CN115952530A - Financial data processing method and system for improving confidentiality and computer - Google Patents

Financial data processing method and system for improving confidentiality and computer Download PDF

Info

Publication number
CN115952530A
CN115952530A CN202310245010.0A CN202310245010A CN115952530A CN 115952530 A CN115952530 A CN 115952530A CN 202310245010 A CN202310245010 A CN 202310245010A CN 115952530 A CN115952530 A CN 115952530A
Authority
CN
China
Prior art keywords
financial data
data
level
financial
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310245010.0A
Other languages
Chinese (zh)
Other versions
CN115952530B (en
Inventor
陈英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi University of Technology
Original Assignee
Jiangxi University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi University of Technology filed Critical Jiangxi University of Technology
Priority to CN202310245010.0A priority Critical patent/CN115952530B/en
Publication of CN115952530A publication Critical patent/CN115952530A/en
Application granted granted Critical
Publication of CN115952530B publication Critical patent/CN115952530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a financial data processing method, a system and a computer for improving confidentiality, wherein the method comprises the following steps: when the financial data is obtained, judging whether the financial data is encryption-level data or not according to the identification phrases in the financial data; if the data is encryption-level data, the financial data is distributed to the hidden area; splitting financial data and encrypting the financial data into ciphertext data containing different confidentiality levels; when the financial data needs to be called, acquiring a decryption level of a calling instruction, and judging whether a hidden area needs to be displayed or not; and if the hidden area needs to be displayed, acquiring financial data according to the retrieval information and the decryption level. By distributing the financial data to the hidden area, the first confidentiality can be repeated, the financial data is encrypted into ciphertext data, the second confidentiality can be performed, the contents of the confidentiality level corresponding to the decryption level in the ciphertext data are decrypted, and the third confidentiality can be performed. The security of financial data is effectively improved under triple guarantee.

Description

Financial data processing method and system for improving confidentiality and computer
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a financial data processing method, system, and computer for improving security.
Background
The financial data is a collection of data reflecting financial conditions and operation results of enterprises or units, and specifically refers to data having professional attributes in a financial field formed by a series of processing on the basis of original economic matters, and specifically includes financial accounts, report data, various index analysis data and the like.
The whole condition of an enterprise or an organization can be directly known through financial data, if part of key financial data is leaked, serious consequences or immeasurable loss can be brought, and therefore, part of confidential financial data is required to have certain confidentiality.
In current financial data work of keeping secret, generally with financial data storage in high in the clouds server or inside server, encrypt financial data through the mode that sets up general secret key, but this kind of encryption mode can look up all financial data at will under the prerequisite of knowing general secret key, and the confidentiality is relatively poor.
Disclosure of Invention
The embodiment of the application provides a financial data processing method, a system and a computer for improving confidentiality, and aims to solve the technical problem that in the prior art, the confidentiality of financial data is poor because the financial data is encrypted in a mode of setting a general secret key.
In a first aspect, an embodiment of the present application provides a financial data processing method for improving confidentiality, including the following steps:
when the financial data is acquired, judging whether the financial data is encryption-level data or not according to the identification phrases in the financial data;
if the financial data is encryption-level data, distributing the financial data to a hidden area;
splitting the financial data and encrypting the financial data into ciphertext data containing different security levels;
when the financial data needs to be called, acquiring a decryption level of a calling instruction, and judging whether a hidden area needs to be displayed or not;
and if the hidden area needs to be displayed, acquiring the financial data corresponding to the retrieval information according to the retrieval information and the decryption level.
Further, the step of judging whether the financial data is encryption-level data according to the identification phrase in the financial data includes:
extracting an identification phrase in the financial data, wherein the identification phrase comprises a plurality of keywords;
comparing the keywords with a word bank, and judging whether the keywords are matched with the word bank;
and if the keyword is matched with the word bank, judging that the financial data is encryption-level data.
Further, the step of allocating the financial data to a hidden area specifically includes:
and writing a position code into the financial data, and matching a region code corresponding to the position code to distribute the financial data to a hidden region.
Further, the step of splitting the financial data and encrypting the financial data into ciphertext data containing different security levels comprises:
splitting the financial data into a plurality of data segments by taking the identification phrases as nodes;
setting the security level of the data segment according to the recognition phrase;
respectively encrypting a plurality of data segments to form a plurality of ciphertext segments;
and splicing a plurality of the ciphertext sections to form the ciphertext data.
Further, the step of encrypting the data segments respectively to form a plurality of ciphertext segments specifically includes:
respectively encrypting a plurality of the data segments by the following formula to form a plurality of ciphertext segments:
Figure SMS_1
wherein M is n Representing a certain ciphertext fragment, a representing a randomly selected encryption key, b representing a secret level, c representing a prime number, S n Representing a certain data segment corresponding to a certain ciphertext segment.
Further, the step of obtaining the decryption level of the call instruction and determining whether the hidden area needs to be displayed includes:
acquiring a calling instruction by scanning fingerprint information of a calling person;
comparing the fingerprint information with an information base to obtain a decryption level of the calling instruction;
and judging whether the hidden area needs to be displayed or not according to the decryption level.
Further, the step of obtaining the financial data corresponding to the retrieval information according to the retrieval information and the decryption level includes:
matching the retrieval information with each ciphertext data in the hidden area;
and if the ciphertext data corresponding to the retrieval information exists, decrypting the ciphertext data corresponding to the retrieval information according to the decryption level to acquire the financial data corresponding to the retrieval information.
In a second aspect, embodiments of the present application provide a financial data processing system with increased security, the system comprising:
the first identification module is used for judging whether the financial data is encryption-level data or not according to an identification phrase in the financial data when the financial data is acquired;
the classification module is used for distributing the financial data to a hidden area if the financial data is encryption-level data;
the encryption module is used for splitting the financial data and encrypting the financial data into ciphertext data containing different confidentiality levels;
the second identification module is used for acquiring the decryption level of the calling instruction when the financial data needs to be called, and judging whether a hidden area needs to be displayed or not;
and the decryption module is used for acquiring the financial data corresponding to the retrieval information according to the retrieval information and the decryption level if a hidden area needs to be displayed.
In a third aspect, the present application provides a computer, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the computer program to implement the method for processing financial data with improved confidentiality according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method for processing financial data with increased security as described in the first aspect above.
Compared with the prior art, the invention has the beneficial effects that: after the financial data are acquired, the confidentiality requirement of the financial data is determined through the identification phrase, the automatic identification of the security level of the financial data can be realized, after the financial data are determined to be the encryption level data, the financial data can be subjected to first confidentiality by distributing the encryption level data to the hidden area, namely, the financial data cannot be inquired under the condition of insufficient inquiry authority, and the financial data in the hidden area can be subjected to retrieval inquiry only through judgment of the decryption level; after the area allocation of the financial data is finished, the financial data is encrypted into the ciphertext data, the financial data can be subjected to second confidentiality, and when the financial data is inquired, the financial data cannot be directly consulted even if the hidden area is displayed; and through setting up different said secret ranks, can break down the information included in the said financial data into the multistage, while searching and inquiring, according to said search information and said decryption rank, can decipher the content of the corresponding secret rank of said decryption rank in the said cipher text data, thus carry on the third secret to the said financial data. Under the condition of triple guarantee, the confidentiality of the financial data is effectively improved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
FIG. 1 is a flow chart of a financial data processing method for enhanced security in a first embodiment of the present invention;
FIG. 2 is a flow chart of a financial data processing method for enhanced security in a second embodiment of the present invention;
FIG. 3 is a block diagram of a financial data processing system with enhanced security in a third embodiment of the present invention;
the following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Referring to fig. 1, a method for processing financial data with improved security according to a first embodiment of the present invention includes steps S10 to S50:
step S10: when the financial data is obtained, judging whether the financial data is encryption-level data or not according to an identification phrase in the financial data;
the recognition phrase is used for distinguishing the specific content that the financial data points to, pass through promptly the recognition phrase can make clear to the information such as classification, the emergence affairs are by, take place amount of money, time of occurrence of financial data, and pass through the recognition phrase can correspond the division the secret level of financial data, secret level includes ordinary data and encryption level data, ordinary data is the data that need not keep secret promptly, and the encryption level data is the data that need correspond to keep secret promptly, preferably, the encryption level data can include one-level encryption data, second grade encryption data and tertiary encryption data to embody different secret levels the financial data. After the financial data are obtained, the confidentiality requirement of the financial data is determined through the identification word group, and the automatic identification of the security level of the financial data can be realized.
Step S20: if the financial data is encryption-level data, distributing the financial data to a hidden area;
after the financial data are classified into levels, if the financial data are ordinary data, the financial data are correspondingly distributed to a display area, and if the financial data are encryption-level data, the financial data are distributed to a hidden area. It can be understood that, according to different encryption levels of the encryption-level data, the hidden area may also be set to be a primary hidden area, a secondary hidden area, and a tertiary hidden area, and correspondingly, the primary encrypted data is allocated to the primary hidden area, the secondary encrypted data is allocated to the secondary hidden area, and the tertiary encrypted data is allocated to the tertiary hidden area. After determining that the financial data is the encryption level data, a first re-encryption of the financial data may be performed by assigning it to the hidden area.
Step S30: splitting the financial data and encrypting the financial data into ciphertext data containing different security levels;
there are many differences in the importance of the information contained in a single piece of financial data, such as time information, transaction information, and amount information of a certain financial data packet, whose importance order from high to low should be: the security level is different for transaction information, money information, and time information. Preferably, the security classification includes a first class, a second class and a third class which are set from low to high. Encrypting the financial data as the ciphertext data may perform a second security re-securing of the financial data.
Step S40: when the financial data needs to be called, acquiring a decryption level of a calling instruction, and judging whether a hidden area needs to be displayed or not;
it can be understood that, the invocation of the financial data may be initiated by triggering a call instruction, and by obtaining a decryption level of the call instruction, it is identified whether the decryption level reaches a permission to display the hidden area, in a case where the decryption level is lower, that is, in a case where an inquiry permission is insufficient, the financial data cannot be inquired, and by determining the decryption level, the retrieval inquiry of the financial data in the hidden area may be performed.
Step S50: and if the hidden area needs to be displayed, acquiring the financial data corresponding to the retrieval information according to the retrieval information and the decryption level.
When inquiring the financial data, even if the hidden area is displayed, the financial data cannot be directly consulted, and the retrieval inquiry is needed, and when the retrieval inquiry is carried out, according to the retrieval information and the decryption level, the content of the encryption level corresponding to the decryption level in the ciphertext data can be decrypted, and the content of the encryption level not corresponding to the decryption level cannot be decrypted, so that the financial data is subjected to third secrecy. Under the condition of triple guarantee, the confidentiality of the financial data is effectively improved.
Referring to fig. 2, a second embodiment of the present invention provides a method for processing financial data with improved security, the method comprising the following steps:
step S100: when the financial data is obtained, extracting an identification phrase in the financial data, wherein the identification phrase comprises a plurality of keywords;
the keywords are used for determining the specific content of the financial data, namely the keywords can comprise expenses, income, time, place, money, amount of money and the like, and a plurality of keywords are extracted to lay a foundation for judging the confidentiality level of the financial data.
Step S101: comparing the keywords with a word bank, and judging whether the keywords are matched with the word bank;
step S102: if the keyword is matched with the word stock, judging the financial data to be encryption-level data;
it can be understood that the word stock also includes a plurality of keywords, the keywords included in the financial data are subjected to overlap comparison with the keywords included in the word stock, if the keywords are overlapped, it is determined that the keywords are matched with the word stock, that is, the identification phrase is matched with the word stock, it is determined that the financial data is encryption-level data and needs to be subjected to security processing, and if the keywords are not matched with the word stock, it is determined that the financial data is common data and does not need to be subjected to security processing.
Step S103: if the financial data is encryption-level data, writing a position code into the financial data, and matching a region code corresponding to the position code to distribute the financial data to a hidden region;
it can be understood that, the display area and the hidden area are both provided with area codes for identifying positions, different position codes correspond to different area codes, after the confidentiality of the financial data is determined, if the financial data is normal data, the position code corresponding to the area code of the normal area is written into the financial data, after the position code is matched with the area code, the financial data is distributed to the display area, if the financial data is encryption-level data, the position code corresponding to the area code of the hidden area is written into the financial data and distributed to the hidden area, and generally, the financial data in the hidden area cannot be referred.
Step S104: splitting the financial data into a plurality of data segments by taking the identification phrases as nodes;
the key words in the identification phrases respectively indicate different important information in the financial data, and the identification phrases are used as nodes, so that the importance of different contents in the financial data can be effectively distinguished.
Step S105: setting the security level of the data segment according to the recognition phrase;
the financial data is divided into the data segments with different security levels according to different importance degrees of different contents in the financial data, so that the contents in the financial data can be classified and kept secret in a subsequent process.
Step S106: respectively encrypting a plurality of data segments to form a plurality of ciphertext segments;
specifically, a plurality of the data segments are respectively encrypted by the following formulas to form a plurality of ciphertext segments:
Figure SMS_2
wherein, M n Representing a segment of ciphertext, a representing a randomly selected encryption key, b representing a secret level, c representing a prime number, S n Representing a certain data segment corresponding to a certain ciphertext segment. Through the formula, a certain data segment can be converted into a certain ciphertext segment, and then the encryption work of the financial data is completed.
Step S107: splicing a plurality of the ciphertext fragments to form the ciphertext data;
in order to ensure the overall completeness of the single financial data, after the data segments are converted into the ciphertext segments, the ciphertext segments are spliced to form the ciphertext data: m = [ M = 1 ,M 2 ,...,M n Wherein M represents ciphertext data, M 1 、M 2 、...、M n All indicate a certainAnd in the ciphertext section, one ciphertext data corresponds to one financial data.
Step S108: when the financial data needs to be called, a calling instruction is obtained by scanning fingerprint information of a calling person;
it can be understood that, through fingerprint scanning to open the calling service of financial data, after finishing fingerprint scanning, trigger promptly the instruction of calling, simultaneously, through fingerprint scanning's mode, can definitely be to the person of blame of the calling of financial data.
Step S109: comparing the fingerprint information with an information base to obtain a decryption level of the calling instruction;
the method comprises the steps that a plurality of preset fingerprint information is stored in an information base, each preset fingerprint information corresponds to identity information of related personnel, if the fingerprint information is not matched with the preset fingerprint information in the information base, the calling instruction cannot be triggered, and if the fingerprint information is matched with the preset fingerprint information in the information base, the authority level of a calling person is confirmed according to the identity information, the authority level is drawn as the decryption level, and the calling instruction corresponds to the calling instruction.
Step S110: judging whether a hidden area needs to be displayed or not according to the decryption level;
if the decryption level accords with the unlocking authority of the hidden area, the exchange personnel opens the hidden area and opens the retrieval inquiry authority of the hidden area, but at the moment, the financial data in the hidden area are ciphertext data, and corresponding content lookup cannot be directly carried out.
Step S111: if a hidden area needs to be displayed, matching the retrieval information with each ciphertext data in the hidden area;
step S112: if the ciphertext data corresponding to the retrieval information exists, decrypting the ciphertext data corresponding to the retrieval information according to the decryption stage to obtain the financial data corresponding to the retrieval information;
after the retrieval inquiry authority of the hidden area is opened by the caller, the caller correspondingly inputs the retrieval information, understandably, the retrieval information comprises a plurality of retrieval words, the retrieval words correspond to the keywords, namely, the retrieval information corresponds to the identification word group, and the ciphertext data in the hidden area can be matched and retrieved through the retrieval information.
Specifically, the search information is split to obtain a plurality of search terms, and the search terms are encrypted and spliced to obtain a search ciphertext;
acquiring a matching result of the retrieval ciphertext and the ciphertext data in the hidden area;
according to the matching result, if the ciphertext data corresponding to the retrieval information does not exist, closing the hidden area;
if the ciphertext data corresponding to the retrieval information exists, displaying a retrieval result, and displaying the retrieved ciphertext data, at this time, the ciphertext data cannot refer to specific financial data, so that the ciphertext data needs to be decrypted, at this time, matching the decryption level with the ciphertext fragments of different levels in the ciphertext data to determine the decryptable ciphertext fragment, and decrypting the decryptable ciphertext fragment by using the following formula:
Figure SMS_3
wherein Jm represents the decrypted ciphertext fragment, and mod is an operation function.
And after the secret level corresponding to the decryption level is completed and the pointed secret text segment points to, displaying the financial data corresponding to the retrieval information and completing data calling.
Referring to fig. 3, a third embodiment of the present invention provides a security-enhanced financial data processing system, which is applied to the security-enhanced financial data processing method in the foregoing embodiments, and is not described again. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware or a combination of software and hardware is also possible and contemplated.
The system comprises:
the first identification module 10 is configured to, when financial data is acquired, determine whether the financial data is encryption-level data according to an identification phrase in the financial data;
the first identification module 10 specifically includes:
the system comprises an extraction unit, a search unit and a search unit, wherein the extraction unit is used for extracting an identification phrase in financial data when the financial data is acquired, and the identification phrase comprises a plurality of keywords;
the analysis unit is used for comparing the keywords with a word bank and judging whether the keywords are matched with the word bank or not;
a determination unit configured to determine that the financial data is encryption-level data if the keyword matches the thesaurus
A classification module 20, configured to, if the financial data is encryption-level data, allocate the financial data to a hidden area;
the classification module 20 is specifically configured to, if the financial data is encryption-level data, write a position code into the financial data, and match a region code corresponding to the position code, so as to allocate the financial data to a hidden region;
the encryption module 30 is configured to split the financial data and encrypt the financial data into ciphertext data with different security levels;
the encryption module 30 specifically includes:
the splitting unit is used for splitting the financial data into a plurality of data segments by taking the identification phrases as nodes;
the judging unit is used for setting the security level of the data segment according to the identification phrase;
the giving unit is used for encrypting the data segments respectively to form a plurality of ciphertext segments;
the splicing unit is used for splicing a plurality of the ciphertext sections to form the ciphertext data;
the second identification module 40 is configured to, when the financial data needs to be called, obtain a decryption level of the calling instruction, and determine whether a hidden area needs to be displayed;
the second identification module 40 specifically includes:
the first unit is used for scanning fingerprint information of a calling person to acquire a calling instruction when the financial data needs to be called;
the second unit is used for comparing the fingerprint information with an information base to obtain a decryption level of the calling instruction;
a third unit for judging whether the hidden area needs to be displayed according to the decryption level
And the decryption module 50 is configured to, if a hidden area needs to be displayed, obtain the financial data corresponding to the retrieval information according to the retrieval information and the decryption level.
The decryption module 50 specifically includes:
a fourth unit, configured to match the search information with each ciphertext data in the hidden area if a hidden area needs to be displayed;
a fifth unit, configured to decrypt, according to the decryption level, the ciphertext data corresponding to the retrieval information if the ciphertext data corresponding to the retrieval information exists, so as to obtain the financial data corresponding to the retrieval information.
The invention also provides a computer, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the financial data processing method for improving the confidentiality in the technical scheme.
The invention also provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the financial data processing method for improving security as described in the above technical solution.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of financial data processing with improved security, comprising the steps of:
when the financial data is obtained, judging whether the financial data is encryption-level data or not according to an identification phrase in the financial data;
if the financial data is encryption-level data, distributing the financial data to a hidden area;
splitting the financial data and encrypting the financial data into ciphertext data containing different security levels;
when the financial data needs to be called, acquiring a decryption level of a calling instruction, and judging whether a hidden area needs to be displayed or not;
and if the hidden area needs to be displayed, acquiring the financial data corresponding to the retrieval information according to the retrieval information and the decryption level.
2. A method of processing financial data with increased security according to claim 1 wherein the step of determining whether the financial data is encryption level data from the identifying phrase in the financial data comprises:
extracting an identification phrase in the financial data, wherein the identification phrase comprises a plurality of keywords;
comparing the keywords with a word bank, and judging whether the keywords are matched with the word bank;
and if the keyword is matched with the word bank, judging that the financial data is encryption-level data.
3. A method of processing financial data with increased security as claimed in claim 1, wherein said step of assigning said financial data to a hidden area is specifically:
and writing a position code into the financial data, and matching a region code corresponding to the position code to distribute the financial data to a hidden region.
4. A method of increasing security of financial data processing according to claim 1 wherein said step of splitting said financial data and encrypting said financial data into ciphertext data comprising different levels of security comprises:
splitting the financial data into a plurality of data segments by taking the identification phrases as nodes;
setting the security level of the data segment according to the identification phrase;
respectively encrypting a plurality of data segments to form a plurality of ciphertext segments;
and splicing a plurality of the ciphertext sections to form the ciphertext data.
5. A confidentiality enhanced financial data processing method according to claim 4, wherein said step of encrypting said plurality of data segments respectively to form a plurality of ciphertext segments comprises:
respectively encrypting a plurality of the data segments by the following formulas to form a plurality of ciphertext segments:
Figure QLYQS_1
wherein, M n Representing a certain ciphertext fragment, a representing a randomly selected encryption key, b representing a secret level, c representing a prime number, S n Representation and a certain ciphertextA segment corresponds to a certain data segment.
6. A method of processing financial data with increased security as claimed in claim 1, wherein said step of obtaining a decryption stage of the call instruction and determining whether a hidden area needs to be revealed comprises:
the method comprises the steps of scanning fingerprint information of a calling person to obtain a calling instruction;
comparing the fingerprint information with an information base to obtain a decryption level of the calling instruction;
and judging whether the hidden area needs to be displayed or not according to the decryption level.
7. A method of improving security of financial data according to claim 1 wherein said step of obtaining said financial data corresponding to said retrieved information in accordance with retrieved information and said level of decryption comprises:
matching the retrieval information with each ciphertext data in the hidden area;
and if the ciphertext data corresponding to the retrieval information exists, decrypting the ciphertext data corresponding to the retrieval information according to the decryption level to acquire the financial data corresponding to the retrieval information.
8. A financial data processing system for improving confidentiality, which is applied to the financial data processing method for improving confidentiality of any one of claims 1 to 7, and which comprises:
the first identification module is used for judging whether the financial data is encryption-level data or not according to an identification phrase in the financial data when the financial data is acquired;
the classification module is used for distributing the financial data to a hidden area if the financial data is encryption-level data;
the encryption module is used for splitting the financial data and encrypting the financial data into ciphertext data containing different confidentiality levels;
the second identification module is used for acquiring the decryption level of the calling instruction when the financial data needs to be called, and judging whether a hidden area needs to be displayed or not;
and the decryption module is used for acquiring the financial data corresponding to the retrieval information according to the retrieval information and the decryption level if a hidden area needs to be displayed.
9. A computer comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements the method of improving privacy financial data processing of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out a method of improving privacy of financial data processing according to any one of claims 1 to 7.
CN202310245010.0A 2023-03-15 2023-03-15 Financial data processing method, system and computer for improving confidentiality Active CN115952530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310245010.0A CN115952530B (en) 2023-03-15 2023-03-15 Financial data processing method, system and computer for improving confidentiality

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310245010.0A CN115952530B (en) 2023-03-15 2023-03-15 Financial data processing method, system and computer for improving confidentiality

Publications (2)

Publication Number Publication Date
CN115952530A true CN115952530A (en) 2023-04-11
CN115952530B CN115952530B (en) 2023-05-23

Family

ID=85903391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310245010.0A Active CN115952530B (en) 2023-03-15 2023-03-15 Financial data processing method, system and computer for improving confidentiality

Country Status (1)

Country Link
CN (1) CN115952530B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116166702A (en) * 2023-04-20 2023-05-26 联一信息技术(北京)有限公司 Data storage method of payment management system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193871A1 (en) * 2003-03-28 2004-09-30 Broadcom Corporation System and method for transmitting data using selective partial encryption
JP2005267195A (en) * 2004-03-18 2005-09-29 Nippon Digital Kenkyusho:Kk Device, method and program for creating hierarchical document information
CN110677411A (en) * 2019-09-27 2020-01-10 浙江宇视科技有限公司 Data sharing method and system based on cloud storage
CN111581209A (en) * 2020-04-27 2020-08-25 佛山科学技术学院 Computer big data storage system, method and storage medium
CN112329032A (en) * 2020-10-29 2021-02-05 暨南大学 Privacy mirror image financial auditing method and system based on function encryption
CN113158245A (en) * 2021-04-26 2021-07-23 郑州师范学院 Method, system, equipment and readable storage medium for searching document
CN113836558A (en) * 2021-09-27 2021-12-24 西安万像电子科技有限公司 File encryption method, device and file decryption method
WO2022099495A1 (en) * 2020-11-11 2022-05-19 深圳技术大学 Ciphertext search method, system, and device in cloud computing environment
CN114722416A (en) * 2022-06-09 2022-07-08 湖南师范大学 Encryption-based financial informatization data processing method and system
CN115146285A (en) * 2021-03-30 2022-10-04 腾讯科技(深圳)有限公司 File encryption and decryption method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193871A1 (en) * 2003-03-28 2004-09-30 Broadcom Corporation System and method for transmitting data using selective partial encryption
JP2005267195A (en) * 2004-03-18 2005-09-29 Nippon Digital Kenkyusho:Kk Device, method and program for creating hierarchical document information
CN110677411A (en) * 2019-09-27 2020-01-10 浙江宇视科技有限公司 Data sharing method and system based on cloud storage
CN111581209A (en) * 2020-04-27 2020-08-25 佛山科学技术学院 Computer big data storage system, method and storage medium
CN112329032A (en) * 2020-10-29 2021-02-05 暨南大学 Privacy mirror image financial auditing method and system based on function encryption
WO2022099495A1 (en) * 2020-11-11 2022-05-19 深圳技术大学 Ciphertext search method, system, and device in cloud computing environment
CN115146285A (en) * 2021-03-30 2022-10-04 腾讯科技(深圳)有限公司 File encryption and decryption method and device
CN113158245A (en) * 2021-04-26 2021-07-23 郑州师范学院 Method, system, equipment and readable storage medium for searching document
CN113836558A (en) * 2021-09-27 2021-12-24 西安万像电子科技有限公司 File encryption method, device and file decryption method
CN114722416A (en) * 2022-06-09 2022-07-08 湖南师范大学 Encryption-based financial informatization data processing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
颜祯;: "浅谈云计算中加密数据的处理技术", 信息***工程 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116166702A (en) * 2023-04-20 2023-05-26 联一信息技术(北京)有限公司 Data storage method of payment management system

Also Published As

Publication number Publication date
CN115952530B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
US7325141B2 (en) Method and system for secure access
US6981141B1 (en) Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
US6317834B1 (en) Biometric authentication system with encrypted models
US20020133704A1 (en) Verification of identity of participant in electronic communication
US20120233454A1 (en) Data security for digital data storage
CN110289946B (en) Block chain wallet localized file generation method and block chain node point equipment
JPH08171535A (en) Secrecy protection method of computer data
GB2329497A (en) Controlling access to electronically provided data or services
CN108768990A (en) It is a kind of that encryption method can search for based on block chain
CN1322431C (en) Encryption retention and data retrieve based on symmetric cipher key
CN104778954B (en) A kind of CD subregion encryption method and system
CN115952530A (en) Financial data processing method and system for improving confidentiality and computer
JPH09247141A (en) Group ciphering method
RU2311676C2 (en) Method for providing access to objects of corporate network
CN105630855A (en) File sharing method, file sharing system and terminal
EP3378188B1 (en) Protections for unauthorized copying (anti-cloning) method and system
CN117077202A (en) SGX (service gateway) -based network data security protection system and method
CN100486157C (en) Distribution type data encryption method
US20080126808A1 (en) Encrypted dataset access by custodians
CN115694921A (en) Data storage method, device and medium
CN113489669B (en) User data protection method and device
bin Suhaimi et al. Assessment of Malaysian e-passport PKI based on ISO 27000 series international standards
CN110830252B (en) Data encryption method, device, equipment and storage medium
CN110647756B (en) Online examination management system based on blockchain and CP-ABE and application method thereof
CN116257862B (en) Data storage system based on data hierarchical classification and database transparent encryption and decryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant