result;
the information to be audited is at least one, a plurality of information templates are preset, each information template corresponds to one audit information, a plurality of information audit rules are preset, and the information audit rules are used for expressing rules for auditing and calculating the information to be audited;
the electronic equipment audits the information to be audited to obtain a first auditing result of the information to be audited, and the method comprises the following steps:
the electronic equipment matches the information to be audited with the corresponding information template according to the incidence relation between the preset information and the information template;
if the electronic equipment determines that the information to be audited exists in the corresponding information template, determining an information auditing rule corresponding to each information to be audited according to the association relation between the preset information and the information auditing rule, wherein the information auditing rule is used for representing a rule for auditing and calculating the information to be audited;
and the electronic equipment audits the information to be audited according to the information auditing rule corresponding to the information to be audited to obtain a first auditing result of the information to be audited.
8. The method of claim 7, after sending the instruction to allow the audit to the electronic device, further comprising:
if feedback information of the image repairing operation of the first privacy information sent by the electronic equipment is received, detecting the image repairing operation of the selected image area in the first privacy information in a preset trusted execution environment to obtain a detection result of whether the image repairing operation of the first privacy information exists; the feedback information of the first privacy information with the picture repairing operation comprises the position of the selected picture area in the first privacy information and the image of the selected picture area.
9. A financial privacy information security auditing device based on privacy protection calculation is characterized in that the device is applied to electronic equipment and comprises:
the information acquisition module is used for acquiring information to be checked from preset first privacy information; the first privacy information is used for representing financial privacy information which is stored in the electronic equipment by a user in advance;
the first result obtaining module is used for auditing the information to be audited to obtain a first audit result of the information to be audited;
the first result sending module is used for sending the first audit result to a server if the first audit result is determined to be approved; the first audit result is used for triggering the audit of the preset second privacy information to obtain a second audit result; the second privacy information is used for representing financial privacy information acquired by the server;
the information to be audited is at least one, a plurality of information templates are preset, each information template corresponds to one audit information, a plurality of information audit rules are preset, and the information audit rules are used for expressing rules for auditing and calculating the information to be audited;
the first result obtaining module is specifically configured to:
matching the information to be checked with a corresponding information template according to the incidence relation between the preset information and the information template;
if the information to be audited is determined to exist in the corresponding information template, determining an information auditing rule corresponding to each information to be audited according to the association relation between the preset information and the information auditing rule, wherein the information auditing rule is used for expressing a rule for auditing and calculating the information to be audited;
and auditing the information to be audited according to the information auditing rule corresponding to the information to be audited to obtain a first auditing result of the information to be audited.
CN202211269658.3A 2022-10-18 2022-10-18 Financial privacy information security auditing method and device based on privacy protection calculation Active CN115329390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211269658.3A CN115329390B (en) 2022-10-18 2022-10-18 Financial privacy information security auditing method and device based on privacy protection calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211269658.3A CN115329390B (en) 2022-10-18 2022-10-18 Financial privacy information security auditing method and device based on privacy protection calculation

Publications (2)

Publication Number Publication Date
CN115329390A CN115329390A (en) 2022-11-11
CN115329390B true CN115329390B (en) 2023-03-24

Family

ID=83915529

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211269658.3A Active CN115329390B (en) 2022-10-18 2022-10-18 Financial privacy information security auditing method and device based on privacy protection calculation

Country Status (1)

Country Link
CN (1) CN115329390B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996719A (en) * 2022-07-28 2022-09-02 杭州锘崴信息科技有限公司 Security analysis method for private data and financial private data of trusted processing unit

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452745B (en) * 2016-09-27 2019-07-02 中国农业大学 A kind of verification method and device that secret data is shared
CN111915306B (en) * 2019-05-08 2023-12-19 华控清交信息科技(北京)有限公司 Service data verification method and verification platform
US20240080341A1 (en) * 2019-12-20 2024-03-07 Cambrian Designs, Inc. System & Method for Implementing A Privacy Policy
CN114078049A (en) * 2021-10-09 2022-02-22 南方电网深圳数字电网研究院有限公司 Data processing method and device for supply chain financial credit-information service
CN114386946A (en) * 2022-01-13 2022-04-22 支付宝(杭州)信息技术有限公司 Data acquisition method and system based on block chain network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996719A (en) * 2022-07-28 2022-09-02 杭州锘崴信息科技有限公司 Security analysis method for private data and financial private data of trusted processing unit

Also Published As

Publication number Publication date
CN115329390A (en) 2022-11-11

Similar Documents

Publication Publication Date Title
US11321575B2 (en) Method, apparatus and system for liveness detection, electronic device, and storage medium
CN106170004B (en) Method and device for processing verification code
CN105335851B (en) Pre-payment confirmation protection method and device based on payment history
WO2019114418A1 (en) Picture processing method and apparatus
CN110096244B (en) Information sharing method based on data processing and related equipment
EP3176719A1 (en) Methods and devices for acquiring certification document
CN112487415B (en) Method and device for detecting security of computing task
CN115329390B (en) Financial privacy information security auditing method and device based on privacy protection calculation
CN116630074A (en) Invoice reimbursement method, invoice reimbursement device, electronic equipment and storage medium
CN112181521A (en) Parameter acquisition method, device, equipment and medium
CN116912478A (en) Object detection model construction, image classification method and electronic equipment
CN111669744A (en) Information processing method and device and electronic equipment
CN114723551A (en) Data processing method, device and equipment based on multiple data sources and storage medium
CN106712960B (en) Processing method and device of verification code information
CN111626883A (en) Authority verification method and device, electronic equipment and storage medium
CN115203748B (en) Financial privacy information auditing method and device based on information credibility verification
CN110768995B (en) Security verification method, device, system and storage medium
CN116226465A (en) Inspection data processing method, device, equipment and storage medium
CN110473138B (en) Graphic code conversion method, graphic code conversion device, electronic equipment and storage medium
CN117078265A (en) Transaction processing method, device, equipment and storage medium based on risk detection
CN116188001A (en) Cash register generation method, device, electronic equipment and storage medium
CN116229536A (en) Face image recognition method, device, equipment and storage medium
CN117151845A (en) Method, device and equipment for generating account opening application form
CN117273649A (en) Method, device, equipment and storage medium for processing approval request
CN117273647A (en) Verification method and device for account transfer business and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230818

Address after: Room 521, 5th Floor, Building 4, No. 66 Dongxin Avenue, Puyan Street, Binjiang District, Hangzhou City, Zhejiang Province, 310059

Patentee after: Hangzhou Weiwei Information Technology Co.,Ltd.

Address before: 3-443, 3rd Floor, Building 1, No. 158, North West Fourth Ring Road, Haidian District, Beijing 100142

Patentee before: Beijing Nuowei Information Technology Co.,Ltd.