CN116843484A - Financial insurance data security management method based on Internet of things - Google Patents

Financial insurance data security management method based on Internet of things Download PDF

Info

Publication number
CN116843484A
CN116843484A CN202311117413.3A CN202311117413A CN116843484A CN 116843484 A CN116843484 A CN 116843484A CN 202311117413 A CN202311117413 A CN 202311117413A CN 116843484 A CN116843484 A CN 116843484A
Authority
CN
China
Prior art keywords
data
module
central storage
internet
financial insurance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311117413.3A
Other languages
Chinese (zh)
Other versions
CN116843484B (en
Inventor
王泽�
马经纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lima Technology Co ltd
Original Assignee
Beijing Lima Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lima Technology Co ltd filed Critical Beijing Lima Technology Co ltd
Priority to CN202311117413.3A priority Critical patent/CN116843484B/en
Publication of CN116843484A publication Critical patent/CN116843484A/en
Application granted granted Critical
Publication of CN116843484B publication Critical patent/CN116843484B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Biomedical Technology (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The financial insurance data safety management method based on the Internet of things comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; according to the financial insurance data safety management method based on the Internet of things, firstly, hardware equipment of the Internet of things is deployed for control, all financial insurance data are encrypted through an encryption algorithm and then transmitted to a central storage through a safety transmission channel, data monitoring is carried out on the central storage, after abnormal conditions pass permission authentication, the data enter a central storage area for operation, and emergency conditions can be rapidly operated through remote equipment.

Description

Financial insurance data security management method based on Internet of things
Technical Field
The invention relates to the field of data security management, in particular to a financial insurance data security management method based on the Internet of things.
Background
With the rapid development of the financial and insurance industries, data plays a vital role in business operations. The digitization of financial transactions and insurance information necessitates the transmission, storage and management of large amounts of sensitive data between the network and the system. However, the security and confidentiality of these data becomes a serious concern. Malicious attacks, data leakage, and bad operations may result in serious economic and reputation losses. Traditional data security measures, such as firewalls and encryption, while providing some degree of protection, continue to develop new threats and vulnerabilities continue to emerge as technology continues to evolve. At the same time, the complexity of the financial insurance field makes data security management more challenging. Therefore, a security management of financial insurance data based on the internet of things is proposed. The method can realize real-time data monitoring and anomaly detection, and simultaneously ensure encrypted transmission and safe storage of data. The method also needs to support remote operation so that authorized personnel can control equipment and data in real time, and the flexibility of operation is improved.
Disclosure of Invention
The invention aims to provide a financial insurance data security management method based on the Internet of things, which aims to solve the problems in the background technology.
In order to achieve the above purpose, the invention provides a financial insurance data security management method based on the internet of things, which comprises a device deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module performs mapping encryption on the financial insurance data through a multi-level operator encryption algorithm; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured.
Further, the equipment deployment module deploys a networking authority authentication camera, a networking monitoring camera and a networking iris recognizer at the central storage server, and connects all the equipment with the Internet through a networking temperature sensor, a networking humidity sensor and a networking gas sensor, so that the equipment and the management equipment can exchange data, the monitoring instantaneity is guaranteed, and the safety of the central storage server is guaranteed.
Further, the data collection module collects and compresses financial insurance data for each computer operating financial insurance.
Further, the data encryption module uses a multi-level operator encryption algorithm to carry out deep encryption on financial policy data, and the detailed process is as follows:
according to the characteristics of the financial insurance data, two-level operators are set, the calculation disturbance of the operators is firstly solved, the operators are processed by adopting a sine function, and the calculation formula is as follows:
representing operator original content, < >>Representing operator processed content->Represents the number of iterations, +.>Representing the disturbance rejection coefficient, followed by an operator inversion sequence +.>The calculation formula is as follows:
n denotes the sequence length, k denotes the operator content,and (3) representing a rounding function, dividing data into data blocks based on the set content of the first-layer operator to obtain a second-layer operator, wherein the calculation formula is as follows:
representing the sequence number of the data block, ">And representing a second-level operator, and carrying out mapping encryption on the data by using the second-level operator, wherein the formula is as follows:
representing the data to be mapped ∈>Representing a mapped encryption function->Representing the number of data space subintervals, < >>Representing a mapping order function.
Further, the data transmission module utilizes SSH secure transmission protocol to construct a secure transmission channel between the computer and the central storage server, and the compressed and encrypted financial insurance data is transmitted to the central storage server through the secure transmission channel, so that the data cannot be tampered, intercepted and stolen in the transmission process.
Furthermore, the central storage module is responsible for carrying out safe storage and centralized and unified management on the compressed and encrypted financial insurance data, and provides data classification, data indexing, data archiving and data retrieval functions, and the central storage server regularly backs up the data and provides a data recovery mechanism.
Further, the data monitoring module is a key component for data security management, monitors data collected from various internet of things devices in real time, detects potential abnormal behaviors and risk events through data monitoring results of data monitoring software in the central storage server, and triggers an alarm and takes preset response measures when the central storage server has abnormal data and the central storage server has abnormal environment.
Further, the authority authentication module distributes different authorities to different operators by using an authority authentication mechanism, and can perform corresponding operation through authority authentication, and the authority authentication camera and the authentication of the networking iris recognizer installed by the equipment deployment module are allowed to enter the central storage server and perform corresponding operation on the central storage server at the entrance of the central storage server.
Furthermore, the remote management module can utilize the remote management device to network through equipment under the condition that an operator with the authority of the central storage server fails to arrive at the scene in time in emergency, and quickly performs remote operation after the identity authentication is passed, including equipment restarting, parameter adjustment and software updating.
The beneficial effects are that:
the invention provides a financial insurance data security management method based on the Internet of things, which comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module maps the financial insurance data through a multi-level operator encryption algorithm and performs deep encryption processing on the data, and compared with the traditional encryption algorithm, the multi-level operator encryption algorithm provided by the invention utilizes multi-level encryption operators and has better encryption effect; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured. According to the financial insurance data security management method based on the Internet of things, which is provided by the invention, a multi-level security mechanism comprising data encryption, security transmission, authority authentication and the like is adopted by utilizing the Internet of things technology, so that the security of the financial insurance data is effectively improved. Sensitive data is reliably protected during transmission and storage, and unauthorized access and malicious attack are prevented. The data monitoring module is introduced, so that data collected from various Internet of things devices can be monitored in real time. By analyzing and detecting abnormal behavior, authorized personnel are alerted in time so that they can quickly take appropriate response measures, reducing potential risks. The central storage module is capable of efficiently managing and archiving data from the various devices. The functions of data classification, indexing, backup and the like provide an efficient data management basis for subsequent data analysis and inquiry. The efficiency of data management is improved. This enables the financial insurance institution to better manage and protect its critical data, reduce risk, and promote reliability of the overall business.
Drawings
The invention will be further described with reference to the accompanying drawings, in which embodiments do not constitute any limitation on the invention, and other drawings can be obtained by one of ordinary skill in the art without undue effort from the following drawings.
Fig. 1 is a schematic diagram of the structure of the present invention.
Detailed Description
The invention is further described in connection with the following examples.
Referring to fig. 1, the present invention is directed to providing a financial insurance data security management method based on the internet of things, so as to solve the problems set forth in the background art.
In order to achieve the above purpose, the invention provides a financial insurance data security management method based on the internet of things, which comprises a device deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module performs mapping encryption on the financial insurance data through a multi-level operator encryption algorithm; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured.
Specifically, the device deployment module deploys a networking authority authentication camera, a networking monitoring camera and a networking iris recognizer at the central storage server, and connects all devices with the Internet through a networking temperature sensor, a networking humidity sensor and a networking gas sensor, so that the devices and the management devices exchange data, the real-time monitoring performance is ensured, and the safety of the central storage server is ensured.
Specifically, the data collection module collects and compresses financial insurance data for each computer operating financial insurance.
Specifically, the data encryption module uses a multi-level operator encryption algorithm to deeply encrypt financial policy data, and the detailed process is as follows:
according to the characteristics of the financial insurance data, two-level operators are set, the calculation disturbance of the operators is firstly solved, the operators are processed by adopting a sine function, and the calculation formula is as follows:
representing operator original content, < >>Representing operator processed content->Represents the number of iterations, +.>Representing the disturbance rejection coefficient, followed by an operator inversion sequence +.>The calculation formula is as follows:
n denotes the sequence length, k denotes the operator content,and (3) representing a rounding function, dividing data into data blocks based on the set content of the first-layer operator to obtain a second-layer operator, wherein the calculation formula is as follows:
representing the sequence number of the data block, ">And representing a second-level operator, and carrying out mapping encryption on the data by using the second-level operator, wherein the formula is as follows:
representing the data to be mapped ∈>Representing a mapped encryption function->Representing the number of data space subintervals, < >>Representing a mapping order function.
Specifically, the data transmission module utilizes an SSH secure transmission protocol to construct a secure transmission channel between the computer and the central storage server, and transmits the compressed and encrypted financial insurance data to the central storage server through the secure transmission channel, so that the data cannot be tampered, intercepted and stolen in the transmission process.
Specifically, the central storage module is responsible for carrying out safe storage and centralized and unified management on the compressed and encrypted financial insurance data, and provides data classification, data indexing, data archiving and data retrieval functions, and the central storage server regularly backs up the data and provides a data recovery mechanism.
Specifically, the data monitoring module is a key component for data security management, monitors data collected from various internet of things devices in real time, detects potential abnormal behaviors and risk events through data monitoring results of data monitoring software in the central storage server, and triggers an alarm and takes preset response measures when the central storage server has abnormal data and the central storage server has abnormal environment.
Specifically, the authority authentication module distributes different authorities to different operators by using an authority authentication mechanism, and can perform corresponding operation through authority authentication, and the authority authentication camera and the authentication of the networking iris recognizer installed by the equipment deployment module are allowed to enter the central storage server and perform corresponding operation on the central storage server at the entrance of the central storage server.
Specifically, the remote management module can utilize the remote management device to network through equipment under the condition that an operator with the authority of the central storage server fails to arrive at the scene in time in emergency, and quickly performs remote operation after the identity authentication is passed, including equipment restarting, parameter adjustment and software updating.
The beneficial effects are that:
the invention provides a financial insurance data security management method based on the Internet of things, which comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module maps the financial insurance data through a multi-level operator encryption algorithm and performs deep encryption processing on the data, and compared with the traditional encryption algorithm, the multi-level operator encryption algorithm provided by the invention utilizes multi-level encryption operators and has better encryption effect; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured. According to the financial insurance data security management method based on the Internet of things, which is provided by the invention, a multi-level security mechanism comprising data encryption, security transmission, authority authentication and the like is adopted by utilizing the Internet of things technology, so that the security of the financial insurance data is effectively improved. Sensitive data is reliably protected during transmission and storage, and unauthorized access and malicious attack are prevented. The data monitoring module is introduced, so that data collected from various Internet of things devices can be monitored in real time. By analyzing and detecting abnormal behavior, authorized personnel are alerted in time so that they can quickly take appropriate response measures, reducing potential risks. The central storage module is capable of efficiently managing and archiving data from the various devices. The functions of data classification, indexing, backup and the like provide an efficient data management basis for subsequent data analysis and inquiry. The efficiency of data management is improved. This enables the financial insurance institution to better manage and protect its critical data, reduce risk, and promote reliability of the overall business.
The present invention also provides a computer readable storage medium having stored therein at least one instruction that is loaded and executed by a processor to implement the above-described method. The computer readable storage medium may be, among other things, ROM, random access memory, CD-ROM, magnetic tape, floppy disk, optical data storage device, etc. The instructions stored therein may be loaded by a processor in the terminal and perform the methods described above.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. The financial insurance data safety management method based on the Internet of things comprises an equipment deployment module, a data collection module, a data encryption module, a data transmission module, a central storage module, a data monitoring module, a permission authentication module and a remote management module; the device deployment module performs monitoring and authority authentication by deploying corresponding Internet of things devices; the data collection module compresses and collects financial insurance data in each computer; the data encryption module performs mapping encryption on the financial insurance data through a multi-level operator encryption algorithm; the data transmission module utilizes SSH safety transmission protocol to construct a safety transmission channel to transmit the encrypted financial insurance data in each computer to the central memory; the central storage module is used for carrying out centralized and unified storage on the encrypted financial insurance data through the central storage server; the data monitoring module monitors data of the central storage server in real time and alarms abnormal conditions; the right authentication module is used for allowing the hardware equipment deployed by the equipment deployment module to enter the central storage server after passing right authentication identification; after the authority authentication is carried out by the authority personnel, the remote management module can remotely and temporarily process the abnormal condition of the central storage server, so that the safety of data is ensured.
2. The financial insurance data safety management method based on the internet of things according to claim 1, wherein the equipment deployment module deploys a networking authority authentication camera, a networking monitoring camera and a networking iris identifier at a central storage server, connects all equipment with the internet, enables the equipment to exchange data with management equipment, ensures monitoring instantaneity and ensures safety of the central storage server.
3. The method for managing financial insurance data security based on the internet of things according to claim 1, wherein the data collection module collects and compresses financial insurance data of each computer operating financial insurance.
4. The method for managing financial insurance data security based on the internet of things according to claim 1, wherein the data encryption module uses a multi-level operator encryption algorithm to perform deep encryption on financial insurance policy data, and the detailed process is as follows:
according to the characteristics of the financial insurance data, two-level operators are set, the calculation disturbance of the operators is firstly solved, the operators are processed by adopting a sine function, and the calculation formula is as follows:
in the formula->Representing operator original content, < >>Representing operator processed content->Represents the number of iterations, +.>Representing the disturbance rejection coefficient, followed by an operator inversion sequence +.>The calculation formula is as follows:
in the formula, n represents the sequence length, k represents the operator content, < ->And (3) representing a rounding function, dividing data into data blocks based on the set content of the first-layer operator to obtain a second-layer operator, wherein the calculation formula is as follows:
in the formula->Representing the sequence number of the data block, ">And representing a second-level operator, and carrying out mapping encryption on the data by using the second-level operator, wherein the formula is as follows:
in the formula->Representing the data to be mapped ∈>Representing the mapping of the encryption function,representing the number of data space subintervals, < >>Representing a mapping order function.
5. The financial insurance data security management method based on the internet of things according to claim 1, wherein the data transmission module utilizes an SSH security transmission protocol to construct a security transmission channel between the computer and the central storage server, and the compressed and encrypted financial insurance data is transmitted to the central storage server through the security transmission channel, so that the data cannot be tampered, intercepted and stolen in the transmission process.
6. The method for managing financial insurance data safety based on the internet of things according to claim 1, wherein the central storage module is responsible for carrying out safe storage and centralized and unified management on the compressed and encrypted financial insurance data, and provides functions of data classification, data indexing, data archiving and data retrieval, and the central storage server regularly backs up the data and provides a data recovery mechanism.
7. The method for managing financial insurance data based on the internet of things according to claim 1, wherein the data monitoring module is a key component of data security management, monitors data collected from various internet of things devices in real time, detects potential abnormal behavior and risk events through data monitoring results of data monitoring software in a central storage server, and triggers an alarm and takes predetermined response measures when the central storage server has abnormal data and the central storage server has abnormal environment.
8. The method for managing financial insurance data safety based on the internet of things according to claim 1, wherein the authority authentication module allocates different authorities to different operators by means of an authority authentication mechanism, and can perform corresponding operations only by means of authority authentication, and the authority authentication cameras and the internet iris identifiers installed by the equipment deployment module are authenticated at the entrance of the central storage server to allow access to the central storage server and perform corresponding operations on the central storage server.
9. The method for managing financial insurance data safety based on the internet of things according to claim 1, wherein the remote management module is characterized in that an operator can utilize the remote management device to network through equipment in case of emergency and the operator with the authority of the central storage server fails to arrive at the scene in time, and after the identity authentication is passed, the remote management module can rapidly perform remote operation, including equipment restarting, parameter adjustment and software updating.
CN202311117413.3A 2023-09-01 2023-09-01 Financial insurance data security management method based on Internet of things Active CN116843484B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311117413.3A CN116843484B (en) 2023-09-01 2023-09-01 Financial insurance data security management method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311117413.3A CN116843484B (en) 2023-09-01 2023-09-01 Financial insurance data security management method based on Internet of things

Publications (2)

Publication Number Publication Date
CN116843484A true CN116843484A (en) 2023-10-03
CN116843484B CN116843484B (en) 2023-11-17

Family

ID=88172887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311117413.3A Active CN116843484B (en) 2023-09-01 2023-09-01 Financial insurance data security management method based on Internet of things

Country Status (1)

Country Link
CN (1) CN116843484B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9444824B1 (en) * 2014-02-28 2016-09-13 Intuit Inc. Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108629724A (en) * 2017-03-16 2018-10-09 湖南工程学院 A kind of new three-dimensional map is as encryption method
CN109246088A (en) * 2018-08-20 2019-01-18 田金荣 A kind of big data security system based on financial service management
CN115733681A (en) * 2022-11-14 2023-03-03 贵州商学院 Data security management platform for preventing data loss
CN116027146A (en) * 2022-12-28 2023-04-28 国网河南省电力公司电力科学研究院 Multi-state distributed passive sensing monitoring method, device and equipment for distribution cable network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9444824B1 (en) * 2014-02-28 2016-09-13 Intuit Inc. Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system
CN108629724A (en) * 2017-03-16 2018-10-09 湖南工程学院 A kind of new three-dimensional map is as encryption method
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN109246088A (en) * 2018-08-20 2019-01-18 田金荣 A kind of big data security system based on financial service management
CN115733681A (en) * 2022-11-14 2023-03-03 贵州商学院 Data security management platform for preventing data loss
CN116027146A (en) * 2022-12-28 2023-04-28 国网河南省电力公司电力科学研究院 Multi-state distributed passive sensing monitoring method, device and equipment for distribution cable network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
左巍;: "金融网络安全现状与风险防范措施", 信息与电脑(理论版), no. 05, pages 121 - 122 *

Also Published As

Publication number Publication date
CN116843484B (en) 2023-11-17

Similar Documents

Publication Publication Date Title
CN117040896A (en) Internet of things management method and Internet of things management platform
Rani et al. Cyber security techniques, architectures, and design
CN115314286A (en) Safety guarantee system
CN112100662A (en) Regional data safety monitoring system
CN106982204A (en) Credible and secure platform
KR101889503B1 (en) Method and apparatus for providing flight data protection
CN116843484B (en) Financial insurance data security management method based on Internet of things
Zegzhda et al. Approach to APCS protection from cyber threats
CN114844676B (en) Emergency handling system and method for network security threat of power monitoring system
CN112995220A (en) Security data security system for computer network
Zaimy et al. A review of hacking techniques in IoT systems and future trends of hacking on IoT environment
CN113923021A (en) Sandbox-based encrypted flow processing method, system, device and medium
CN114143028A (en) Data cross-region safe transmission method and system based on electric power spot transaction service scene
Ali et al. Intrusion detection and prevention against cyber attacks for an energy management system
Mysore Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience
Pan et al. PLC Protection System Based on Verification Separation.
CN111683042A (en) Power grid data safety communication transmission system and method
CN112000953A (en) Big data terminal safety protection system
Kishore et al. Intrusion Detection System a Need
Saeed et al. Machine learning based intrusion detection system in cloud environment
Kalhara et al. Comprehensive Security Solution for an Industry 4.0 Garment Manufacturing System
Alnuaimi et al. Optimizing Edge Security: Comprehensive Analysis and Mitigation Strategies for Securing Edge Computing
Selvaraj et al. Security Vulnerabilities, Threats, and Attacks in IoT and Big Data: Challenges and Solutions
CN113839922B (en) Information safety protection system and method for video monitoring system
Conte de Leon et al. Cybersecurity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant