AU2021104023A4 - Cryptography based financial analytical tool through artificial intelligence - Google Patents

Cryptography based financial analytical tool through artificial intelligence Download PDF

Info

Publication number
AU2021104023A4
AU2021104023A4 AU2021104023A AU2021104023A AU2021104023A4 AU 2021104023 A4 AU2021104023 A4 AU 2021104023A4 AU 2021104023 A AU2021104023 A AU 2021104023A AU 2021104023 A AU2021104023 A AU 2021104023A AU 2021104023 A4 AU2021104023 A4 AU 2021104023A4
Authority
AU
Australia
Prior art keywords
data
cloud
basil
receiver
john thomas
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021104023A
Inventor
Nisha Joseph
Basil John Thomas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Joseph Nisha Ms
Thomas Basil John Dr
Original Assignee
Joseph Nisha Ms
Thomas Basil John Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Joseph Nisha Ms, Thomas Basil John Dr filed Critical Joseph Nisha Ms
Application granted granted Critical
Publication of AU2021104023A4 publication Critical patent/AU2021104023A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

CRYPTOGRAPHY BASED FINANCIAL ANALYTICAL TOOL THROUGH ARTIFICIAL INTELLIGENCE The present invention relates to the field of encryption based 5 financial data analysis using artificial intelligence. The cryptography based financial analytical tool comprises a data owner (1) user system (21). The user system (21) comprises an Artificial Intelligence computing module (22). Said user system (21) is wirelessly connected to the cloud (31). Said data owner 10 (1) uploads the raw data (11) to the user system (21) wherein the raw data (11) is processed by said computing module (22). FIG 1 will be reference figure 15 13 Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 3 of 3 *aonneandplaltya.celers tiaIy rq5Wei wn idndictiundaaan Fha cloud downer fee the raWdatalma Ue ur systemtilr bLimarialyslisaderypwian Al cornglingmrnduleproceta raw data usingthe numriccomringn modleand perfianuMciialanalsis Al conpuig moleencypts the prcvssdda using th etriltion mndc and goral e 91Mky or the i rlddata vmih is uher trnsfered t the datamowner user sys4emnansfers me enrylddata to the 4bud whereby ihe claintoc~edlin thedatabase reierrewee1w data in lhe cld usIng themreetrsystemrcrmemtainacsion I cLoudntlab aaanw er and ackcncwledgnlhe request I tata wner ansfrthe genrbday1tothe r&eiaest auereceiv dWeywi chhs veried by cloud ac cess delad Yes enuryptddatabistrfraaaeewarsystsmand ulrhrdeCypIed by usingie rated key FIG- 3 Dr. Basil John Thomas

Description

Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 3 of 3
*aonneandplaltya.celers tiaIy rq5Wei wn idndictiundaaan Fha cloud
downer fee the raWdatalma Ue ur systemtilr bLimarialyslisaderypwian
Al cornglingmrnduleproceta raw data usingthe numriccomringn modleand perfianuMciialanalsis
Al conpuig moleencypts the prcvssdda usingth etriltion mndc and goral e 91Mky or the i rlddata vmih is uher trnsfered t the datamowner
usersys4emnansfers me enrylddata to the 4bud whereby ihe claintoc~edlin thedatabase
reierrewee1w data in lhe cld usIng themreetrsystemrcrmemtainacsion
I cLoudntlab aaanw er and ackcncwledgnlhe request I tata wner ansfrthe genrbday1tothe
r&eiaest auereceiv dWeywi chhs veried by cloud
ac cess delad
Yes enuryptddatabistrfraaaeewarsystsmand ulrhrdeCypIed by usingie rated key
FIG- 3
Dr. Basil John Thomas
CRYPTOGRAPHY BASED FINANCIAL ANALYTICAL TOOL THROUGH ARTIFICIAL INTELLIGENCE FIELD OF THE INVENTION
The present invention relates to the field of data analysis. Particularly the
present invention relates to the field of financial data analysis and encryption.
More particularly, the present invention relates to the field of encryption
based financial data analysis using artificial intelligence.
BACKGROUND OF THE INVENTION
Security of valuable collected data and the outcome of analysed data are
considered one of the major factors in determining the core decisions of the
company. Most of the companies involve in reproducing inforgraphics of their
respective product developed by subject matter experts in data analysis.
Most of the time, these data are kept confidential by the company and are
shared in a secured environment. Moreover, only privileged company
professionals are allowed to share such data and respond to relevant
actions.
Executing a meeting and sharing such confidential data in a secured
environment is trusted but sharing and distributing in a public server is
uncertain as most of public servers are untrusted and may not be reliable. In
such situations, companies initiate private servers and develop unique communication mediums to preserve data confidentiality and security. But unfortunately, in other scenarios private servers are also subjected to external attacks which may lead to loss of valuable data.
Many hosts in private servers provide firewalls and data backups to provide
security but third party securities are non-effective and can be easily
breached by hackers. Therefore there is an essential need for a reliable
communication medium to transfer data. There are some innovations
proposed in the existing system which may resolve the above said issue.
The existing invention may provide an effective method to provide data
security. The existingsolutions proposed to resolve the above said issue are
disclosed in the prior art section.
Patent application RU2716735C1 describes a user authorization method and
system on a computing device. The existing invention comprises of a data
collection means test generation means, analysis means and authorization
means. The existing invention describes that the data collection means
collects information of the user and the system analyse the data and if the
data is verified, authorization to access the computing device. The existing
invention clearly proposes a data collection and authorization method for
computing device but it did not propose any methods for data encryption.
Patent application W02020057091 describes an apparatus for iOS-based
data acquisition and analysis method. Said method comprises of replacing
with a replacement response mode for which the initial response mode of an interface control of an iOS application and implementing the replacement response mode for acquiring interface control data of the interface control.
Furthermore, the existing invention describes that it executes manual bury
code and thereby improving data acquisition efficiency. Even though the
existing methods describe a method to improve acquisition efficiency, it did
not propose any data encryption methods to improve the security.
Indian patent application 202047009419 describes an industrial plant
monitoring device and distributed control system. The existing invention
comprises of a storage unit and a registration unit. The storage unit
comprises of an alarm database in which alarm information that is
identification information for specifying an alarm. The existing invention also
describes that the determination information that indicates the content of a
determination made by an operator with respect to alarm information id
inputted to an own industrial plant monitoring device, and second
determination information that indicates the content of a determination made
by another operator with respect to alarm information inputted to another
industrial plant monitoring device are stored in association with each other.
Even though the existing invention describes a monitoring device, it did not
propose any encryption based data transferring methods. Moreover, it did
not provide any data analyzing method to analyse the identified data.
There are no inventions proposed in the existing system to securely transfer
data. Moreover, there are no inventions proposed to compute financial data analysis and transfer the data securely. Therefore, the present invention proposes an encryption based financial data analysis by using artificial intelligence.The present invention also proposes a key verification method to enhance data privacy.
OBJECTIVE OF THE INVENTION
The main objective of the present invention is to compute financial data
analysis and transfer the data securely.
Another main objective of the present invention is to encrypt the data using
artificial intelligence.
Still another objective of the present invention is to provide an artificial
intelligence based numeric computing module to execute financial data
analysis.
Yet another objective of the present invention is to provide a key transferring
medium to enhance data privacy.
Other objectives and advantages of the present disclosure will be more
apparent from the following description, which is not intended to limit the
scope of the present disclosure.
SUMMARY OF THE INVENTION
The following presents a simplified summary of the invention in order to
provide a basic understanding of some aspects of the invention. This
summary is not an extensive overview of the present invention. It is not
intended to identify the key/critical elements of the invention or to delineate
the scope of the invention. Its sole purpose is to present some concept of the
invention in a simplified form as a prelude to a more detailed description of
the invention presented later.
According to the main aspect of the present invention, the method for
cryptography based financial analytical tool comprises the steps of
registering relevant identification data of the data owner and plurality of
receivers on the cloud. The raw data by is fed to the user system by the data
owner for financial analysis and data encryption. The raw data is processed
by Al computing module by using the numeric computing module and
performing financial analysis to extract relevant data from the raw data. Said
processed data is encrypted by the Al computing module using the
encryption module and a key is generated for the encrypted data. The
generated key is further transferred to the data owner.
According to another aspect, the encrypted data is transmitted to the cloud
by the user system whereby the received data is stored in the database. The
data in the cloud is requested by the receiver using the receiver system and the request is acknowledged by the cloud whereas data owner is notified wirelessly. The requester is identified by the data owner and the generated key is transferred to the requested receiver through mobile devices. The received key is entered by the receiver in the cloud through the receiver system and the generated key is verified by cloud. The encrypted data is transferred to receiver system and the data is decrypted by using the generated key. The numeric computing module extract data by sales funnel analyzing module, ratio analyzing module and average analyzing module.
The identification data are preferably username, passwords and contact
details.
BRIEF DECRIPTION OF THE DRAWINGS
The above and other aspects, features and advantages of a certain
exemplary embodiment of the present invention will be more apparent from
the following description taken in conjunction with the accompanying
drawings in which:
Figure 1 depicts the process of cryptography based financial analytical tool
according to the main aspect of the present invention.
Figure 2 depicts the block diagram representation of financial analytical tool
in accordance with the present invention.
Figure 3 depicts the flow chart process representation of financial analytical
tool in accordance with another main aspect of the present invention.
Person who is skilled in the art will appreciate that elements in the figures are
illustrated for simplicity and clarity and may have not been drawn to scale.
For example, the dimensions of some of the elements in the figure may be
exaggerated relative to other elements to help to improve understanding of
various exemplary embodiments of the present disclosure. Throughout the
drawings, it should be noted that like reference numbers are used to depict
the same or similar elements, features and structures.
DETAILED DESCRIPTION OF THE DRAWINGS
The terms and words used in the following description and claims are not
limited to the bibliographical meanings, but are merely used by the inventor
to enable a clear and consistent understanding of the invention. Accordingly,
it should be apparent to those skilled in the art that the following description
of exemplary embodiments of the present invention are provided for
illustration purpose only and not for the purpose of limiting the invention as
defined by the appended claims and their equivalents.
Figure 1 describes the process of cryptography based financial analytical
tool (1) according to the main aspect of the present invention. The diagram
represents a data owner (1) whose intention is to upload raw data (11) to user system (21). The diagram also represents a user device (12) preferably a communication device used by the data owner (1). According to the main aspect of the present invention, said user system (21) comprises an Artificial
Intelligence computing module (22). Said user system (21) is wirelessly
connected to the cloud (31). Said data owner (1) uploads the raw data(11) to
the user system (21) wherein the raw data (11) is processed by said
computing module (22)
Typically said cloud (31) is interactively connected to the plurality of receiver
system (42) used by plurality of receivers (41). Said plurality of receiver (41)
receives the processed data through the receiver system (42). Moreover,
said receiver (41) also comprises of plurality of receiver device (43). In
another aspect, said user device (12) is wirelessly connected to the plurality
of receiver device (43).
Figure 2 describes the block diagram representation of financial analytical
tool (1) in accordance with the present invention. The block diagram
represents a data owner (1) uploading heretofore said raw data (11) to the
user system (21). According to the main aspect of the present invention, the
user system (21) comprises of Al computing module (22), said computing
module (22) comprises of numeric computing module (23) and encryption
module (27.) Said numeric computing module (23) and encryption module
(27) are interactively connected each other.
Referring the block diagram in more specific, said numeric computing
module (23) comprises of sales funnel analyzing module (24), ratio analyzing
module (25) and average analyzing module (26). Said sales funnel analyzing
module (24), ratio analyzing module (25) and average analyzing module (26)
are interactively connected to each other. During encryption, the encryption
module (27) generates a key (28) whereas said generated key (28) is
transferred to the data owner (1).
Typically, the user system (21) is wirelessly connected to the cloud (31). Said
cloud (31) comprises of a storage medium preferably a database (32) for
storing data. Said cloud (31) is wirelessly connected to a receiver system
(42) whereby the receiver (41) may able to view the data through the
receiver system (42). Said receiver (41) also comprises of a wireless
communication device preferably a receiver device (43). Furthermore, said
data owner (1) transfers the generated key (28) to the receiver (41) through
the device (12, 43).
Figure 3 describes the flow chart process representation of financial
analytical tool (1) in accordance with another main aspect of the present
invention. Initially, the data owner (1) and plurality of receivers (42) initially
registers relevant identification data on the cloud (31). Identification data
such as Username, passwords and contact details are of the users (1, 42) are registered. The data owner (1) feeds the raw data (11) to the user system (21) for financial analysis and data encryption before uploading it to the cloud (31). The Al computing module (22) process the raw data (11) using the numeric computing module (23) and perform financial analysis.
The sales funnel analysing module (24), ratio analyzing module (25) and
average analyzing module (26) process the raw data and extract relevant
useful data. Furthermore, the Al computing module (22) encrypts the
processed data using the encryption module (27) and generates a key (28)
for the encrypted data which is further transferred to the data owner (1). The
user system (21) transmitting the encrypted data to the cloud (31) whereby
the received data is stored in the database (32).
The receiver (41) request for data in the cloud (31) using the receiver system
(42) from a remote location whereas the cloud (31) acknowledges the
request and notifies the data owner (1) wirelessly. The data owner (1)
identifies the requester and transfers the generated key to the requested
receiver (41) through mobile devices (12, 43). The receiver (41) enters the
received key in the cloud (31) through the receiver system (42) and the
generated key (28) is further verified by cloud (31). If the key (28) is verified,
the encrypted data is transferred to receiver system (42) and further
decrypted by using the generated key (28).

Claims (3)

I CLAIM:
1. The method for cryptography based financial analytical tool comprises the
steps of:
- registering relevant identification data of the data owner (1) and
plurality of receivers (42) on the cloud (31);
- feeding raw data (11) by the data owner (1) to the user system (21) for
financial analysis and data encryption;
- processing the raw data (11) by Al computing module (22) by using
the numeric computing module (23) and performing financial analysis
to extract relevant data from the raw data (11);
- encrypting the processed data by the Al computing module (22) using
the encryption module (27) and generating a key (28) for the
encrypted data;
- transferring the generated key (28) to the data owner (1);
- transmitting the encrypted data to the cloud (31) by the user system
(21) whereby the received data is stored in the database (32);
- requesting for data in the cloud (31) by the receiver (41) using the
receiver system (42) and acknowledging the request by the cloud (31)
thereby notifying the data owner (1) wirelessly;
- identifying the requester the data owner (1) and transferring the
generated key (28) to the requested receiver (41) through mobile
devices (12,43);
- entering the received key by the receiver (41) in the cloud (31)
through the receiver system (42) and verifying the generated key (28)
by cloud (31);
- transferring the encrypted data to receiver system (42) and decrypting
the data by using the generated key (28);
2. The method as claimed in claim 1, characterized in that said numeric
computing module (23) extract data by sales funnel analysing module
(24), ratio analysing module (25) and average analysing module (26).
3. The method as claimed in claim 1, characterized in that said
Identification data are username, passwords and contact details.
Dr. Basil John Thomas Applicant
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 1 of 3 09 Jul 2021 2021104023
Dr. Basil John Thomas
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 2 of 3 09 Jul 2021 2021104023
Dr. Basil John Thomas
Applicants Name: Dr. Basil John Thomas, Er. Nisha Joseph Total Pages: 03 Page 3 of 3 09 Jul 2021 2021104023
Dr. Basil John Thomas
AU2021104023A 2020-08-14 2021-07-09 Cryptography based financial analytical tool through artificial intelligence Ceased AU2021104023A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202041034982 2020-08-14
IN202041034982 2020-08-14

Publications (1)

Publication Number Publication Date
AU2021104023A4 true AU2021104023A4 (en) 2022-05-05

Family

ID=80247771

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021104023A Ceased AU2021104023A4 (en) 2020-08-14 2021-07-09 Cryptography based financial analytical tool through artificial intelligence

Country Status (2)

Country Link
AU (1) AU2021104023A4 (en)
WO (1) WO2022034394A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9172718B2 (en) * 2013-09-25 2015-10-27 International Business Machines Corporation Endpoint load rebalancing controller
WO2017024340A1 (en) * 2015-08-13 2017-02-16 Cronus Consulting Group Pty Ltd System for financial information reporting
WO2017030517A1 (en) * 2015-08-18 2017-02-23 Idea Teknoloji Cozumleri Bilgisayar Sanayi Ve Ticaret Anonim Sirketi Safe e-document synchronisation, analysis and management system
US10237070B2 (en) * 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US11868995B2 (en) * 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
CN111210331A (en) * 2020-01-04 2020-05-29 链农(深圳)信息科技有限公司 Agricultural supply chain financial service platform based on block chain

Also Published As

Publication number Publication date
WO2022034394A1 (en) 2022-02-17

Similar Documents

Publication Publication Date Title
US11706029B2 (en) Secure and zero knowledge data sharing for cloud applications
US9432346B2 (en) Protocol for controlling access to encryption keys
US8527748B2 (en) System and method for hosting encrypted monitoring data
US11310038B2 (en) System and method for securing data communication between computers
US20150186635A1 (en) Granular Redaction of Resources
KR101809974B1 (en) A system for security certification generating authentication key combinating multi-user element and a method thereof
EP3741093B1 (en) System and method for privacy-preserving data retrieval for connected power tools
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
CN110677234B (en) Privacy protection method and system based on homomorphic encryption blockchain
CN117081815A (en) Method, device, computer equipment and storage medium for data security transmission
AU2021104023A4 (en) Cryptography based financial analytical tool through artificial intelligence
Wang et al. Data transmission and access protection of community medical internet of things
AU2021101470A4 (en) An artificial intelligence enabled cryptography based financial analytical tool
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element
KR20130085537A (en) System and method for accessing to encoded files
US9998433B2 (en) Method and apparatus for managing data, and data management system using the same
US11102187B2 (en) Systems and methods for managing workflow transactions including protected personal data in regulated computing environments
CN113032802A (en) Data security storage method and system
US20190014098A1 (en) Method and system for establishing and managing personal black box (pbb) in virtually-networked big-data (vnbd) environment
Lee et al. SSL Application for Managed Security between the Mobile and HIS Biometric Information Collection Client
CN116366371B (en) Session security assessment system based on computer
CN114172710B (en) Data decryption method, device, equipment and storage medium
CN117371048B (en) Remote access data processing method, device, equipment and storage medium
CN115422596B (en) Method for determining validity of data, financial and medical data by adopting privacy protection algorithm
Weber et al. How to Prevent Misuse of IoTAG?

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry