AU2021104023A4 - Cryptography based financial analytical tool through artificial intelligence - Google Patents
Cryptography based financial analytical tool through artificial intelligence Download PDFInfo
- Publication number
- AU2021104023A4 AU2021104023A4 AU2021104023A AU2021104023A AU2021104023A4 AU 2021104023 A4 AU2021104023 A4 AU 2021104023A4 AU 2021104023 A AU2021104023 A AU 2021104023A AU 2021104023 A AU2021104023 A AU 2021104023A AU 2021104023 A4 AU2021104023 A4 AU 2021104023A4
- Authority
- AU
- Australia
- Prior art keywords
- data
- cloud
- basil
- receiver
- john thomas
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000013473 artificial intelligence Methods 0.000 title abstract description 8
- 238000000034 method Methods 0.000 claims description 21
- 238000004458 analytical method Methods 0.000 claims description 12
- 238000007405 data analysis Methods 0.000 abstract description 7
- 241001482588 Naemorhedus goral Species 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000012806 monitoring device Methods 0.000 description 4
- 241000196324 Embryophyta Species 0.000 description 3
- 238000013480 data collection Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
CRYPTOGRAPHY BASED FINANCIAL ANALYTICAL TOOL THROUGH
ARTIFICIAL INTELLIGENCE
The present invention relates to the field of encryption based
5 financial data analysis using artificial intelligence. The
cryptography based financial analytical tool comprises a data
owner (1) user system (21). The user system (21) comprises an
Artificial Intelligence computing module (22). Said user system
(21) is wirelessly connected to the cloud (31). Said data owner
10 (1) uploads the raw data (11) to the user system (21) wherein the
raw data (11) is processed by said computing module (22).
FIG 1 will be reference figure
15
13
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03
Page 3 of 3
*aonneandplaltya.celers tiaIy
rq5Wei wn idndictiundaaan Fha cloud
downer fee the raWdatalma Ue ur
systemtilr bLimarialyslisaderypwian
Al cornglingmrnduleproceta raw data
usingthe numriccomringn modleand
perfianuMciialanalsis
Al conpuig moleencypts the prcvssdda using th
etriltion mndc and goral e 91Mky or the i rlddata
vmih is uher trnsfered t the datamowner
user sys4emnansfers me enrylddata to the 4bud
whereby ihe claintoc~edlin thedatabase
reierrewee1w data in lhe cld usIng
themreetrsystemrcrmemtainacsion
I cLoudntlab aaanw er and
ackcncwledgnlhe request I
tata wner ansfrthe genrbday1tothe
r&eiaest auereceiv dWeywi chhs
veried by cloud
ac cess delad
Yes
enuryptddatabistrfraaaeewarsystsmand
ulrhrdeCypIed by usingie rated key
FIG- 3
Dr. Basil John Thomas
Description
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 3 of 3
*aonneandplaltya.celers tiaIy rq5Wei wn idndictiundaaan Fha cloud
downer fee the raWdatalma Ue ur systemtilr bLimarialyslisaderypwian
Al cornglingmrnduleproceta raw data usingthe numriccomringn modleand perfianuMciialanalsis
Al conpuig moleencypts the prcvssdda usingth etriltion mndc and goral e 91Mky or the i rlddata vmih is uher trnsfered t the datamowner
usersys4emnansfers me enrylddata to the 4bud whereby ihe claintoc~edlin thedatabase
reierrewee1w data in lhe cld usIng themreetrsystemrcrmemtainacsion
I cLoudntlab aaanw er and ackcncwledgnlhe request I tata wner ansfrthe genrbday1tothe
r&eiaest auereceiv dWeywi chhs veried by cloud
ac cess delad
Yes enuryptddatabistrfraaaeewarsystsmand ulrhrdeCypIed by usingie rated key
FIG- 3
Dr. Basil John Thomas
The present invention relates to the field of data analysis. Particularly the
present invention relates to the field of financial data analysis and encryption.
More particularly, the present invention relates to the field of encryption
based financial data analysis using artificial intelligence.
Security of valuable collected data and the outcome of analysed data are
considered one of the major factors in determining the core decisions of the
company. Most of the companies involve in reproducing inforgraphics of their
respective product developed by subject matter experts in data analysis.
Most of the time, these data are kept confidential by the company and are
shared in a secured environment. Moreover, only privileged company
professionals are allowed to share such data and respond to relevant
actions.
Executing a meeting and sharing such confidential data in a secured
environment is trusted but sharing and distributing in a public server is
uncertain as most of public servers are untrusted and may not be reliable. In
such situations, companies initiate private servers and develop unique communication mediums to preserve data confidentiality and security. But unfortunately, in other scenarios private servers are also subjected to external attacks which may lead to loss of valuable data.
Many hosts in private servers provide firewalls and data backups to provide
security but third party securities are non-effective and can be easily
breached by hackers. Therefore there is an essential need for a reliable
communication medium to transfer data. There are some innovations
proposed in the existing system which may resolve the above said issue.
The existing invention may provide an effective method to provide data
security. The existingsolutions proposed to resolve the above said issue are
disclosed in the prior art section.
Patent application RU2716735C1 describes a user authorization method and
system on a computing device. The existing invention comprises of a data
collection means test generation means, analysis means and authorization
means. The existing invention describes that the data collection means
collects information of the user and the system analyse the data and if the
data is verified, authorization to access the computing device. The existing
invention clearly proposes a data collection and authorization method for
computing device but it did not propose any methods for data encryption.
Patent application W02020057091 describes an apparatus for iOS-based
data acquisition and analysis method. Said method comprises of replacing
with a replacement response mode for which the initial response mode of an interface control of an iOS application and implementing the replacement response mode for acquiring interface control data of the interface control.
Furthermore, the existing invention describes that it executes manual bury
code and thereby improving data acquisition efficiency. Even though the
existing methods describe a method to improve acquisition efficiency, it did
not propose any data encryption methods to improve the security.
Indian patent application 202047009419 describes an industrial plant
monitoring device and distributed control system. The existing invention
comprises of a storage unit and a registration unit. The storage unit
comprises of an alarm database in which alarm information that is
identification information for specifying an alarm. The existing invention also
describes that the determination information that indicates the content of a
determination made by an operator with respect to alarm information id
inputted to an own industrial plant monitoring device, and second
determination information that indicates the content of a determination made
by another operator with respect to alarm information inputted to another
industrial plant monitoring device are stored in association with each other.
Even though the existing invention describes a monitoring device, it did not
propose any encryption based data transferring methods. Moreover, it did
not provide any data analyzing method to analyse the identified data.
There are no inventions proposed in the existing system to securely transfer
data. Moreover, there are no inventions proposed to compute financial data analysis and transfer the data securely. Therefore, the present invention proposes an encryption based financial data analysis by using artificial intelligence.The present invention also proposes a key verification method to enhance data privacy.
The main objective of the present invention is to compute financial data
analysis and transfer the data securely.
Another main objective of the present invention is to encrypt the data using
artificial intelligence.
Still another objective of the present invention is to provide an artificial
intelligence based numeric computing module to execute financial data
analysis.
Yet another objective of the present invention is to provide a key transferring
medium to enhance data privacy.
Other objectives and advantages of the present disclosure will be more
apparent from the following description, which is not intended to limit the
scope of the present disclosure.
The following presents a simplified summary of the invention in order to
provide a basic understanding of some aspects of the invention. This
summary is not an extensive overview of the present invention. It is not
intended to identify the key/critical elements of the invention or to delineate
the scope of the invention. Its sole purpose is to present some concept of the
invention in a simplified form as a prelude to a more detailed description of
the invention presented later.
According to the main aspect of the present invention, the method for
cryptography based financial analytical tool comprises the steps of
registering relevant identification data of the data owner and plurality of
receivers on the cloud. The raw data by is fed to the user system by the data
owner for financial analysis and data encryption. The raw data is processed
by Al computing module by using the numeric computing module and
performing financial analysis to extract relevant data from the raw data. Said
processed data is encrypted by the Al computing module using the
encryption module and a key is generated for the encrypted data. The
generated key is further transferred to the data owner.
According to another aspect, the encrypted data is transmitted to the cloud
by the user system whereby the received data is stored in the database. The
data in the cloud is requested by the receiver using the receiver system and the request is acknowledged by the cloud whereas data owner is notified wirelessly. The requester is identified by the data owner and the generated key is transferred to the requested receiver through mobile devices. The received key is entered by the receiver in the cloud through the receiver system and the generated key is verified by cloud. The encrypted data is transferred to receiver system and the data is decrypted by using the generated key. The numeric computing module extract data by sales funnel analyzing module, ratio analyzing module and average analyzing module.
The identification data are preferably username, passwords and contact
details.
The above and other aspects, features and advantages of a certain
exemplary embodiment of the present invention will be more apparent from
the following description taken in conjunction with the accompanying
drawings in which:
Figure 1 depicts the process of cryptography based financial analytical tool
according to the main aspect of the present invention.
Figure 2 depicts the block diagram representation of financial analytical tool
in accordance with the present invention.
Figure 3 depicts the flow chart process representation of financial analytical
tool in accordance with another main aspect of the present invention.
Person who is skilled in the art will appreciate that elements in the figures are
illustrated for simplicity and clarity and may have not been drawn to scale.
For example, the dimensions of some of the elements in the figure may be
exaggerated relative to other elements to help to improve understanding of
various exemplary embodiments of the present disclosure. Throughout the
drawings, it should be noted that like reference numbers are used to depict
the same or similar elements, features and structures.
The terms and words used in the following description and claims are not
limited to the bibliographical meanings, but are merely used by the inventor
to enable a clear and consistent understanding of the invention. Accordingly,
it should be apparent to those skilled in the art that the following description
of exemplary embodiments of the present invention are provided for
illustration purpose only and not for the purpose of limiting the invention as
defined by the appended claims and their equivalents.
Figure 1 describes the process of cryptography based financial analytical
tool (1) according to the main aspect of the present invention. The diagram
represents a data owner (1) whose intention is to upload raw data (11) to user system (21). The diagram also represents a user device (12) preferably a communication device used by the data owner (1). According to the main aspect of the present invention, said user system (21) comprises an Artificial
Intelligence computing module (22). Said user system (21) is wirelessly
connected to the cloud (31). Said data owner (1) uploads the raw data(11) to
the user system (21) wherein the raw data (11) is processed by said
computing module (22)
Typically said cloud (31) is interactively connected to the plurality of receiver
system (42) used by plurality of receivers (41). Said plurality of receiver (41)
receives the processed data through the receiver system (42). Moreover,
said receiver (41) also comprises of plurality of receiver device (43). In
another aspect, said user device (12) is wirelessly connected to the plurality
of receiver device (43).
Figure 2 describes the block diagram representation of financial analytical
tool (1) in accordance with the present invention. The block diagram
represents a data owner (1) uploading heretofore said raw data (11) to the
user system (21). According to the main aspect of the present invention, the
user system (21) comprises of Al computing module (22), said computing
module (22) comprises of numeric computing module (23) and encryption
module (27.) Said numeric computing module (23) and encryption module
(27) are interactively connected each other.
Referring the block diagram in more specific, said numeric computing
module (23) comprises of sales funnel analyzing module (24), ratio analyzing
module (25) and average analyzing module (26). Said sales funnel analyzing
module (24), ratio analyzing module (25) and average analyzing module (26)
are interactively connected to each other. During encryption, the encryption
module (27) generates a key (28) whereas said generated key (28) is
transferred to the data owner (1).
Typically, the user system (21) is wirelessly connected to the cloud (31). Said
cloud (31) comprises of a storage medium preferably a database (32) for
storing data. Said cloud (31) is wirelessly connected to a receiver system
(42) whereby the receiver (41) may able to view the data through the
receiver system (42). Said receiver (41) also comprises of a wireless
communication device preferably a receiver device (43). Furthermore, said
data owner (1) transfers the generated key (28) to the receiver (41) through
the device (12, 43).
Figure 3 describes the flow chart process representation of financial
analytical tool (1) in accordance with another main aspect of the present
invention. Initially, the data owner (1) and plurality of receivers (42) initially
registers relevant identification data on the cloud (31). Identification data
such as Username, passwords and contact details are of the users (1, 42) are registered. The data owner (1) feeds the raw data (11) to the user system (21) for financial analysis and data encryption before uploading it to the cloud (31). The Al computing module (22) process the raw data (11) using the numeric computing module (23) and perform financial analysis.
The sales funnel analysing module (24), ratio analyzing module (25) and
average analyzing module (26) process the raw data and extract relevant
useful data. Furthermore, the Al computing module (22) encrypts the
processed data using the encryption module (27) and generates a key (28)
for the encrypted data which is further transferred to the data owner (1). The
user system (21) transmitting the encrypted data to the cloud (31) whereby
the received data is stored in the database (32).
The receiver (41) request for data in the cloud (31) using the receiver system
(42) from a remote location whereas the cloud (31) acknowledges the
request and notifies the data owner (1) wirelessly. The data owner (1)
identifies the requester and transfers the generated key to the requested
receiver (41) through mobile devices (12, 43). The receiver (41) enters the
received key in the cloud (31) through the receiver system (42) and the
generated key (28) is further verified by cloud (31). If the key (28) is verified,
the encrypted data is transferred to receiver system (42) and further
decrypted by using the generated key (28).
Claims (3)
1. The method for cryptography based financial analytical tool comprises the
steps of:
- registering relevant identification data of the data owner (1) and
plurality of receivers (42) on the cloud (31);
- feeding raw data (11) by the data owner (1) to the user system (21) for
financial analysis and data encryption;
- processing the raw data (11) by Al computing module (22) by using
the numeric computing module (23) and performing financial analysis
to extract relevant data from the raw data (11);
- encrypting the processed data by the Al computing module (22) using
the encryption module (27) and generating a key (28) for the
encrypted data;
- transferring the generated key (28) to the data owner (1);
- transmitting the encrypted data to the cloud (31) by the user system
(21) whereby the received data is stored in the database (32);
- requesting for data in the cloud (31) by the receiver (41) using the
receiver system (42) and acknowledging the request by the cloud (31)
thereby notifying the data owner (1) wirelessly;
- identifying the requester the data owner (1) and transferring the
generated key (28) to the requested receiver (41) through mobile
devices (12,43);
- entering the received key by the receiver (41) in the cloud (31)
through the receiver system (42) and verifying the generated key (28)
by cloud (31);
- transferring the encrypted data to receiver system (42) and decrypting
the data by using the generated key (28);
2. The method as claimed in claim 1, characterized in that said numeric
computing module (23) extract data by sales funnel analysing module
(24), ratio analysing module (25) and average analysing module (26).
3. The method as claimed in claim 1, characterized in that said
Identification data are username, passwords and contact details.
Dr. Basil John Thomas Applicant
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 1 of 3 09 Jul 2021 2021104023
Dr. Basil John Thomas
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 2 of 3 09 Jul 2021 2021104023
Dr. Basil John Thomas
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 3 of 3 09 Jul 2021 2021104023
Dr. Basil John Thomas
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN202041034982 | 2020-08-14 | ||
IN202041034982 | 2020-08-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021104023A4 true AU2021104023A4 (en) | 2022-05-05 |
Family
ID=80247771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021104023A Ceased AU2021104023A4 (en) | 2020-08-14 | 2021-07-09 | Cryptography based financial analytical tool through artificial intelligence |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2021104023A4 (en) |
WO (1) | WO2022034394A1 (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9172718B2 (en) * | 2013-09-25 | 2015-10-27 | International Business Machines Corporation | Endpoint load rebalancing controller |
WO2017024340A1 (en) * | 2015-08-13 | 2017-02-16 | Cronus Consulting Group Pty Ltd | System for financial information reporting |
WO2017030517A1 (en) * | 2015-08-18 | 2017-02-23 | Idea Teknoloji Cozumleri Bilgisayar Sanayi Ve Ticaret Anonim Sirketi | Safe e-document synchronisation, analysis and management system |
US10237070B2 (en) * | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US11868995B2 (en) * | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
CN111210331A (en) * | 2020-01-04 | 2020-05-29 | 链农(深圳)信息科技有限公司 | Agricultural supply chain financial service platform based on block chain |
-
2021
- 2021-07-09 AU AU2021104023A patent/AU2021104023A4/en not_active Ceased
- 2021-07-09 WO PCT/IB2021/056174 patent/WO2022034394A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2022034394A1 (en) | 2022-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11706029B2 (en) | Secure and zero knowledge data sharing for cloud applications | |
US9432346B2 (en) | Protocol for controlling access to encryption keys | |
US8527748B2 (en) | System and method for hosting encrypted monitoring data | |
US11310038B2 (en) | System and method for securing data communication between computers | |
US20150186635A1 (en) | Granular Redaction of Resources | |
KR101809974B1 (en) | A system for security certification generating authentication key combinating multi-user element and a method thereof | |
EP3741093B1 (en) | System and method for privacy-preserving data retrieval for connected power tools | |
CN115118419B (en) | Data transmission method of security chip, security chip device, equipment and medium | |
CN110677234B (en) | Privacy protection method and system based on homomorphic encryption blockchain | |
CN117081815A (en) | Method, device, computer equipment and storage medium for data security transmission | |
AU2021104023A4 (en) | Cryptography based financial analytical tool through artificial intelligence | |
Wang et al. | Data transmission and access protection of community medical internet of things | |
AU2021101470A4 (en) | An artificial intelligence enabled cryptography based financial analytical tool | |
KR101809976B1 (en) | A method for security certification generating authentication key combinating multi-user element | |
KR20130085537A (en) | System and method for accessing to encoded files | |
US9998433B2 (en) | Method and apparatus for managing data, and data management system using the same | |
US11102187B2 (en) | Systems and methods for managing workflow transactions including protected personal data in regulated computing environments | |
CN113032802A (en) | Data security storage method and system | |
US20190014098A1 (en) | Method and system for establishing and managing personal black box (pbb) in virtually-networked big-data (vnbd) environment | |
Lee et al. | SSL Application for Managed Security between the Mobile and HIS Biometric Information Collection Client | |
CN116366371B (en) | Session security assessment system based on computer | |
CN114172710B (en) | Data decryption method, device, equipment and storage medium | |
CN117371048B (en) | Remote access data processing method, device, equipment and storage medium | |
CN115422596B (en) | Method for determining validity of data, financial and medical data by adopting privacy protection algorithm | |
Weber et al. | How to Prevent Misuse of IoTAG? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |