CN116843484A - Financial insurance data security management method based on Internet of things - Google Patents
Financial insurance data security management method based on Internet of things Download PDFInfo
- Publication number
- CN116843484A CN116843484A CN202311117413.3A CN202311117413A CN116843484A CN 116843484 A CN116843484 A CN 116843484A CN 202311117413 A CN202311117413 A CN 202311117413A CN 116843484 A CN116843484 A CN 116843484A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- central storage
- internet
- financial insurance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 47
- 230000005540 biological transmission Effects 0.000 claims abstract description 43
- 238000012544 monitoring process Methods 0.000 claims abstract description 32
- 230000002159 abnormal effect Effects 0.000 claims abstract description 17
- 238000013480 data collection Methods 0.000 claims abstract description 14
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 13
- 238000000034 method Methods 0.000 claims description 20
- 230000006870 function Effects 0.000 claims description 19
- 230000006855 networking Effects 0.000 claims description 17
- 238000004364 calculation method Methods 0.000 claims description 12
- 238000013507 mapping Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 claims description 8
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 5
- 238000011084 recovery Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000013523 data management Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000009118 appropriate response Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/75—Information technology; Communication
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The financial insurance data safety management method based on the Internet of things comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; according to the financial insurance data safety management method based on the Internet of things, firstly, hardware equipment of the Internet of things is deployed for control, all financial insurance data are encrypted through an encryption algorithm and then transmitted to a central storage through a safety transmission channel, data monitoring is carried out on the central storage, after abnormal conditions pass permission authentication, the data enter a central storage area for operation, and emergency conditions can be rapidly operated through remote equipment.
Description
Technical Field
The invention relates to the field of data security management, in particular to a financial insurance data security management method based on the Internet of things.
Background
With the rapid development of the financial and insurance industries, data plays a vital role in business operations. The digitization of financial transactions and insurance information necessitates the transmission, storage and management of large amounts of sensitive data between the network and the system. However, the security and confidentiality of these data becomes a serious concern. Malicious attacks, data leakage, and bad operations may result in serious economic and reputation losses. Traditional data security measures, such as firewalls and encryption, while providing some degree of protection, continue to develop new threats and vulnerabilities continue to emerge as technology continues to evolve. At the same time, the complexity of the financial insurance field makes data security management more challenging. Therefore, a security management of financial insurance data based on the internet of things is proposed. The method can realize real-time data monitoring and anomaly detection, and simultaneously ensure encrypted transmission and safe storage of data. The method also needs to support remote operation so that authorized personnel can control equipment and data in real time, and the flexibility of operation is improved.
Disclosure of Invention
The invention aims to provide a financial insurance data security management method based on the Internet of things, which aims to solve the problems in the background technology.
In order to achieve the above purpose, the invention provides a financial insurance data security management method based on the internet of things, which comprises a device deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module performs mapping encryption on the financial insurance data through a multi-level operator encryption algorithm; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured.
Further, the equipment deployment module deploys a networking authority authentication camera, a networking monitoring camera and a networking iris recognizer at the central storage server, and connects all the equipment with the Internet through a networking temperature sensor, a networking humidity sensor and a networking gas sensor, so that the equipment and the management equipment can exchange data, the monitoring instantaneity is guaranteed, and the safety of the central storage server is guaranteed.
Further, the data collection module collects and compresses financial insurance data for each computer operating financial insurance.
Further, the data encryption module uses a multi-level operator encryption algorithm to carry out deep encryption on financial policy data, and the detailed process is as follows:
according to the characteristics of the financial insurance data, two-level operators are set, the calculation disturbance of the operators is firstly solved, the operators are processed by adopting a sine function, and the calculation formula is as follows:
representing operator original content, < >>Representing operator processed content->Represents the number of iterations, +.>Representing the disturbance rejection coefficient, followed by an operator inversion sequence +.>The calculation formula is as follows:
n denotes the sequence length, k denotes the operator content,and (3) representing a rounding function, dividing data into data blocks based on the set content of the first-layer operator to obtain a second-layer operator, wherein the calculation formula is as follows:
representing the sequence number of the data block, ">And representing a second-level operator, and carrying out mapping encryption on the data by using the second-level operator, wherein the formula is as follows:
representing the data to be mapped ∈>Representing a mapped encryption function->Representing the number of data space subintervals, < >>Representing a mapping order function.
Further, the data transmission module utilizes SSH secure transmission protocol to construct a secure transmission channel between the computer and the central storage server, and the compressed and encrypted financial insurance data is transmitted to the central storage server through the secure transmission channel, so that the data cannot be tampered, intercepted and stolen in the transmission process.
Furthermore, the central storage module is responsible for carrying out safe storage and centralized and unified management on the compressed and encrypted financial insurance data, and provides data classification, data indexing, data archiving and data retrieval functions, and the central storage server regularly backs up the data and provides a data recovery mechanism.
Further, the data monitoring module is a key component for data security management, monitors data collected from various internet of things devices in real time, detects potential abnormal behaviors and risk events through data monitoring results of data monitoring software in the central storage server, and triggers an alarm and takes preset response measures when the central storage server has abnormal data and the central storage server has abnormal environment.
Further, the authority authentication module distributes different authorities to different operators by using an authority authentication mechanism, and can perform corresponding operation through authority authentication, and the authority authentication camera and the authentication of the networking iris recognizer installed by the equipment deployment module are allowed to enter the central storage server and perform corresponding operation on the central storage server at the entrance of the central storage server.
Furthermore, the remote management module can utilize the remote management device to network through equipment under the condition that an operator with the authority of the central storage server fails to arrive at the scene in time in emergency, and quickly performs remote operation after the identity authentication is passed, including equipment restarting, parameter adjustment and software updating.
The beneficial effects are that:
the invention provides a financial insurance data security management method based on the Internet of things, which comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module maps the financial insurance data through a multi-level operator encryption algorithm and performs deep encryption processing on the data, and compared with the traditional encryption algorithm, the multi-level operator encryption algorithm provided by the invention utilizes multi-level encryption operators and has better encryption effect; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured. According to the financial insurance data security management method based on the Internet of things, which is provided by the invention, a multi-level security mechanism comprising data encryption, security transmission, authority authentication and the like is adopted by utilizing the Internet of things technology, so that the security of the financial insurance data is effectively improved. Sensitive data is reliably protected during transmission and storage, and unauthorized access and malicious attack are prevented. The data monitoring module is introduced, so that data collected from various Internet of things devices can be monitored in real time. By analyzing and detecting abnormal behavior, authorized personnel are alerted in time so that they can quickly take appropriate response measures, reducing potential risks. The central storage module is capable of efficiently managing and archiving data from the various devices. The functions of data classification, indexing, backup and the like provide an efficient data management basis for subsequent data analysis and inquiry. The efficiency of data management is improved. This enables the financial insurance institution to better manage and protect its critical data, reduce risk, and promote reliability of the overall business.
Drawings
The invention will be further described with reference to the accompanying drawings, in which embodiments do not constitute any limitation on the invention, and other drawings can be obtained by one of ordinary skill in the art without undue effort from the following drawings.
Fig. 1 is a schematic diagram of the structure of the present invention.
Detailed Description
The invention is further described in connection with the following examples.
Referring to fig. 1, the present invention is directed to providing a financial insurance data security management method based on the internet of things, so as to solve the problems set forth in the background art.
In order to achieve the above purpose, the invention provides a financial insurance data security management method based on the internet of things, which comprises a device deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module performs mapping encryption on the financial insurance data through a multi-level operator encryption algorithm; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured.
Specifically, the device deployment module deploys a networking authority authentication camera, a networking monitoring camera and a networking iris recognizer at the central storage server, and connects all devices with the Internet through a networking temperature sensor, a networking humidity sensor and a networking gas sensor, so that the devices and the management devices exchange data, the real-time monitoring performance is ensured, and the safety of the central storage server is ensured.
Specifically, the data collection module collects and compresses financial insurance data for each computer operating financial insurance.
Specifically, the data encryption module uses a multi-level operator encryption algorithm to deeply encrypt financial policy data, and the detailed process is as follows:
according to the characteristics of the financial insurance data, two-level operators are set, the calculation disturbance of the operators is firstly solved, the operators are processed by adopting a sine function, and the calculation formula is as follows:
representing operator original content, < >>Representing operator processed content->Represents the number of iterations, +.>Representing the disturbance rejection coefficient, followed by an operator inversion sequence +.>The calculation formula is as follows:
n denotes the sequence length, k denotes the operator content,and (3) representing a rounding function, dividing data into data blocks based on the set content of the first-layer operator to obtain a second-layer operator, wherein the calculation formula is as follows:
representing the sequence number of the data block, ">And representing a second-level operator, and carrying out mapping encryption on the data by using the second-level operator, wherein the formula is as follows:
representing the data to be mapped ∈>Representing a mapped encryption function->Representing the number of data space subintervals, < >>Representing a mapping order function.
Specifically, the data transmission module utilizes an SSH secure transmission protocol to construct a secure transmission channel between the computer and the central storage server, and transmits the compressed and encrypted financial insurance data to the central storage server through the secure transmission channel, so that the data cannot be tampered, intercepted and stolen in the transmission process.
Specifically, the central storage module is responsible for carrying out safe storage and centralized and unified management on the compressed and encrypted financial insurance data, and provides data classification, data indexing, data archiving and data retrieval functions, and the central storage server regularly backs up the data and provides a data recovery mechanism.
Specifically, the data monitoring module is a key component for data security management, monitors data collected from various internet of things devices in real time, detects potential abnormal behaviors and risk events through data monitoring results of data monitoring software in the central storage server, and triggers an alarm and takes preset response measures when the central storage server has abnormal data and the central storage server has abnormal environment.
Specifically, the authority authentication module distributes different authorities to different operators by using an authority authentication mechanism, and can perform corresponding operation through authority authentication, and the authority authentication camera and the authentication of the networking iris recognizer installed by the equipment deployment module are allowed to enter the central storage server and perform corresponding operation on the central storage server at the entrance of the central storage server.
Specifically, the remote management module can utilize the remote management device to network through equipment under the condition that an operator with the authority of the central storage server fails to arrive at the scene in time in emergency, and quickly performs remote operation after the identity authentication is passed, including equipment restarting, parameter adjustment and software updating.
The beneficial effects are that:
the invention provides a financial insurance data security management method based on the Internet of things, which comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module maps the financial insurance data through a multi-level operator encryption algorithm and performs deep encryption processing on the data, and compared with the traditional encryption algorithm, the multi-level operator encryption algorithm provided by the invention utilizes multi-level encryption operators and has better encryption effect; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured. According to the financial insurance data security management method based on the Internet of things, which is provided by the invention, a multi-level security mechanism comprising data encryption, security transmission, authority authentication and the like is adopted by utilizing the Internet of things technology, so that the security of the financial insurance data is effectively improved. Sensitive data is reliably protected during transmission and storage, and unauthorized access and malicious attack are prevented. The data monitoring module is introduced, so that data collected from various Internet of things devices can be monitored in real time. By analyzing and detecting abnormal behavior, authorized personnel are alerted in time so that they can quickly take appropriate response measures, reducing potential risks. The central storage module is capable of efficiently managing and archiving data from the various devices. The functions of data classification, indexing, backup and the like provide an efficient data management basis for subsequent data analysis and inquiry. The efficiency of data management is improved. This enables the financial insurance institution to better manage and protect its critical data, reduce risk, and promote reliability of the overall business.
The present invention also provides a computer readable storage medium having stored therein at least one instruction that is loaded and executed by a processor to implement the above-described method. The computer readable storage medium may be, among other things, ROM, random access memory, CD-ROM, magnetic tape, floppy disk, optical data storage device, etc. The instructions stored therein may be loaded by a processor in the terminal and perform the methods described above.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (9)
1. The financial insurance data safety management method based on the Internet of things comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module performs mapping encryption on the financial insurance data through a multi-level operator encryption algorithm; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured.
2. The financial insurance data safety management method based on the internet of things according to claim 1, wherein the equipment deployment module deploys a networking authority authentication camera, a networking monitoring camera and a networking iris identifier at a central storage server, connects all equipment with the internet, enables the equipment to exchange data with management equipment, ensures monitoring instantaneity and ensures safety of the central storage server.
3. The method for managing financial insurance data security based on the internet of things according to claim 1, wherein the data collection module collects and compresses financial insurance data of each computer operating financial insurance.
4. The method for managing financial insurance data security based on the internet of things according to claim 1, wherein the data encryption module uses a multi-level operator encryption algorithm to perform deep encryption on financial insurance policy data, and the detailed process is as follows:
according to the characteristics of the financial insurance data, two-level operators are set, the calculation disturbance of the operators is firstly solved, the operators are processed by adopting a sine function, and the calculation formula is as follows:
in the formula->Representing operator original content, < >>Representing operator processed content->Represents the number of iterations, +.>Representing the disturbance rejection coefficient, followed by an operator inversion sequence +.>The calculation formula is as follows:
in the formula, n represents the sequence length, k represents the operator content, < ->And (3) representing a rounding function, dividing data into data blocks based on the set content of the first-layer operator to obtain a second-layer operator, wherein the calculation formula is as follows:
in the formula->Representing the sequence number of the data block, ">And representing a second-level operator, and carrying out mapping encryption on the data by using the second-level operator, wherein the formula is as follows:
in the formula->Representing the data to be mapped ∈>Representing the mapping of the encryption function,representing the number of data space subintervals, < >>Representing a mapping order function.
5. The financial insurance data security management method based on the internet of things according to claim 1, wherein the data transmission module utilizes an SSH security transmission protocol to construct a security transmission channel between the computer and the central storage server, and the compressed and encrypted financial insurance data is transmitted to the central storage server through the security transmission channel, so that the data cannot be tampered, intercepted and stolen in the transmission process.
6. The method for managing financial insurance data safety based on the internet of things according to claim 1, wherein the central storage module is responsible for carrying out safe storage and centralized and unified management on the compressed and encrypted financial insurance data, and provides functions of data classification, data indexing, data archiving and data retrieval, and the central storage server regularly backs up the data and provides a data recovery mechanism.
7. The method for managing financial insurance data based on the internet of things according to claim 1, wherein the data monitoring module is a key component of data security management, monitors data collected from various internet of things devices in real time, detects potential abnormal behavior and risk events through data monitoring results of data monitoring software in a central storage server, and triggers an alarm and takes predetermined response measures when the central storage server has abnormal data and the central storage server has abnormal environment.
8. The method for managing financial insurance data safety based on the internet of things according to claim 1, wherein the authority authentication module allocates different authorities to different operators by means of an authority authentication mechanism, and can perform corresponding operations only by means of authority authentication, and the authority authentication cameras and the internet iris identifiers installed by the equipment deployment module are authenticated at the entrance of the central storage server to allow access to the central storage server and perform corresponding operations on the central storage server.
9. The method for managing financial insurance data safety based on the internet of things according to claim 1, wherein the remote management module is characterized in that an operator can utilize the remote management device to network through equipment in case of emergency and the operator with the authority of the central storage server fails to arrive at the scene in time, and after the identity authentication is passed, the remote management module can rapidly perform remote operation, including equipment restarting, parameter adjustment and software updating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311117413.3A CN116843484B (en) | 2023-09-01 | 2023-09-01 | Financial insurance data security management method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311117413.3A CN116843484B (en) | 2023-09-01 | 2023-09-01 | Financial insurance data security management method based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116843484A true CN116843484A (en) | 2023-10-03 |
CN116843484B CN116843484B (en) | 2023-11-17 |
Family
ID=88172887
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311117413.3A Active CN116843484B (en) | 2023-09-01 | 2023-09-01 | Financial insurance data security management method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116843484B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9444824B1 (en) * | 2014-02-28 | 2016-09-13 | Intuit Inc. | Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
CN108629724A (en) * | 2017-03-16 | 2018-10-09 | 湖南工程学院 | A kind of new three-dimensional map is as encryption method |
CN109246088A (en) * | 2018-08-20 | 2019-01-18 | 田金荣 | A kind of big data security system based on financial service management |
CN115733681A (en) * | 2022-11-14 | 2023-03-03 | 贵州商学院 | Data security management platform for preventing data loss |
CN116027146A (en) * | 2022-12-28 | 2023-04-28 | 国网河南省电力公司电力科学研究院 | Multi-state distributed passive sensing monitoring method, device and equipment for distribution cable network |
-
2023
- 2023-09-01 CN CN202311117413.3A patent/CN116843484B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9444824B1 (en) * | 2014-02-28 | 2016-09-13 | Intuit Inc. | Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system |
CN108629724A (en) * | 2017-03-16 | 2018-10-09 | 湖南工程学院 | A kind of new three-dimensional map is as encryption method |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
CN109246088A (en) * | 2018-08-20 | 2019-01-18 | 田金荣 | A kind of big data security system based on financial service management |
CN115733681A (en) * | 2022-11-14 | 2023-03-03 | 贵州商学院 | Data security management platform for preventing data loss |
CN116027146A (en) * | 2022-12-28 | 2023-04-28 | 国网河南省电力公司电力科学研究院 | Multi-state distributed passive sensing monitoring method, device and equipment for distribution cable network |
Non-Patent Citations (1)
Title |
---|
左巍;: "金融网络安全现状与风险防范措施", 信息与电脑(理论版), no. 05, pages 121 - 122 * |
Also Published As
Publication number | Publication date |
---|---|
CN116843484B (en) | 2023-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN117040896A (en) | Internet of things management method and Internet of things management platform | |
Rani et al. | Cyber security techniques, architectures, and design | |
CN115314286A (en) | Safety guarantee system | |
CN112100662A (en) | Regional data safety monitoring system | |
CN106982204A (en) | Credible and secure platform | |
KR101889503B1 (en) | Method and apparatus for providing flight data protection | |
CN116843484B (en) | Financial insurance data security management method based on Internet of things | |
Zegzhda et al. | Approach to APCS protection from cyber threats | |
CN114844676B (en) | Emergency handling system and method for network security threat of power monitoring system | |
CN112995220A (en) | Security data security system for computer network | |
Zaimy et al. | A review of hacking techniques in IoT systems and future trends of hacking on IoT environment | |
CN113923021A (en) | Sandbox-based encrypted flow processing method, system, device and medium | |
CN114143028A (en) | Data cross-region safe transmission method and system based on electric power spot transaction service scene | |
Ali et al. | Intrusion detection and prevention against cyber attacks for an energy management system | |
Mysore | Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience | |
Pan et al. | PLC Protection System Based on Verification Separation. | |
CN111683042A (en) | Power grid data safety communication transmission system and method | |
CN112000953A (en) | Big data terminal safety protection system | |
Kishore et al. | Intrusion Detection System a Need | |
Saeed et al. | Machine learning based intrusion detection system in cloud environment | |
Kalhara et al. | Comprehensive Security Solution for an Industry 4.0 Garment Manufacturing System | |
Alnuaimi et al. | Optimizing Edge Security: Comprehensive Analysis and Mitigation Strategies for Securing Edge Computing | |
Selvaraj et al. | Security Vulnerabilities, Threats, and Attacks in IoT and Big Data: Challenges and Solutions | |
CN113839922B (en) | Information safety protection system and method for video monitoring system | |
Conte de Leon et al. | Cybersecurity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |