CN114491610A - Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key - Google Patents

Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key Download PDF

Info

Publication number
CN114491610A
CN114491610A CN202210339607.7A CN202210339607A CN114491610A CN 114491610 A CN114491610 A CN 114491610A CN 202210339607 A CN202210339607 A CN 202210339607A CN 114491610 A CN114491610 A CN 114491610A
Authority
CN
China
Prior art keywords
value
hash
data
financial
financial data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210339607.7A
Other languages
Chinese (zh)
Other versions
CN114491610B (en
Inventor
蓝飞
金翔
刘明辉
杨仁标
柴小康
戴黎
沈华强
孙泉辉
王海庆
翁凌略
徐文迪
黄建英
张冰野
郁静
蒋嘉明
龙瓯燕
聂海涛
朱海军
包江雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN202210339607.7A priority Critical patent/CN114491610B/en
Publication of CN114491610A publication Critical patent/CN114491610A/en
Application granted granted Critical
Publication of CN114491610B publication Critical patent/CN114491610B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N10/00Quantum computing, i.e. information processing based on quantum-mechanical phenomena
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Pure & Applied Mathematics (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Computational Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a smart sharing financial platform and a system based on a Hash encryption algorithm and a quantum key, comprising: the method comprises the steps that a middle station receives first financial data sent by a data sending terminal, and a corresponding first Hash encryption algorithm is selected according to type information of the first financial data to calculate the first financial data to obtain a first Hash value; the middle station receives a quantum encryption public key sent by the quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and calculates the second financial data according to a second hash encryption algorithm to obtain a second hash value; the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value; and the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, and sends the hash table and the second financial data to a data receiving end.

Description

Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key
Technical Field
The invention relates to the technical field of fusion encryption, in particular to an intelligent sharing financial platform based on a Hash encryption algorithm and a quantum key.
Background
Financial data is of vital importance to a company, who typically processes the financial data in a confidential manner. However, in the actual production and operation activities of a company, it is necessary to frequently transmit and retrieve a certain type of financial data, and the retrieved financial data is transmitted between networks or terminals, and in the process, the financial data is easily stolen by others.
The quantum encryption technology is a series of encryption technologies such as key generation, plaintext obfuscation encryption, ciphertext restoration decryption, ciphertext communication, anti-eavesdropping and the like by using a quantum principle. Generally, a quantum encryption key is generated by a quantum server and is sent to a terminal needing to be encrypted, and the encrypted terminal encrypts data to be encrypted according to the quantum key.
Financial data is generally larger, and a lot of numerical values exist in the financial data, if one numerical value is wrong, the whole financial data is wrong, and the subsequent production and operation activities are affected by workers, so that a method capable of guaranteeing the safety of the financial data and guaranteeing the accuracy of information is urgently needed.
Disclosure of Invention
The embodiment of the invention provides a smart sharing financial platform and a system based on a Hash encryption algorithm and a quantum key, which can effectively ensure and verify the safety and the integrity of financial data by combining the Hash encryption algorithm and the quantum key when the financial data are transmitted between different terminals, ensure that the transmitted financial data are safely transmitted and ensure the information accuracy of the financial data.
In a first aspect of the embodiments of the present invention, a smart shared financial platform based on a hash encryption algorithm and a quantum key is provided, including a middle platform and a quantum server connected to the middle platform, and implementing shared transmission of financial information between a data sending terminal and a data receiving terminal based on the smart shared financial platform by the following steps, including:
the method comprises the steps that a middle station receives first financial data sent by a data sending terminal, and a corresponding first Hash encryption algorithm is selected according to type information of the first financial data to calculate the first financial data to obtain a first Hash value;
the middle station receives a quantum encryption public key sent by a quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and selects a corresponding second Hash encryption algorithm according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value;
the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value;
the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, the hash table and the second financial data are sent to a data receiving end, the middle station sends a key instruction to the quantum server, and the quantum server sends a quantum encryption private key corresponding to the quantum encryption public key to the data receiving end based on the key instruction.
Optionally, in a possible implementation manner of the first aspect, in the step of receiving, by the central station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the first financial data is converted into character type information, selecting a first Hash encryption algorithm of a first type, wherein the first Hash encryption algorithm of the first type is
Figure 360928DEST_PATH_IMAGE001
The algorithm,
Figure 12489DEST_PATH_IMAGE002
An algorithm and
Figure 526647DEST_PATH_IMAGE003
any one of the algorithms;
and converting the first financial data into a text string, and calculating the text string according to the first Hash encryption algorithm of the first type to obtain a first Hash value.
Optionally, in a possible implementation manner of the first aspect, in the step of converting the first financial data into a text string and calculating the text string according to the first type of first hash encryption algorithm to obtain the first hash value, the method specifically includes:
randomly selecting a plurality of character tables with target quantity in the first financial data, respectively adding a first label to the selected plurality of character tables, and sequencing to obtain a first sequencing result, wherein each character table has a corresponding financial value;
respectively adding a first label to the plurality of character tables, sequencing the character tables to obtain an event of a first sequencing result, recording the event and generating first monitoring information;
after the plurality of character tables are sorted according to a first sorting result, the character string formed by the plurality of character tables is subjected to calculation of a first type of first Hash encryption algorithm to obtain a first Hash value, and the first monitoring information and the first Hash value are bound.
Optionally, in a possible implementation manner of the first aspect, in the step of receiving, by the central station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the type information is image type information, selecting a first Hash encryption algorithm of a second type, wherein the first Hash encryption algorithm of the first type is
Figure 656277DEST_PATH_IMAGE001
The algorithm,
Figure 470649DEST_PATH_IMAGE002
An algorithm and
Figure 152166DEST_PATH_IMAGE003
any one of the algorithms;
and converting the first financial data into an image character string, and calculating the image character string according to the second type of first Hash encryption algorithm to obtain a first Hash value.
Optionally, in a possible implementation manner of the first aspect, in the step of converting the first financial data into an image string and calculating the image string according to the second type of first hash encryption algorithm to obtain a first hash value, the method specifically includes:
randomly selecting a plurality of images of a target quantity in the first financial data, respectively adding second labels to the selected plurality of images, and sequencing to obtain a second sequencing result, wherein each image has a corresponding financial value;
respectively adding second labels to the multiple images, sequencing the multiple images to obtain events of a second sequencing result, recording the events, and generating second monitoring information;
and after the plurality of images are sequenced according to a second sequencing result, calculating a second type of first Hash encryption algorithm on an image character string formed by the plurality of images to obtain a first Hash value, and binding the second monitoring information and the first Hash value.
Optionally, in a possible implementation manner of the first aspect, the receiving, at the middle station, a quantum encryption public key sent by a quantum server, performing encryption processing on the first financial data according to the quantum encryption public key to obtain second financial data, and selecting a corresponding second hash encryption algorithm according to type information of the second financial data to calculate the second financial data to obtain a second hash value specifically includes:
if the second financial data is judged to be encrypted, selecting a second Hash encryption algorithm, wherein the second Hash encryption algorithm is
Figure 153620DEST_PATH_IMAGE004
The algorithm,
Figure 352520DEST_PATH_IMAGE005
An algorithm and
Figure 755820DEST_PATH_IMAGE006
any one of the algorithms;
and converting the encrypted second financial data into a fusion character string, and calculating the fusion character string according to the second Hash encryption algorithm to obtain a second Hash value.
Optionally, in a possible implementation manner of the first aspect, the determining the target number includes:
acquiring a quantity value of a document corresponding to financial information in first financial data and a data value of each document, wherein the document is any one of a character table or an image;
acquiring a current processing quantity value and a current cache quantity value of a middle station at the current moment;
and generating a data evaluation value according to the quantity value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middle station, and obtaining a target quantity according to the data evaluation value and the processing evaluation value.
Optionally, in a possible implementation manner of the first aspect, in the step of generating a data evaluation value according to a quantity value of documents in the first financial data and a data value of each document, generating a processing evaluation value according to a current processing quantity value and a current cache quantity value of the middle station, and obtaining the target quantity according to the data evaluation value and the processing evaluation value, the method specifically includes:
calculating based on a preset data conversion coefficient and data values of all documents to obtain a data evaluation value, obtaining a processing evaluation value based on a preset processing quantity conversion value, a cache quantity conversion value, a current processing quantity value and a current cache quantity value, weighting the data evaluation value and the processing evaluation value according to a first weight value and a second weight value respectively, and multiplying the data evaluation value and the processing evaluation value by a reference quantity value to obtain a target quantity;
if the preliminary target quantity is an integer, taking the preliminary target quantity as a final target quantity;
and if the preliminary target quantity is not an integer, processing the preliminary target quantity in a rounding mode to obtain the target quantity of the integer.
Optionally, in a possible implementation manner of the first aspect, the method further includes a training module, and adjusting the reference quantity value based on the training module includes the following steps:
receiving the target quantity actively input by the user, and comparing the target quantity actively input by the user with the calculated target quantity to obtain a comparison value;
and adjusting the reference quantity value according to the comparison value.
In a second aspect of the embodiments of the present invention, there is provided a smart shared finance system based on a hash encryption algorithm and a quantum key, including the smart shared finance platform according to the first aspect and various possible designs of the first aspect of the present invention, and further including:
the data receiving end receives the hash table and the second financial data sent by the middle station;
the data receiving end receives a quantum encryption private key sent by the quantum server;
the data receiving end extracts a first hash value and a second hash value in the hash table, and calculates the first hash value and the second hash value based on a third hash encryption algorithm to obtain a fourth hash value;
if the fourth hash value corresponds to the third hash value, the first hash value and the second hash value are determined to be correct, and the second financial data is calculated according to a second hash encryption algorithm to obtain a fifth hash value;
if the fifth hash value corresponds to the second hash value, the second financial data is determined to be correct, and the received quantum encryption private key is called to decrypt the second financial data to obtain first financial data;
and calculating the first financial data based on a first Hash encryption algorithm to obtain a sixth Hash value, and if the sixth Hash value corresponds to the first Hash value, judging that the first financial data received by a data receiving end is correct.
The invention provides an intelligent sharing financial platform and system based on a Hash encryption algorithm and a quantum key. Firstly, the first financial data is subjected to calculation of a Hash encryption algorithm to obtain a corresponding first Hash value, and the purpose that the data receiving end verifies the first financial data can be achieved through the first Hash value. And then encrypting the financial data according to the quantum encryption public key to obtain the encrypted second financial data, and the mode can ensure the quantum encryption of the financial data and the safety of the financial data. After the encrypted second financial data is obtained, the hash encryption algorithm is calculated on the second financial data to obtain a corresponding second hash value, the purpose of verifying the second financial data by the data receiving end can be achieved through the second hash value, a third hash value is obtained through the first hash value and the second hash value, and the purpose of verifying the first hash value and the second hash value by the data receiving end can be achieved through the third hash value. According to the method, through verification at multiple levels, the correctness of the transmitted first financial data, the encrypted second financial data and the first hash value and the second hash value for verifying the first financial data and the second financial data can be respectively verified, so that the first financial data, the second financial data, the first hash value and the second hash value cannot be falsified in the generation, use and transmission processes, the accuracy of the financial data is ensured, the financial data is effectively encrypted through the quantum encryption public key, and the financial data is prevented from being acquired by other people.
According to the technical scheme provided by the invention, when the hash values of different types of financial data are calculated, different types of hash encryption algorithms are adopted, and partial character tables or images are selected according to different data volumes of the financial data to calculate the first hash value, so that the data volume of the first hash value is reduced. And through the first monitoring information and the second monitoring information, a mode of calculating the first hash value based on a part of the character table or the image can be recorded, so that a sixth hash value calculated by the data receiving end when the data receiving end verifies the first financial data is the same as the first hash value.
According to the technical scheme provided by the invention, when the target number of the first financial data documents is selected, calculation is carried out according to the number values of all data documents included in the current first financial data, the data value of each document, the current processing value of the middle desk and the current cache value, so that the calculation of the first hash value can be carried out according to the data values of the first financial data and the working state of the middle desk when the first hash value is calculated, the first hash value is obtained on the premise of ensuring that large calculation pressure cannot be caused on the middle desk, the accuracy of the first financial data is maximally ensured on the premise of ensuring the stable working of the middle desk, and the robustness of the technical scheme provided by the invention is improved.
Drawings
FIG. 1 is a block diagram of a smart shared financial platform based on a hash encryption algorithm and quantum keys;
FIG. 2 is a flow diagram of a first embodiment of a smart shared financial platform based on a hash encryption algorithm and quantum keys;
FIG. 3 is a flowchart of a second embodiment of a smart sharing financial platform based on a hash algorithm and a quantum key.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that A, B, C all comprise, "comprises A, B or C" means comprise one of A, B, C, "comprises A, B and/or C" means comprise any 1 or any 2 or 3 of A, B, C.
It should be understood that in the present invention, "B corresponding to a", "a corresponds to B", or "B corresponds to a" means that B is associated with a, and B can be determined from a. Determining B from a does not mean determining B from a alone, but may be determined from a and/or other information. And the matching of A and B means that the similarity of A and B is greater than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
The invention provides a smart shared finance platform based on a Hash encryption algorithm and a quantum key, and is shown in a schematic connection structure diagram of the smart shared finance platform in figure 1. Wisdom sharing financial platform include well platform and with the quantum server that well platform is connected. Wisdom sharing financial platform includes well platform, well platform is connected with a plurality of data transmission terminal and data receiving terminal respectively, can understand like this, data sending end can be regarded as the inside terminal of company, data sending end can pass through internal network with well platform promptly and be connected, data receiving terminal can be the outside terminal of company, data receiving terminal can pass through external network with well platform and be connected, when needs carry out the biography financial data outward, need handle the financial data in the data sending end through the terminal, well platform sends to data receiving terminal after handling data.
The quantum server can be built by a company or a third party. The quantum server built by the company can be equipment belonging to an internal network of the company, but the quantum server also needs to be connected with an external network, and the quantum server can transmit the quantum encrypted public key to the intermediate station through the internal network. The quantum server established in cooperation with the third party also needs to be connected with the external network when sending the quantum key to the intermediate station, so the configuration mode of the quantum service is not limited in any way, and can be set according to actual scenes.
The technical scheme provided by the invention realizes the sharing transmission of financial information between a data sending terminal and a data receiving terminal based on an intelligent sharing financial platform through the following steps, as shown in figure 2, the method comprises the following steps:
step S110, the middle station receives first financial data sent by a data sending terminal, and selects a corresponding first Hash encryption algorithm according to the type information of the first financial data to calculate the first financial data to obtain a first Hash value. According to the technical scheme provided by the invention, the middle station firstly receives first financial data sent by the data sending terminal, the first financial data comprises a plurality of first financial information, and the first financial information can be annual tax payment statement, asset liability statement, profit statement, detail account, chronological account and the like. In the practical use process, the financial information can be expressed in various forms, such as a form (EXCEL form) and an image form (financial value scanning piece), and the financial information of different types of information can be transmitted according to different requirements and scenes. The invention adopts different modes of calculating the first hash value according to different types of the financial data.
In a possible implementation manner of the technical solution provided by the present invention, step S110 specifically includes:
if the first financial data is converted into character type information, selecting a first Hash encryption algorithm of a first type, wherein the first Hash encryption algorithm of the first type is
Figure 483605DEST_PATH_IMAGE001
The algorithm,
Figure 237934DEST_PATH_IMAGE002
An algorithm and
Figure 83268DEST_PATH_IMAGE003
any one of the algorithms. Generally, the amount of data before encryption is less than the amount of data after encryption, so the collision rate of the first hash value obtained by calculating the first hash encryption algorithm is lower, so the invention can choose
Figure 341074DEST_PATH_IMAGE001
The algorithm,
Figure 770918DEST_PATH_IMAGE002
An algorithm and
Figure 746965DEST_PATH_IMAGE003
the algorithm is used as a first hash encryption algorithm.
And converting the first financial data into a text string, and calculating the text string according to the first Hash encryption algorithm of the first type to obtain a first Hash value. The method can firstly convert the first financial data into a character string, all documents and data consist of codes and characters in a computer language, and the method can acquire the character string corresponding to the first financial data, namely convert the Excel-form first financial data into the character string, and at the moment, the character string can represent the corresponding first financial data. According to the invention, the character string is calculated according to the first type of the first hash encryption algorithm to obtain the first hash value, the hash value length of the first hash value is shorter, and the corresponding relation between the hash value length of the first hash value and the first hash encryption algorithm is shown in table 1.
Figure 756509DEST_PATH_IMAGE007
In the technical scheme provided by the present invention, in the step of converting the first financial data into a text string and calculating the text string according to the first type of first hash encryption algorithm to obtain a first hash value, the method specifically comprises:
and randomly selecting a plurality of character tables with target quantity in the first financial data, respectively adding a first label to the plurality of selected character tables, and sequencing to obtain a first sequencing result, wherein each character table has a corresponding financial value. According to the technical scheme provided by the invention, a plurality of character tables can be randomly selected, for example, the first financial data comprises financial information 1 to financial information 6, a plurality of character tables with target quantity can be randomly selected from the 6 financial information, the target quantity can be 2, for example, the randomly selected financial information is financial information 3 and financial information 5, the invention adds a first label to the financial information 3 and the financial information 5 respectively, and the first label can be a letter, for example A, B, C, D and the like. The first label added to the text table may be randomly added, for example, the first label added to the financial information 3 is a, and the first label added to the financial information 5 is B. The invention can sort the character table according to the sorting sequence of the first label, and if the sorting sequence of the first label is AB, the first sorting result is financial information 3-financial information 5. Each text table has a corresponding financial value, for example, if the text table is an annual tax return form, the value corresponding to the annual tax amount is the financial value.
And respectively adding a first label to the plurality of character tables, sequencing the character tables to obtain an event of a first sequencing result, recording the event, and generating first monitoring information. The invention records the event of adding the first label and obtaining the first sequencing result, and then generates corresponding first monitoring information (data receiving terminal), wherein the first monitoring information is used for enabling the data receiving terminal to determine the generation mode of the first hash value, and further can verify the first hash value according to the same mode.
After the plurality of character tables are sorted according to a first sorting result, the character string formed by the plurality of character tables is subjected to calculation of a first type of first Hash encryption algorithm to obtain a first Hash value, and the first monitoring information and the first Hash value are bound. According to the technical scheme provided by the invention, the corresponding character strings can be obtained according to the first sequencing result, the character content of the character strings can be obtained according to the financial information 3 and the financial information 5, and the character sequence of the character strings can be obtained according to the sequencing sequence of the financial information 3 and the financial information 5. The invention can calculate the selected character table through the first Hash encryption algorithm of the first type to obtain the first Hash value, and binds the first Hash value with the first monitoring information, so that the invention can inform the data receiving end of the generation mode of the first Hash value, and the data receiving end can carry out normal verification on the first property data.
According to the technical scheme provided by the invention, the correctness of the first property data can be verified through the first hash value, and when the first hash value is generated, in order to reduce the data processing amount of a middle station, the target amount of financial information in the financial data can be randomly selected, and all financial information in the financial data can not be selected, so that the data processing amount for generating the first hash value is reduced. Generally, when the first financial data changes, the probability of a plurality of financial information in the first financial data is influenced, so that the integrity of all financial information can be reflected by the randomly determined part of financial information, and all financial information is guaranteed to be unaffected.
In another possible implementation manner of the technical solution provided by the present invention, step S110 specifically includes:
if the type information is image type information, selecting a first Hash encryption algorithm of a second type, wherein the first Hash encryption algorithm of the first type is
Figure 399980DEST_PATH_IMAGE001
The algorithm,
Figure 594201DEST_PATH_IMAGE002
An algorithm and
Figure 323122DEST_PATH_IMAGE003
any one of the algorithms. Generally, the amount of data before encryption is less than the amount of data after encryption, so the collision rate of the first hash value obtained by calculating the first hash encryption algorithm is lower, so the invention can choose
Figure 870778DEST_PATH_IMAGE001
The algorithm,
Figure 103177DEST_PATH_IMAGE002
An algorithm and
Figure 874823DEST_PATH_IMAGE003
the algorithm is used as a first hash encryption algorithm.
And converting the first financial data into an image character string, and calculating the image character string according to the second type of first Hash encryption algorithm to obtain a first Hash value. The invention can firstly convert the first financial data into the image character string, in the computer language, all images are composed of codes and characters, the invention can acquire the image character string corresponding to the first financial data, namely, the first financial data in the form of the image is converted into the image character string, and at the moment, the image character string can represent the corresponding first financial data. According to the invention, the image character string is calculated according to the second type of first hash encryption algorithm to obtain the first hash value, the hash value length of the first hash value is shorter, and the corresponding relation between the hash value length of the first hash value and the first hash encryption algorithm is shown in table 2.
Figure 435249DEST_PATH_IMAGE009
The first hash encryption algorithm of the first type and the second type may be the same algorithm or different algorithms.
In the technical solution provided by the present invention, in the step of converting the first financial data into an image string and calculating the image string according to the second type of first hash encryption algorithm to obtain a first hash value, the method specifically includes:
and randomly selecting a plurality of images of the target number in the first financial data, respectively adding second labels to the plurality of selected images, and sequencing to obtain a second sequencing result, wherein each image has a corresponding financial value. According to the technical scheme provided by the invention, a plurality of images can be randomly selected, for example, the first financial data comprises financial information 1 to financial information 6, a target number of the images can be randomly selected from the 6 financial information, the target number can be 2, for example, the randomly selected financial information is financial information 3 and financial information 5, the invention adds a first label to the financial information 3 and the financial information 5 respectively, and the first label can be a letter, such as A, B, C, D and the like. The first label added to the image may be randomly added, for example, the first label added to the financial information 3 is a, and the first label added to the financial information 5 is B. The images can be sorted according to the sorting order of the first labels, and if the sorting order of the first labels is AB, the first sorting result is financial information 3-financial information 5. Each image has a corresponding financial value, for example, if the image is an annual tax return, the value corresponding to the annual tax amount is the financial value.
And respectively adding a second label to the plurality of images, sequencing the images to obtain an event of a second sequencing result, recording the event, and generating second monitoring information. The invention records the event which is added with the second label and obtains the second sequencing result, and then generates corresponding second monitoring information, wherein the second monitoring information is used for enabling the data receiving end to determine the generation mode of the first hash value, and further can verify the first hash value according to the same mode.
And after the plurality of images are sequenced according to a second sequencing result, calculating a second type of first Hash encryption algorithm on an image character string formed by the plurality of images to obtain a first Hash value, and binding the second monitoring information and the first Hash value. According to the technical scheme provided by the invention, the corresponding image character strings can be obtained according to the second sequencing result, the character content of the image character strings can be obtained according to the financial information 3 and the financial information 5, and the character sequence of the image character strings can be obtained according to the sequencing sequence of the financial information 3 and the financial information 5. The invention can calculate the selected image through the second type of first Hash encryption algorithm to obtain the first Hash value, and bind the first Hash value and the second monitoring information, so that the invention can inform the data receiving end of the generation mode of the first Hash value, and the data receiving end can normally verify the first property data.
Generally, the financial data of the image type information is larger than the financial data of the character table type information, so that when the first hash encryption algorithm of the first type and the first hash encryption algorithm of the second type are selected, the length of the hash value obtained by the first hash encryption algorithm of the second type is larger than that obtained by the first hash encryption algorithm of the first type, and further, the method and the device can adjust different types of data to match different hash encryption algorithms according to the possibility of collision rate.
Step S120, the middle station receives the quantum encryption public key sent by the quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and selects a corresponding second Hash encryption algorithm according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value. According to the technical scheme provided by the invention, the middle station can receive the quantum encryption public key sent by the quantum server, and the second financial data can be obtained by encrypting the first financial data through the quantum encryption public key. According to the method and the device, the second hash value is obtained by calculating the second financial data through the second hash encryption algorithm, so that the data receiving end can verify the correctness of the second financial data through the second hash value.
In a possible implementation manner of the technical solution provided by the present invention, step S120 specifically includes:
if the second financial data is judged to be encrypted, selecting a second Hash encryption algorithm, wherein the second Hash encryption algorithm is
Figure 52175DEST_PATH_IMAGE004
The algorithm,
Figure 404659DEST_PATH_IMAGE005
An algorithm and
Figure 81628DEST_PATH_IMAGE006
any one of the algorithms. According to the technical scheme provided by the invention, after the second financial data is encrypted, the type information of the second financial data is considered to correspond to the second Hash encryption algorithm at the moment, and the method can be used for encrypting the second financial data
Figure 253983DEST_PATH_IMAGE004
The algorithm,
Figure 533655DEST_PATH_IMAGE005
An algorithm and
Figure 6225DEST_PATH_IMAGE006
the algorithm selects a corresponding algorithm.
And converting the encrypted second financial data into a fusion character string, and calculating the fusion character string according to the second Hash encryption algorithm to obtain a second Hash value. The method can convert the encrypted second financial data into the fusion character string, the fusion character string has the character information of the first financial data and also includes the character information of the quantum encryption public key, and the second hash value obtained by calculation can verify the accuracy of the encrypted second financial data.
In a possible implementation manner, the technical solution provided by the present invention determines the target number by the following steps, as shown in fig. 3, including:
step S210, obtaining the quantity value of the document corresponding to the financial information in the first financial data and the data value of each document, wherein the document is any one of a character table or an image. According to the technical scheme provided by the invention, each piece of financial information is taken as a document which can be the text table or an image, and the quantity value of the document and the data value of each document are obtained.
And step S220, acquiring the current processing quantity value and the current cache quantity value of the middle station at the current moment. Before the first property data is calculated, the working state of the middle station at the current moment can be obtained, the working state of the middle station can be reflected through the current processing quantity value and the current cache quantity value of the middle station, the current processing quantity value can be regarded as the CPU occupancy rate of the residual processing quantity, for example, the current CPU occupancy rate is 30 percent, and the current processing quantity value is 70 percent of the CPU occupancy rate at the moment, namely, the computing power and the computing quantity of the CPU occupancy rate are idle 70 percent. The current buffer amount value may be regarded as a remaining amount value buffered at the current time, for example, the buffer space is 2GB, and at this time, the buffer space already occupies 1GB, and then the current buffer amount value may be the remaining unoccupied 1 GB.
Step S230, generating a data evaluation value according to the number value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing value and the current buffer value of the middle station, and obtaining a target number according to the data evaluation value and the processing evaluation value. According to the technical scheme provided by the invention, a data evaluation value is generated according to the quantity value of the documents in the first financial data and the data value of each document, the data evaluation value can evaluate the data quantity of the first financial data needing to be processed, generally speaking, the larger the data quantity of the first financial data is, the more financial information needs to be processed at the moment, and the more target quantity needs to be determined by the method; conversely, the smaller the data size of the first financial data, the smaller the financial information to be processed at that time, and the smaller the target amount to be determined by the present invention at that time, so that the present invention is obtained based on the first financial data when determining the target amount. The invention can generate a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middle station, the larger the processing evaluation value is, the better the state of the middle station is, the stronger the data processing capability is, more data can be processed, so the target quantity can be increased; conversely, if the processing evaluation value is smaller, the state of the middle station is proved to be poor at this time, and the data processing capability is weaker, less data can be processed at this time, so that the target number can be adjusted to be lower at this time, so that the invention is obtained according to the state of the middle station when determining the target number.
In one possible embodiment, the method for obtaining the target number according to the data evaluation value and the processing evaluation value includes:
and calculating to obtain a data evaluation value based on a preset data conversion coefficient and data values of all documents, obtaining a processing evaluation value based on a preset processing quantity conversion value, a buffer storage quantity conversion value, a current processing quantity value and a current buffer storage quantity value, respectively weighting the data evaluation value and the processing evaluation value according to a first weight value and a second weight value, and multiplying the data evaluation value and the processing evaluation value by a reference quantity value to obtain a target quantity.
The preliminary target number is calculated by the following first formula,
Figure 854095DEST_PATH_IMAGE010
wherein the content of the first and second substances,
Figure 513746DEST_PATH_IMAGE011
as a numerical value of the preliminary target number,
Figure 738054DEST_PATH_IMAGE012
is a first weight value of the first weight value,
Figure 533972DEST_PATH_IMAGE013
as an evaluation value of the data,
Figure 926645DEST_PATH_IMAGE014
is a second weight value of the first weight value,
Figure 73592DEST_PATH_IMAGE015
in order to handle the evaluation value(s),
Figure 101591DEST_PATH_IMAGE016
is used as a reference quantity value to determine the quantity of the reference quantity,
Figure 17595DEST_PATH_IMAGE017
the standard value of the quantity is used as the standard value,
Figure 941688DEST_PATH_IMAGE018
is the quantitative value of the documents in the first financial data,
Figure 841511DEST_PATH_IMAGE019
is as follows
Figure 266676DEST_PATH_IMAGE020
The data value of each of the documents is,
Figure 302766DEST_PATH_IMAGE021
in order to convert the coefficients for the data,
Figure 663340DEST_PATH_IMAGE022
is the upper limit value of the document and,
Figure 784880DEST_PATH_IMAGE023
in order to be the current value of the processed quantity,
Figure 889102DEST_PATH_IMAGE024
in order to be a standard process quantity value,
Figure 779697DEST_PATH_IMAGE025
in order to handle the amount-of-conversion value,
Figure 186539DEST_PATH_IMAGE026
for the current value of the buffer size,
Figure 529796DEST_PATH_IMAGE027
is a standard buffer size value and is,
Figure 437709DEST_PATH_IMAGE028
is a buffer storage conversion value.
The technical scheme provided by the invention can be used
Figure 182811DEST_PATH_IMAGE029
Calculating an evaluation value of the data by
Figure 9822DEST_PATH_IMAGE030
An average data value of all documents can be obtained by
Figure 840374DEST_PATH_IMAGE031
The trend value of the quantity value of the document can be obtained, when the average data value of the document and the quantity value of the document are larger, the corresponding preliminary target quantity is larger, the average data value and the trend value of the quantity value can be converted and calculated through the data conversion coefficient, and the obtained data are enabled to be largerThe evaluation value is a value that satisfies the requirement of the corresponding order.
The technical scheme provided by the invention can be used
Figure 286399DEST_PATH_IMAGE032
Calculating a processing evaluation value, a standard processing quantity value
Figure 151587DEST_PATH_IMAGE024
And standard buffer size
Figure 24865DEST_PATH_IMAGE027
May be preset, if the larger the current processing quantity value and the current cache quantity value are, the larger the current processing quantity value and the current cache quantity value are
Figure 451036DEST_PATH_IMAGE032
The larger; conversely, if the current process magnitude and the current cache magnitude are smaller, then
Figure 700752DEST_PATH_IMAGE032
The smaller. The current state of the middle stage can be evaluated through the processing evaluation value, and the larger the processing evaluation value is, the better the current state of the middle stage is.
According to the technical scheme provided by the invention, a reference quantity value is preset, and the reference quantity value can be 2. In general terms, the amount of the solvent to be used,
Figure 420446DEST_PATH_IMAGE033
is a number greater than 1, the preliminary target number will typically be greater than 2. Through the first calculation formula, the deviation of the reference quantity value can be calculated according to the quantity value of the financial information of the first financial data and the difference of the data values, and the deviation of the reference quantity value can be calculated according to the difference of the processing states of the middleboxes at the current moment, so that the invention refers to information and data of multiple dimensions when calculating the target quantity, selects the sample of the financial information for calculating the first hash value to the maximum extent on the premise of ensuring the stable work of the middleboxes, and ensures the accuracy of the first financial data during verification.
And if the preliminary target quantity is an integer, taking the preliminary target quantity as a final target quantity. When calculating the preliminary number, if the preliminary target number is an integer, the present invention directly takes the preliminary target number as the final target number.
And if the preliminary target number is not an integer, processing the preliminary target number in a rounding mode to obtain the target number of the integer. When calculating the preliminary number, if the preliminary target number is not an integer, then the preliminary target number needs to be subjected to an integer processing, and the manner of the integer processing may be to calculate and adjust the preliminary target number by rounding to obtain the target number of the integer.
In a possible embodiment, the technical solution provided by the present invention further includes a training module, which trains the first formula calculation based on the training module, and adjusts the reference quantity value, and includes the following steps:
and receiving the target quantity actively input by the user, and comparing the target quantity actively input by the user with the calculated target quantity to obtain a comparison value. The method comprises the steps that when the target quantity is calculated, calculation is carried out according to an initialized reference quantity value, in a data transmission scene with strict requirements, in order to guarantee the accuracy of financial data, a user can intervene actively to adjust the target quantity, a comparison value can be obtained by comparing the target quantity actively input by the user with the calculated target quantity, the comparison value can be regarded as the difference between the target quantity calculated by the method and the quantity which is expected to be determined by an administrator and the user, and if the difference is larger, the difference between the calculated target quantity and the target quantity expected by the administrator and the user psychology is proved to be larger.
Adjusting the reference quantity value in the first formula according to the comparison value, calculating the adjusted reference quantity value through a second formula,
Figure 464625DEST_PATH_IMAGE034
wherein the content of the first and second substances,
Figure 394404DEST_PATH_IMAGE035
for the target number that the user actively enters,
Figure 182232DEST_PATH_IMAGE036
in order to calculate the target number of the,
Figure 22012DEST_PATH_IMAGE037
in order to obtain the adjusted value of the reference quantity,
Figure 971513DEST_PATH_IMAGE038
the weight value of the first adjustment is adjusted,
Figure DEST_PATH_IMAGE039
the second weight value is adjusted.
According to the technical scheme provided by the invention, calculation is carried out according to the second formula, and the reference quantity value in the first formula is adjusted, so that the adjusted reference quantity value is more in line with the calculation scene required by a user and an administrator, the expectation of the user and the administrator is more in line with when the target quantity is calculated next time, and the accuracy of target quantity calculation is improved.
Step S130, the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value. During the transmission of the first hash value and the second hash value, the first hash value and the second hash value may be damaged, in order to ensure the accuracy of the first hash value and the second hash value, the first hash value and the second hash value are combined, the combination mode of the first hash value and the second hash value can be regarded as that the characters of the first hash value and the second hash value are sorted, the invention obtains the first combined hash value after the first hash value and the second hash value are combined, at the moment, the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value, at the moment, the third hash value can verify the accuracy of the first combined hash value, and then the data receiving end can verify the first combined hash value, the first hash value and the second hash value according to the third hash value. Thereby ensuring the accuracy of the transmitted first financial data.
Step S140, the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, the hash table and the second financial data are sent to a data receiving end, the middle station sends a key instruction to the quantum server, and the quantum server sends a quantum encryption private key corresponding to the quantum encryption public key to the data receiving end based on the key instruction. According to the technical scheme provided by the invention, the middle station can generate the hash table for the first hash value, the second hash value and the third hash value, and simultaneously send the corresponding hash table and the second financial data to the data receiving end. Before or at the same time, the central station sends a key instruction to the quantum server, where the key instruction may instruct the quantum server to send the quantum encryption private key to the corresponding data receiving end. After receiving the key instruction, the quantum server can send the corresponding quantum encryption private key to the data receiving end, and the encrypted data and the quantum encryption private key can be sent in a distributed mode, so that when a transmission link is damaged, the encrypted data (second financial data) and the quantum encryption private key cannot be intercepted simultaneously, and the safety of the encrypted data (second financial data) is guaranteed. The number of the data sending ends and the number of the data receiving ends can be multiple, and one data sending end can respectively send corresponding information and data to the multiple data receiving ends based on the middleboxes.
The technical scheme provided by the invention also provides a smart sharing financial system based on a Hash encryption algorithm and a quantum key, which comprises the smart sharing financial platform based on the Hash encryption algorithm and the quantum key, wherein a data receiving end decrypts second financial data and verifies the correctness of first financial data through the following steps,
and the data receiving end receives the hash table and the second financial data sent by the middle station. The data receiving end can receive the hash table and the second financial data sent by the middle station, the hash table can verify the second financial data, the hash table can not be encrypted, a lawless person can not obtain the financial data through the hash table, but the data receiving end can verify each data and information in the second financial data through the hash value in the hash table.
And the data receiving end receives the quantum encryption private key sent by the quantum server. And the data receiving end receives the quantum encryption private key sent by the quantum server. The time when the quantum server sends the quantum encryption private key is not limited in any way, and the quantum encryption private key can be sent to the data receiving end while the quantum encryption public key is sent to the middle station, or the quantum encryption private key can be sent to the data receiving end after the quantum encryption public key is sent to the middle station.
And the data receiving end extracts the first hash value and the second hash value in the hash table, and calculates the first hash value and the second hash value based on a third hash encryption algorithm to obtain a fourth hash value. In general, the data receiving end may calculate the hash values in an order opposite to the order in which the middleboxes produce the hash values. After the data receiving end receives the hash table and the second financial data, the data receiving end firstly calculates the first hash value and the second hash value through a third hash encryption algorithm to obtain a fourth hash value, in the process, the first hash value and the second hash value are firstly combined to obtain a second combined hash value, then the second combined hash value is calculated according to the third hash encryption algorithm to obtain a corresponding fourth hash value, and the accuracy of the first hash value and the accuracy of the second hash value can be verified through the relation between the third hash value and the fourth hash value.
And if the fourth hash value corresponds to the third hash value, determining that the first hash value and the second hash value are correct, and calculating the second financial data according to a second hash encryption algorithm to obtain a fifth hash value. If the fourth hash value is equal to the third hash value, the fourth hash value is considered to correspond to the third hash value, the first hash value and the second hash value can be considered to be correct, and the authenticity of the second financial data and the authenticity of the first financial data can be verified through the first hash value and the second hash value. According to the method and the device, the second financial data is calculated according to the second hash encryption algorithm to obtain the fifth hash value, the correctness of the second financial data obtained by encrypting the first financial data based on the quantum encryption public key is verified through the fifth hash value, and therefore the second financial data which is stable and encrypted when the second financial data is received by the data receiving end is ensured. The algorithm for calculating the second hash value and the fifth hash value is the same algorithm.
And if the fifth hash value corresponds to the second hash value, the second financial data is determined to be correct, and the received quantum encryption private key is called to decrypt the second financial data to obtain the first financial data. When the fifth hash value corresponds to the second hash value, the data receiving end may consider that the received second financial data is the same as the second financial data sent by the middle station, and at this time, the invention decrypts the second financial data according to the quantum encryption private key to obtain the first financial data.
And calculating the first financial data based on a first Hash encryption algorithm to obtain a sixth Hash value, and if the sixth Hash value corresponds to the first Hash value, judging that the first financial data received by a data receiving end is correct. According to the method and the device, after the first financial data is obtained, the first financial data is calculated according to the first Hash encryption algorithm to obtain the sixth Hash value, and when the sixth Hash value is corresponding to and identical to the first Hash value, the fact that the first financial data received by the data receiving end at the moment is correct is proved. The algorithm for calculating the sixth hash value and the first hash value is the same algorithm.
Because the first hash value can be bound with the first monitoring information or the second monitoring information, the data receiving end can obtain a generation mode of the first hash value according to the first monitoring information or the second monitoring information, call a first label, a first sorting result or a second label, and a second sorting result stored in the first monitoring information or the second monitoring information, and select corresponding financial information to sort and calculate according to the first label, the first sorting result or the second label, and the second sorting result.
In the above embodiments of the terminal or the server, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. Wisdom sharing financial platform based on hash encryption algorithm and quantum key, its characterized in that, including well platform and with the quantum server that well platform is connected realizes through following steps that financial information carries out sharing transmission between data sending terminal and data receiving terminal based on wisdom sharing financial platform, includes:
the method comprises the steps that a middle station receives first financial data sent by a data sending terminal, and a corresponding first Hash encryption algorithm is selected according to type information of the first financial data to calculate the first financial data to obtain a first Hash value;
the middle station receives a quantum encryption public key sent by a quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and selects a corresponding second Hash encryption algorithm according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value;
the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value;
the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, the hash table and the second financial data are sent to a data receiving end, the middle station sends a key instruction to the quantum server, and the quantum server sends a quantum encryption private key corresponding to the quantum encryption public key to the data receiving end based on the key instruction.
2. The intelligent shared financial platform based on hash encryption algorithm and quantum key of claim 1,
in the step of receiving, at a middling station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the first financial data is converted into character type information, selecting a first Hash encryption algorithm of a first type;
and converting the first financial data into a text string, and calculating the text string according to the first Hash encryption algorithm of the first type to obtain a first Hash value.
3. The intelligent sharing financial platform based on hash encryption algorithm and quantum key according to claim 2 wherein in the step of converting the first financial data into text string and calculating the text string according to the first type of first hash encryption algorithm to obtain the first hash value, the method specifically comprises:
randomly selecting a plurality of character tables with target quantity in the first financial data, respectively adding a first label to the selected plurality of character tables, and sequencing to obtain a first sequencing result, wherein each character table has a corresponding financial value;
respectively adding a first label to the plurality of character tables, sequencing the character tables to obtain an event of a first sequencing result, recording the event and generating first monitoring information;
after the plurality of character tables are sorted according to a first sorting result, the character string formed by the plurality of character tables is subjected to calculation of a first type of first Hash encryption algorithm to obtain a first Hash value, and the first monitoring information and the first Hash value are bound.
4. The intelligent shared financial platform based on hash encryption algorithm and quantum key of claim 1,
in the step of receiving, at a middling station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the type information is image type information, selecting a first Hash encryption algorithm of a second type;
and converting the first financial data into an image character string, and calculating the image character string according to the second type of first Hash encryption algorithm to obtain a first Hash value.
5. The intelligent sharing financial platform based on hash encryption algorithm and quantum key according to claim 4 wherein in the step of converting the first financial data into an image string and calculating the image string according to the second type of first hash encryption algorithm to obtain the first hash value, the method specifically comprises:
randomly selecting a plurality of images of a target quantity in the first financial data, respectively adding second labels to the selected plurality of images, and sequencing to obtain a second sequencing result, wherein each image has a corresponding financial value;
respectively adding a second label to the plurality of images, sequencing the images to obtain an event of a second sequencing result, recording the event and generating second monitoring information;
and after the plurality of images are sequenced according to a second sequencing result, calculating a second type of first Hash encryption algorithm on an image character string formed by the plurality of images to obtain a first Hash value, and binding the second monitoring information and the first Hash value.
6. The intelligent shared financial platform based on hash encryption algorithm and quantum key of claim 1,
the method specifically comprises the steps of receiving a quantum encryption public key sent by a quantum server at a middle station, encrypting the first financial data according to the quantum encryption public key to obtain second financial data, and selecting a corresponding second hash encryption algorithm according to type information of the second financial data to calculate the second financial data to obtain a second hash value:
if the second financial data is judged to be encrypted, selecting a second Hash encryption algorithm;
and converting the encrypted second financial data into a fusion character string, and calculating the fusion character string according to the second Hash encryption algorithm to obtain a second Hash value.
7. The intelligent shared finance platform based on the hash encryption algorithm and the quantum key according to any one of the claims 3 or 5, wherein the target quantity is determined by the following steps:
acquiring a quantity value of a document corresponding to financial information in first financial data and a data value of each document, wherein the document is any one of a character table or an image;
acquiring a current processing quantity value and a current cache quantity value of a middle station at the current moment;
and generating a data evaluation value according to the quantity value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middle station, and obtaining a target quantity according to the data evaluation value and the processing evaluation value.
8. The intelligent shared financial platform based on hash encryption algorithm and quantum key of claim 7,
the method specifically includes the steps of generating a data evaluation value according to the quantity value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middlebox, and obtaining a target quantity according to the data evaluation value and the processing evaluation value:
calculating to obtain a data evaluation value based on a preset data conversion coefficient and data values of all documents, obtaining a processing evaluation value based on a preset processing amount conversion value, a buffer storage amount conversion value, a current processing amount value and a current buffer storage amount value, respectively weighting the data evaluation value and the processing evaluation value according to a first weight value and a second weight value, and multiplying the data evaluation value and the processing evaluation value by a reference amount value to obtain a target number;
if the preliminary target quantity is an integer, taking the preliminary target quantity as a final target quantity;
and if the preliminary target quantity is not an integer, processing the preliminary target quantity in a rounding mode to obtain the target quantity of the integer.
9. The intelligent shared financial platform based on hash encryption and quantum keys of claim 8 further comprising a training module based on which the baseline value is adjusted, comprising the steps of:
receiving the target quantity actively input by the user, and comparing the target quantity actively input by the user with the calculated target quantity to obtain a comparison value;
and adjusting the reference quantity value according to the comparison value.
10. The intelligent shared finance system based on the hash encryption algorithm and the quantum key comprises the intelligent shared finance platform based on the hash encryption algorithm and the quantum key according to any one of claims 1 to 9, the data receiving end decrypts the second financial data and verifies the correctness of the first financial data through the following steps,
the data receiving end receives the hash table and the second financial data sent by the middle station;
the data receiving end receives a quantum encryption private key sent by the quantum server;
the data receiving end extracts a first hash value and a second hash value in the hash table, and calculates the first hash value and the second hash value based on a third hash encryption algorithm to obtain a fourth hash value;
if the fourth hash value corresponds to the third hash value, the first hash value and the second hash value are determined to be correct, and the second financial data is calculated according to a second hash encryption algorithm to obtain a fifth hash value;
if the fifth hash value corresponds to the second hash value, the second financial data is determined to be correct, and the received quantum encryption private key is called to decrypt the second financial data to obtain first financial data;
and calculating the first financial data based on a first Hash encryption algorithm to obtain a sixth Hash value, and if the sixth Hash value corresponds to the first Hash value, judging that the first financial data received by a data receiving end is correct.
CN202210339607.7A 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key Active CN114491610B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210339607.7A CN114491610B (en) 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210339607.7A CN114491610B (en) 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key

Publications (2)

Publication Number Publication Date
CN114491610A true CN114491610A (en) 2022-05-13
CN114491610B CN114491610B (en) 2022-07-08

Family

ID=81489057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210339607.7A Active CN114491610B (en) 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key

Country Status (1)

Country Link
CN (1) CN114491610B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114677057A (en) * 2022-05-25 2022-06-28 国网浙江省电力有限公司 Green energy financial data acquisition and evaluation method and system based on machine learning
CN116781234A (en) * 2023-05-04 2023-09-19 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN117151068A (en) * 2023-10-23 2023-12-01 国网浙江省电力有限公司 Digital intelligent financial sharing method and sharing center
CN117493466A (en) * 2023-12-27 2024-02-02 国网浙江省电力有限公司金华供电公司 Financial data synchronization method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812886A (en) * 2012-11-09 2014-05-21 中国科学院上海高等研究院 Computer cluster resource allocation system and method
CN105871902A (en) * 2016-05-25 2016-08-17 安徽问天量子科技股份有限公司 Data encryption and isolation system
CN106778283A (en) * 2016-11-21 2017-05-31 惠州Tcl移动通信有限公司 A kind of guard method of system partitioning critical data and system
CA2957584A1 (en) * 2016-02-12 2017-08-12 Coho Data, Inc. Methods, systems, and devices for adaptive data resource assignment and placement in distributed data storage systems
CN108683688A (en) * 2018-07-20 2018-10-19 中国建设银行股份有限公司浙江省分行 A method of information transmission security is realized based on Digital Envelope Technology
CN111726224A (en) * 2020-05-13 2020-09-29 北京信息科技大学 Quantum secret communication-based data integrity rapid authentication method, system, terminal and storage medium
CN111917535A (en) * 2020-06-30 2020-11-10 山东信通电子股份有限公司 Data encryption storage method and device and server
CN113067816A (en) * 2021-03-17 2021-07-02 南京维沃软件技术有限公司 Data encryption method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812886A (en) * 2012-11-09 2014-05-21 中国科学院上海高等研究院 Computer cluster resource allocation system and method
CA2957584A1 (en) * 2016-02-12 2017-08-12 Coho Data, Inc. Methods, systems, and devices for adaptive data resource assignment and placement in distributed data storage systems
CN105871902A (en) * 2016-05-25 2016-08-17 安徽问天量子科技股份有限公司 Data encryption and isolation system
CN106778283A (en) * 2016-11-21 2017-05-31 惠州Tcl移动通信有限公司 A kind of guard method of system partitioning critical data and system
CN108683688A (en) * 2018-07-20 2018-10-19 中国建设银行股份有限公司浙江省分行 A method of information transmission security is realized based on Digital Envelope Technology
CN111726224A (en) * 2020-05-13 2020-09-29 北京信息科技大学 Quantum secret communication-based data integrity rapid authentication method, system, terminal and storage medium
CN111917535A (en) * 2020-06-30 2020-11-10 山东信通电子股份有限公司 Data encryption storage method and device and server
CN113067816A (en) * 2021-03-17 2021-07-02 南京维沃软件技术有限公司 Data encryption method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZAINAB IFTIKHAR等: "Quantum Safe Cloud Computing Using Hash-based Digital Signatures", 《2021 26TH INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING 》 *
李雪晓等: "基于格的大数据动态存储完整性验证方案", 《信息网络安全》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114677057A (en) * 2022-05-25 2022-06-28 国网浙江省电力有限公司 Green energy financial data acquisition and evaluation method and system based on machine learning
CN116781234A (en) * 2023-05-04 2023-09-19 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN116781234B (en) * 2023-05-04 2024-02-02 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN117151068A (en) * 2023-10-23 2023-12-01 国网浙江省电力有限公司 Digital intelligent financial sharing method and sharing center
CN117151068B (en) * 2023-10-23 2024-01-26 国网浙江省电力有限公司 Digital intelligent financial sharing method and sharing center
CN117493466A (en) * 2023-12-27 2024-02-02 国网浙江省电力有限公司金华供电公司 Financial data synchronization method and system
CN117493466B (en) * 2023-12-27 2024-04-26 国网浙江省电力有限公司宁波供电公司 Financial data synchronization method and system

Also Published As

Publication number Publication date
CN114491610B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN114491610B (en) Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key
CN109450772B (en) Message sending method, server and computer readable storage medium
US8661240B2 (en) Joint encryption of data
US20180366036A1 (en) Pre-calculation device, method, computer-readable recording medium, vector multiplication device, and method
CN116389170B (en) Network information security management method
CN116405929B (en) Secure access processing method and system suitable for cluster communication
CN110765478A (en) Big data information secure storage encryption system and method thereof
CN107682316B (en) Method for generating dynamic password sending strategy and method for sending dynamic password
CN115049070A (en) Screening method and device of federal characteristic engineering data, equipment and storage medium
CN113935059A (en) Dynamic encryption method and device suitable for financial data and storage medium
CN114205084B (en) Quantum key-based electronic mail multi-operation encryption method and device
CN102231181B (en) Computer system used for file encryption and file encryption method
CN101647229A (en) Compressed ECDSA signatures
CN113472537B (en) Data encryption method, system and computer readable storage medium
Bentafat et al. Towards real-time privacy-preserving video surveillance
CN113449829A (en) Data transmission method based on optical character recognition technology and related device
CN110585727B (en) Resource acquisition method and device
CN113225180A (en) Method and system for protecting communication key
CN115098890B (en) Privacy calculation security audit method and system
WO2020140616A1 (en) Data encryption method and related device
CN114785501B (en) Data judging method, device and storage medium
CN115002141B (en) File storage method and device based on block chain
CN111641494A (en) Method and device for realizing global block chain
CN113743933B (en) E-commerce platform transaction information encryption transmission method and system based on block chain
CN113630425B (en) Financial data safe transmission method for multiple power bodies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant