CN113254975A - Digital financial data sharing method - Google Patents

Digital financial data sharing method Download PDF

Info

Publication number
CN113254975A
CN113254975A CN202110658014.2A CN202110658014A CN113254975A CN 113254975 A CN113254975 A CN 113254975A CN 202110658014 A CN202110658014 A CN 202110658014A CN 113254975 A CN113254975 A CN 113254975A
Authority
CN
China
Prior art keywords
data
length
character string
characters
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110658014.2A
Other languages
Chinese (zh)
Other versions
CN113254975B (en
Inventor
唐迎旭
宋志明
戚惠敏
严彪
杨成林
程玉
王子航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Sanxiang Bank Co Ltd
Original Assignee
Hunan Sanxiang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Sanxiang Bank Co Ltd filed Critical Hunan Sanxiang Bank Co Ltd
Priority to CN202110658014.2A priority Critical patent/CN113254975B/en
Publication of CN113254975A publication Critical patent/CN113254975A/en
Application granted granted Critical
Publication of CN113254975B publication Critical patent/CN113254975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Abstract

The invention relates to a digital financial data sharing method, which comprises the following steps: acquiring data to be shared, wherein the data to be shared is digital financial data; the data sharing method comprises the steps of determining the security attribute of data to be shared, processing the data to be shared according to the security attribute to form a data character string, selecting a data channel according to the security degree of the data character string, wherein the data channel is used for sharing the data character string to a third-party terminal, determining the length of the character string added at the tail end of the data according to the security degree of the data to be transmitted through four security levels arranged in a central control unit, selecting a corresponding data channel according to the actual length of the character string to transmit the data, achieving data sharing, improving the security of data sharing, enabling the channel of data transmission to be matched based on the security degree of the data to be shared and the characteristics of the data channel, improving the specificity of data sharing, and further improving the security of data transmission.

Description

Digital financial data sharing method
Technical Field
The invention relates to the technical field of information transmission, in particular to a digital financial data sharing method.
Background
Digital finance refers to a new generation of financial services combined with the traditional financial service state through the internet and information technology means. The digital finance comprises financial services such as internet payment, mobile payment, online banking, financial service outsourcing and online loan, online insurance, online fund and the like.
In the financial service process, corresponding digital financial data can be generated, the data can be data such as payment time, payment amount, loan time, insurance application amount, fund type, fund purchase amount and fund purchase time, the essence of digital finance is transaction, the information of the transaction is usually limited to two transaction parties, the transaction information cannot be shared due to factors such as confidentiality, but the transaction information is very important in the financial data, and plays a role in guiding the decision of other people to promote the transaction and terminate the transaction.
However, the prior art has insufficient utilization of financial data due to the limitation of data disclosure.
Disclosure of Invention
Therefore, the invention provides a digital financial data sharing method which can solve the problems of insufficient data disclosure and insufficient financial data utilization.
In order to achieve the above object, the present invention provides a method for sharing digital financial data, comprising:
acquiring data to be shared, wherein the data to be shared is digital financial data;
determining the security attribute of the data to be shared, and processing the data to be shared to form a data character string according to the security attribute, wherein the security attribute comprises whether the data is easy to be tampered, whether the data is complete and whether the data is legal;
selecting a data channel according to the safety degree of the data character string, wherein the data channel is used for sharing the data character string to a third-party terminal;
when the security attribute of the data to be shared is determined, a first security level, a second security level, a third security level and a fourth security level are arranged in the central control unit; if the security attribute of the data to be shared belongs to the first security level, converting the data to be shared into a character string, and adding a character string with a first length L1 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a second security level, converting the data to be shared into a character string, and adding a character string with a second length L2 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a third security level, converting the data to be shared into a character string, and adding a character string with a third length L3 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a fourth security level, converting the data to be shared into a character string, and adding a character string with a fourth length L4 at the tail end of the data to be shared;
the central control unit is internally provided with a standard length of a character string, if the length of the data character string is more than or equal to the standard length, the safety degree of the data character string is high, a common data channel is selected for transmission, the safety degree represents the probability of being intercepted in the transmission process, and the safety degree is based on the characteristics of data and the importance of the data character string;
and if the length of the data character string is less than the standard length, the safety degree of the data character string is not high, and an encrypted data channel is selected for transmission.
Further, when the length of the data character string is larger than or equal to the standard length, and a common data channel is adopted for transmission, the transmission speeds of the common data channel are different, a plurality of transmission grades are set according to the difference of the transmission speeds of the data channel, the transmission grade is selected according to the difference between the length of the data character string and the standard length, and if the difference between the length of the data character string and the standard length is large, the data channel with a high transmission grade is selected for transmission;
and if the difference value between the length of the data character string and the standard length is small, selecting a data channel with low transmission grade for transmission.
Further, when data processing is carried out on the data to be shared according to the security attributes to form data character strings, the priority of the data to be shared is determined, and the first length, the second length, the third length and the fourth length are corrected according to the determined priority;
if the data to be shared belongs to sensitive data, the priority of the data to be shared is high, and a first correction coefficient k1 is adopted to correct the first length, the second length, the third length and the fourth length;
if the data to be shared belongs to the non-sensitive data, the priority of the data to be shared is low, and the first length, the second length, the third length and the fourth length are corrected by adopting a second correction coefficient k 2;
when the first length, the second length, the third length and the fourth length are corrected by using the first correction coefficient k1, a corrected first correction length L1' = L1 × (1 + k 1);
a second corrected length L2' = L2 × (1 + k 1) obtained by correction;
the corrected third correction length L3' = L3 × (1 + k 1);
a fourth corrected length L4' = L4 × (1 + k 1) obtained by correction;
when the first length, the second length, the third length and the fourth length are corrected by using the second correction coefficient k2, a corrected first correction length L1 = L1 × (1 + k 2);
a second corrected length L2 = L2 × (1-k 2) obtained by correction;
a third corrected length L3 = L3 × (1-k 2) obtained by correction;
the fourth corrected length L4 = L4 × (1-k 2) obtained by correction.
Further, when the length of the data string is less than the standard length, an encrypted data channel is selected for transmission,
if the standard length is not more than 0.8 multiplied by the standard length, the length of the data character string is less than the standard length, the data to be transmitted is encrypted by adopting a first encryption algorithm and then transmitted;
if the standard length is less than or equal to 0.5 multiplied by the standard length, the length of the data character string is less than 0.8 multiplied by the standard length, the data to be transmitted is encrypted by adopting a second encryption algorithm and then transmitted;
and if the length of the data character string is less than 0.5 multiplied by the standard length, the data to be transmitted is encrypted by adopting a third encryption algorithm and then transmitted.
Further, when the length of the data character string is greater than or equal to the standard length, before the transmission is performed by using a common data channel, the method further includes:
and checking the data character string for duplication to determine redundant data in the data character string, deleting the redundant data, then determining the actual length of the data character string, and if the length of the character string after the data character string is deleted by the redundant data is still larger than or equal to the standard length, adopting a common data channel for transmission.
Further, the performing a duplicate check on the data string to determine redundant data in the data string includes: selecting any segment of characters in the data character string, taking any segment of characters as standard characters, comparing the characters in the data character string with the standard characters, if the data character string has the same field as the standard characters, indicating that redundant data exists in the data character string, and comparing after deleting the redundant data.
Further, the duplication checking of the data character string includes:
a character correlation matrix R (R1, R2, R3 and R4) is arranged in the central control unit, wherein R1 represents first correlation, R2 represents second correlation, R3 represents third correlation, R4 represents fourth correlation, and R1> R2> R3> R4; determining the relevance R of the character string after removing any character segment and the selected any character segment;
if the correlation degree R with any segment of characters is larger than or equal to the first correlation degree R1, the similarity between the currently selected any segment of characters and the data character string is large, and the number of times of duplicate checking is n 0;
if the first correlation degree R1> and the correlation degree R of any segment character are more than or equal to the second correlation degree R2, the similarity of the currently selected any segment character and the data character string is less, and the number of times of weight checking is 0.9 multiplied by n 0;
if the correlation degree R of the second correlation degree R2> and any segment character is larger than or equal to the third correlation degree R3, the similarity of the currently selected any segment character and the data character string is less, and the number of times of weight checking is 0.8 multiplied by n 0;
if the third correlation degree R3> is not less than the fourth correlation degree R4, the similarity between the currently selected arbitrary segment character and the data character string is less, and the number of times of weight check is 0.7 multiplied by n 0;
if the degree of correlation R with any segment of characters is less than the fourth degree of correlation R4, the data character string does not need to be checked for duplication.
Further, when determining whether the data character string contains the optional segment of characters, continuously selecting characters with the same length as the optional segment of characters from the first character in the data character string for comparison, continuously selecting n characters from the first character in the data character string if the optional segment of characters comprises n characters, comparing the n characters with the optional segment of characters, and if the coincidence rate of the n characters and the optional segment of characters is larger than or equal to 95%, marking as repeated data for deletion.
Further, when determining whether the data character string contains the optional segment of character, continuously selecting the character with the same length as the optional segment of character from the last character in the data character string for comparison, if the optional segment of character comprises n characters, continuously selecting n characters from the last character in the data character string, comparing the n characters with the optional segment of character, and if the coincidence rate of the n characters and the optional segment of character is more than or equal to 95%, marking as the repeated data for deletion.
Compared with the prior art, the data sharing method has the advantages that the four security levels are arranged in the central control unit, the length of the character string added at the tail end of the data is determined according to the security level of the data to be transmitted, the corresponding data channel is selected according to the actual length of the character string for data transmission, data sharing safety is improved while data sharing is achieved, the data transmission channel is matched based on the security degree of the data to be shared and the characteristics of the data channel, data sharing specificity is improved, and data transmission safety is improved.
Particularly, when the length of the data character string is greater than the standard length, the data to be transmitted is more, the transmission level of the transmission channel is selected according to the difference value between the length of the data character string and the standard length, so that the data transmission process is safer, the data transmission efficiency is improved, the data channel with high transmission level is adopted for large data volume by dividing the transmission level of the data channel, the data channel with low transmission level is adopted for low data volume, the transmission of large amount of financial data is realized, and the data transmission safety is improved.
Particularly, by setting the correction coefficient, the data with high sensitivity is corrected by adopting the first correction coefficient, and the data with low sensitivity is corrected by adopting the second correction coefficient, so that the length of the data with low sensitivity is properly reduced, the convenience of transmission is reduced, and the security of the data needs to be protected for the data with high sensitivity, and the transmission complexity of the data is improved by adopting a mode of increasing the data length, so that the effective transmission of different types of financial data is realized, and the security and the convenience of data transmission are improved.
Particularly, when the length of the data character string is smaller than the standard length, different encryption algorithms are adopted for encryption according to the length of the data character string, and then data transmission is carried out, so that the data transmission is safer, the data transmission is safer by setting a plurality of length levels and adopting different encryption algorithms for encryption, the fine processing of the data is realized, and the data transmission performance is improved.
Particularly, before determining the actual length of the data character string and selecting the data channel according to the corresponding length, the data character string needs to be checked for duplication to determine the actual length of the character string, so that the accuracy of selecting the data channel is improved, the data transmission is more accurate, and the data transmission efficiency is improved.
In particular, by deleting redundant characters in the character string, the data simplification degree is improved, the effectiveness of data transmission is improved, the transmission of invalid data is reduced, and the utilization efficiency of a data channel is improved.
Particularly, the number of times of duplicate checking of the character string data is determined according to the degree of correlation of the data, so that the duplicate data in the character string can be deleted more thoroughly, the transmission of the duplicate data is reduced, and the data transmission efficiency is improved.
In particular, for example, the coincidence rate is determined by setting the coincidence rate of n characters and any segment of characters, and the repeated data is deleted, so that the accuracy of actually transmitted data is improved, and the data transmission efficiency is improved.
Drawings
Fig. 1 is a schematic flow chart illustrating a digital financial data sharing method according to an embodiment of the present invention.
Detailed Description
In order that the objects and advantages of the invention will be more clearly understood, the invention is further described below with reference to examples; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only for explaining the technical principle of the present invention, and do not limit the scope of the present invention.
Referring to fig. 1, a method for sharing digital financial data according to an embodiment of the present invention includes:
step S100: acquiring data to be shared, wherein the data to be shared is digital financial data;
step S200: determining the security attribute of the data to be shared, and processing the data to be shared to form a data character string according to the security attribute, wherein the security attribute comprises whether the data is easy to be tampered, whether the data is complete and whether the data is legal;
step S300: selecting a data channel according to the safety degree of the data character string, wherein the data channel is used for sharing the data character string to a third-party terminal;
when the security attribute of the data to be shared is determined, a first security level, a second security level, a third security level and a fourth security level are arranged in the central control unit; if the security attribute of the data to be shared belongs to the first security level, converting the data to be shared into a character string, and adding a character string with a first length L1 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a second security level, converting the data to be shared into a character string, and adding a character string with a second length L2 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a third security level, converting the data to be shared into a character string, and adding a character string with a third length L3 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a fourth security level, converting the data to be shared into a character string, and adding a character string with a fourth length L4 at the tail end of the data to be shared;
the central control unit is internally provided with a standard length of a character string, if the length of the data character string is more than or equal to the standard length, the safety degree of the data character string is high, a common data channel is selected for transmission, the safety degree represents the probability of being intercepted in the transmission process, and the safety degree is based on the characteristics of data and the importance of the data character string;
and if the length of the data character string is less than the standard length, the safety degree of the data character string is not high, and an encrypted data channel is selected for transmission.
Specifically, according to the digital financial data sharing method provided by the embodiment of the present invention, the length of the added character string is determined according to the security attribute of the data to be shared, where the security attribute is whether the data is easy to be tampered, whether the data is complete, and whether the data is legal, and in the actual application process, the value can be assigned to the feature in the security attribute, for example, if the data is easy to be tampered, the value is assigned to 0, if the data is incomplete, the value is assigned to 1, if the data is complete, the value is assigned to 0, and if the data is invalid, the value is assigned to 1, so that the security attribute can be regarded as a value between 0 and 6, which represents different security attributes of the data.
When the security levels are divided, data with security attribute values of 0 and 1 can be used as a first security level, data with security attribute values of 2 and 3 can be used as a second security level, data with security attribute values of 4 and 5 can be used as a third security level, data with security attribute value of 6 can be used as a fourth security level, then character strings with different lengths are set according to the corresponding security levels, and then a corresponding transmission channel is selected according to the final length of the character strings.
Specifically, according to the digital financial data sharing method provided by the embodiment of the invention, the four security levels are arranged in the central control unit, the length of the character string added at the tail end of the data is determined according to the security level of the data to be transmitted, and the corresponding data channel is selected according to the actual length of the character string for data transmission, so that the data sharing security is improved while the data sharing is realized, the data transmission channel is matched based on the security degree of the data to be shared and the characteristics of the data channel, the data sharing specificity is improved, and the data transmission security is further improved.
Specifically, when the length of the data character string is larger than or equal to the standard length, and a common data channel is adopted for transmission, the transmission speeds of the common data channel are different, a plurality of transmission levels are set according to the difference of the transmission speeds of the data channel, the transmission level is selected according to the difference between the length of the data character string and the standard length, and if the difference between the length of the data character string and the standard length is large, the data channel with a high transmission level is selected for transmission;
and if the difference value between the length of the data character string and the standard length is small, selecting a data channel with low transmission grade for transmission.
Specifically, when the length of the data character string is greater than the standard length, the embodiment of the invention indicates that more data are to be transmitted, and at the moment, the transmission level of the transmission channel is selected according to the difference value between the length of the data character string and the standard length, so that the transmission process of a large amount of data is safer, the transmission efficiency of the data is improved, the transmission level of the data channel is divided, the data channel with a high transmission level is adopted for a large amount of data, the data channel with a low transmission level is adopted for a low amount of data, the transmission of a large amount of financial data is realized, and the security of data transmission is improved.
Specifically, when data processing is carried out on data to be shared according to the security attributes to form data character strings, the priority of the data to be shared is determined, and the first length, the second length, the third length and the fourth length are corrected according to the determined priority;
if the data to be shared belongs to sensitive data, the priority of the data to be shared is high, and a first correction coefficient k1 is adopted to correct the first length, the second length, the third length and the fourth length;
if the data to be shared belongs to the non-sensitive data, the priority of the data to be shared is low, and the first length, the second length, the third length and the fourth length are corrected by adopting a second correction coefficient k 2;
when the first length, the second length, the third length and the fourth length are corrected by using the first correction coefficient k1, a corrected first correction length L1' = L1 × (1 + k 1);
a second corrected length L2' = L2 × (1 + k 1) obtained by correction;
the corrected third correction length L3' = L3 × (1 + k 1);
a fourth corrected length L4' = L4 × (1 + k 1) obtained by correction;
when the first length, the second length, the third length and the fourth length are corrected by using the second correction coefficient k2, a corrected first correction length L1 = L1 × (1 + k 2);
a second corrected length L2 = L2 × (1-k 2) obtained by correction;
a third corrected length L3 = L3 × (1-k 2) obtained by correction;
the fourth corrected length L4 = L4 × (1-k 2) obtained by correction.
Specifically, according to the embodiment of the invention, by setting the correction coefficient, the data with high sensitivity is corrected by adopting the first correction coefficient, and the data with low sensitivity is corrected by adopting the second correction coefficient, so that the length of the data with low sensitivity is properly reduced, the convenience of transmission is reduced, while the security of the data needs to be protected for the data with high sensitivity, and the way of increasing the length of the data is adopted, so that the transmission complexity of the data is improved, the effective transmission of different types of financial data is realized, and the security and the convenience of data transmission are improved.
In particular, when the length of the data string is < the standard length, an encrypted data channel is selected for transmission,
if the standard length is not more than 0.8 multiplied by the standard length, the length of the data character string is less than the standard length, the data to be transmitted is encrypted by adopting a first encryption algorithm and then transmitted;
if the standard length is less than or equal to 0.5 multiplied by the standard length, the length of the data character string is less than 0.8 multiplied by the standard length, the data to be transmitted is encrypted by adopting a second encryption algorithm and then transmitted;
and if the length of the data character string is less than 0.5 multiplied by the standard length, the data to be transmitted is encrypted by adopting a third encryption algorithm and then transmitted.
Specifically, when the length of the data character string is smaller than the standard length, different encryption algorithms are adopted for encryption according to the length of the data character string, and then data transmission is performed, so that the data transmission is safer, the data transmission is safer by setting a plurality of length levels and adopting different encryption algorithms for encryption, the data refinement processing is realized, and the data transmission performance is improved.
Specifically, when the length of the data string is greater than or equal to the standard length, before the transmission is performed by using a common data channel, the method further includes:
and checking the data character string for duplication to determine redundant data in the data character string, deleting the redundant data, then determining the actual length of the data character string, and if the length of the character string after the data character string is deleted by the redundant data is still larger than or equal to the standard length, adopting a common data channel for transmission.
Specifically, in the embodiment of the present invention, before determining the actual length of the data string and selecting the data channel according to the corresponding length, the data string needs to be checked for duplication to determine the actual length of the data string, so as to improve the accuracy of selecting the data channel, make the data transmission more accurate, and improve the data transmission efficiency.
Specifically, the performing a duplicate check on the data string to determine redundant data in the data string includes: selecting any segment of characters in the data character string, taking any segment of characters as standard characters, comparing the characters in the data character string with the standard characters, if the data character string has the same field as the standard characters, indicating that redundant data exists in the data character string, and comparing after deleting the redundant data.
Specifically, the embodiment of the invention deletes the redundant characters in the character string, thereby improving the data simplification degree, improving the effectiveness of data transmission, reducing the transmission of invalid data and improving the utilization efficiency of a data channel.
Specifically, the performing duplicate checking on the data character string includes:
a character correlation matrix R (R1, R2, R3 and R4) is arranged in the central control unit, wherein R1 represents first correlation, R2 represents second correlation, R3 represents third correlation, R4 represents fourth correlation, and R1> R2> R3> R4; determining the relevance R of the character string after removing any character segment and the selected any character segment;
if the correlation degree R with any segment of characters is larger than or equal to the first correlation degree R1, the similarity between the currently selected any segment of characters and the data character string is large, and the number of times of duplicate checking is n 0;
if the first correlation degree R1> and the correlation degree R of any segment character are more than or equal to the second correlation degree R2, the similarity of the currently selected any segment character and the data character string is less, and the number of times of weight checking is 0.9 multiplied by n 0;
if the correlation degree R of the second correlation degree R2> and any segment character is larger than or equal to the third correlation degree R3, the similarity of the currently selected any segment character and the data character string is less, and the number of times of weight checking is 0.8 multiplied by n 0;
if the third correlation degree R3> is not less than the fourth correlation degree R4, the similarity between the currently selected arbitrary segment character and the data character string is less, and the number of times of weight check is 0.7 multiplied by n 0;
if the degree of correlation R with any segment of characters is less than the fourth degree of correlation R4, the data character string does not need to be checked for duplication.
Specifically, the number of times of duplicate checking of the character string data is determined according to the degree of correlation of the data, so that the duplicate data in the character string can be deleted more thoroughly, the transmission of the duplicate data is reduced, and the efficiency of data transmission is improved.
Specifically, when determining whether the data character string contains the optional segment character, continuously selecting and comparing characters with the same length as the optional segment character from the first character in the data character string, continuously selecting n characters from the first character in the data character string if the optional segment character comprises n characters, comparing the n characters with the optional segment character, and if the overlapping rate of the n characters and the optional segment character is larger than or equal to 95%, marking as the repeated data and deleting.
Specifically, the embodiment of the invention determines the coincidence rate by setting the coincidence rate of n characters and any segment of characters, and deletes repeated data, thereby improving the accuracy of actually transmitted data and improving the data transmission efficiency.
Specifically, when determining whether the data character string includes the optional segment character, continuously selecting and comparing characters with the same length as the optional segment character from the last character in the data character string, continuously selecting n characters from the last character in the data character string if the optional segment character includes n characters, comparing the n characters with the optional segment character, and if the overlapping rate of the n characters and the optional segment character is larger than or equal to 95%, marking as the repeated data and deleting.
Specifically, the embodiment of the invention starts by setting n characters and the last character in any segment of characters, selects n characters to compare with any segment of characters, determines the coincidence rate, and deletes repeated data, thereby improving the accuracy of actually transmitted data and improving the data transmission efficiency.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention; various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A method for sharing digital financial data, comprising:
acquiring data to be shared, wherein the data to be shared is digital financial data;
determining the security attribute of the data to be shared, and processing the data to be shared to form a data character string according to the security attribute, wherein the security attribute comprises whether the data is easy to be tampered, whether the data is complete and whether the data is legal;
selecting a data channel according to the safety degree of the data character string, wherein the data channel is used for sharing the data character string to a third-party terminal;
when the security attribute of the data to be shared is determined, a first security level, a second security level, a third security level and a fourth security level are arranged in the central control unit; if the security attribute of the data to be shared belongs to the first security level, converting the data to be shared into a character string, and adding a character string with a first length L1 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a second security level, converting the data to be shared into a character string, and adding a character string with a second length L2 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a third security level, converting the data to be shared into a character string, and adding a character string with a third length L3 at the tail end of the data to be shared;
if the security attribute of the data to be shared belongs to a fourth security level, converting the data to be shared into a character string, and adding a character string with a fourth length L4 at the tail end of the data to be shared;
the central control unit is internally provided with a standard length of a character string, if the length of the data character string is more than or equal to the standard length, the safety degree of the data character string is high, a common data channel is selected for transmission, the safety degree represents the probability of being intercepted in the transmission process, and the safety degree is based on the characteristics of data and the importance of the data character string;
and if the length of the data character string is less than the standard length, the safety degree of the data character string is not high, and an encrypted data channel is selected for transmission.
2. The method of sharing digital financial data according to claim 1,
when the length of the data character string is larger than or equal to the standard length, and the data character string is transmitted by adopting a common data channel, the transmission speed of the common data channel is different, a plurality of transmission grades are set according to the difference of the transmission speed of the data channel, the transmission grade is selected according to the difference of the length of the data character string and the standard length, and if the difference of the length of the data character string and the standard length is large, the data channel with a high transmission grade is selected for transmission;
and if the difference value between the length of the data character string and the standard length is small, selecting a data channel with low transmission grade for transmission.
3. The method of claim 2, wherein the step of sharing the digital financial data includes the step of,
when data processing is carried out on data to be shared according to the security attributes to form data character strings, the priority of the data to be shared is determined, and the first length, the second length, the third length and the fourth length are corrected according to the determined priority;
if the data to be shared belongs to sensitive data, the priority of the data to be shared is high, and a first correction coefficient k1 is adopted to correct the first length, the second length, the third length and the fourth length;
if the data to be shared belongs to the non-sensitive data, the priority of the data to be shared is low, and the first length, the second length, the third length and the fourth length are corrected by adopting a second correction coefficient k 2;
when the first length, the second length, the third length and the fourth length are corrected by using the first correction coefficient k1, a corrected first correction length L1' = L1 × (1 + k 1);
a second corrected length L2' = L2 × (1 + k 1) obtained by correction;
the corrected third correction length L3' = L3 × (1 + k 1);
a fourth corrected length L4' = L4 × (1 + k 1) obtained by correction;
when the first length, the second length, the third length and the fourth length are corrected by using the second correction coefficient k2, a corrected first correction length L1 = L1 × (1 + k 2);
a second corrected length L2 = L2 × (1-k 2) obtained by correction;
a third corrected length L3 = L3 × (1-k 2) obtained by correction;
the fourth corrected length L4 = L4 × (1-k 2) obtained by correction.
4. The method of claim 3, wherein the step of sharing the digital financial data includes the step of,
when the length of the data string is less than the standard length, an encrypted data channel is selected for transmission,
if the standard length is not more than 0.8 multiplied by the standard length, the length of the data character string is less than the standard length, the data to be transmitted is encrypted by adopting a first encryption algorithm and then transmitted;
if the standard length is less than or equal to 0.5 multiplied by the standard length, the length of the data character string is less than 0.8 multiplied by the standard length, the data to be transmitted is encrypted by adopting a second encryption algorithm and then transmitted;
and if the length of the data character string is less than 0.5 multiplied by the standard length, the data to be transmitted is encrypted by adopting a third encryption algorithm and then transmitted.
5. The method of sharing digital financial data according to claim 1,
when the length of the data character string is larger than or equal to the standard length, before the transmission is carried out by adopting a common data channel, the method further comprises the following steps:
and checking the data character string for duplication to determine redundant data in the data character string, deleting the redundant data, then determining the actual length of the data character string, and if the length of the character string after the data character string is deleted by the redundant data is still larger than or equal to the standard length, adopting a common data channel for transmission.
6. The method of sharing digital financial data according to claim 5,
performing a duplicate check on a data string to determine redundant data in the data string comprises: selecting any segment of characters in the data character string, taking any segment of characters as standard characters, comparing the characters in the data character string with the standard characters, if the data character string has the same field as the standard characters, indicating that redundant data exists in the data character string, and comparing after deleting the redundant data.
7. The method of sharing digital financial data according to claim 6,
the duplication checking of the data character string comprises the following steps:
a character correlation matrix R (R1, R2, R3 and R4) is arranged in the central control unit, wherein R1 represents first correlation, R2 represents second correlation, R3 represents third correlation, R4 represents fourth correlation, and R1> R2> R3> R4; determining the relevance R of the character string after removing any character segment and the selected any character segment;
if the correlation degree R with any segment of characters is larger than or equal to the first correlation degree R1, the similarity between the currently selected any segment of characters and the data character string is large, and the number of times of duplicate checking is n 0;
if the first correlation degree R1> and the correlation degree R of any segment character are more than or equal to the second correlation degree R2, the similarity of the currently selected any segment character and the data character string is less, and the number of times of weight checking is 0.9 multiplied by n 0;
if the correlation degree R of the second correlation degree R2> and any segment character is larger than or equal to the third correlation degree R3, the similarity of the currently selected any segment character and the data character string is less, and the number of times of weight checking is 0.8 multiplied by n 0;
if the third correlation degree R3> is not less than the fourth correlation degree R4, the similarity between the currently selected arbitrary segment character and the data character string is less, and the number of times of weight check is 0.7 multiplied by n 0;
if the degree of correlation R with any segment of characters is less than the fourth degree of correlation R4, the data character string does not need to be checked for duplication.
8. The method of sharing digital financial data according to claim 7,
when determining whether the data character string contains the optional segment of characters, continuously selecting characters with the same length as the optional segment of characters from the first character in the data character string for comparison, continuously selecting n characters from the first character in the data character string if the optional segment of characters comprises n characters, comparing the n characters with the optional segment of characters, and if the coincidence rate of the n characters and the optional segment of characters is more than or equal to 95%, marking as repeated data for deletion.
9. The method of sharing digital financial data according to claim 7,
and when determining whether the data character string contains the optional segment of characters, continuously selecting characters with the same length as the optional segment of characters from the last character in the data character string for comparison, continuously selecting n characters from the last character in the data character string if the optional segment of characters comprises n characters, comparing the n characters with the optional segment of characters, and if the coincidence rate of the n characters and the optional segment of characters is more than or equal to 95%, marking as repeated data for deletion.
CN202110658014.2A 2021-06-15 2021-06-15 Digital financial data sharing method Active CN113254975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110658014.2A CN113254975B (en) 2021-06-15 2021-06-15 Digital financial data sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110658014.2A CN113254975B (en) 2021-06-15 2021-06-15 Digital financial data sharing method

Publications (2)

Publication Number Publication Date
CN113254975A true CN113254975A (en) 2021-08-13
CN113254975B CN113254975B (en) 2021-09-28

Family

ID=77188059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110658014.2A Active CN113254975B (en) 2021-06-15 2021-06-15 Digital financial data sharing method

Country Status (1)

Country Link
CN (1) CN113254975B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6751736B1 (en) * 2000-03-14 2004-06-15 International Business Machines Corporation Method and apparatus for E-commerce by using optional fields for virtual bar codes
US20110035602A1 (en) * 2009-08-06 2011-02-10 Phison Electronics Corp. Data scrambling, descrambling, and data processing method, and controller and storage system using the same
CN103716166A (en) * 2013-12-27 2014-04-09 哈尔滨工业大学深圳研究生院 Self-adaptation hybrid encryption method and device and encryption communication system
CN105162776A (en) * 2015-08-11 2015-12-16 重庆大学 SCPS-SP multi-security level and anti-replay function design method
CN109558707A (en) * 2018-11-16 2019-04-02 北京梆梆安全科技有限公司 A kind of detection method and device, the mobile device of encryption function security level
CN110489622A (en) * 2019-07-10 2019-11-22 平安科技(深圳)有限公司 Sharing method, device, computer equipment and the storage medium of object information
CN110663217A (en) * 2017-05-18 2020-01-07 Id量子技术公司 Configurable traffic packet engine using frame attributes
CN111143857A (en) * 2019-12-27 2020-05-12 深圳前海达闼云端智能科技有限公司 Data sharing method, robot controller and storage medium
CN111211887A (en) * 2019-12-23 2020-05-29 中移(杭州)信息技术有限公司 Resource encryption method, system, device and computer readable storage medium
CN111211888A (en) * 2019-12-23 2020-05-29 新奇点企业管理集团有限公司 Data sending method, data receiving method, sending end and receiving end
US20200389297A1 (en) * 2019-06-10 2020-12-10 International Business Machines Corporation Adaptive encryption for entity resolution
CN112187774A (en) * 2020-09-23 2021-01-05 东南大学 Encrypted data length reduction method based on HTTP/2 transmission characteristics
CN112199699A (en) * 2020-10-11 2021-01-08 国铁吉讯科技有限公司 Character string encryption and decryption method and device, storage medium and processor
CN112559257A (en) * 2021-02-19 2021-03-26 深圳市中科鼎创科技股份有限公司 Data storage method based on data screening

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6751736B1 (en) * 2000-03-14 2004-06-15 International Business Machines Corporation Method and apparatus for E-commerce by using optional fields for virtual bar codes
US20110035602A1 (en) * 2009-08-06 2011-02-10 Phison Electronics Corp. Data scrambling, descrambling, and data processing method, and controller and storage system using the same
CN103716166A (en) * 2013-12-27 2014-04-09 哈尔滨工业大学深圳研究生院 Self-adaptation hybrid encryption method and device and encryption communication system
CN105162776A (en) * 2015-08-11 2015-12-16 重庆大学 SCPS-SP multi-security level and anti-replay function design method
CN110663217A (en) * 2017-05-18 2020-01-07 Id量子技术公司 Configurable traffic packet engine using frame attributes
CN109558707A (en) * 2018-11-16 2019-04-02 北京梆梆安全科技有限公司 A kind of detection method and device, the mobile device of encryption function security level
US20200389297A1 (en) * 2019-06-10 2020-12-10 International Business Machines Corporation Adaptive encryption for entity resolution
CN110489622A (en) * 2019-07-10 2019-11-22 平安科技(深圳)有限公司 Sharing method, device, computer equipment and the storage medium of object information
CN111211887A (en) * 2019-12-23 2020-05-29 中移(杭州)信息技术有限公司 Resource encryption method, system, device and computer readable storage medium
CN111211888A (en) * 2019-12-23 2020-05-29 新奇点企业管理集团有限公司 Data sending method, data receiving method, sending end and receiving end
CN111143857A (en) * 2019-12-27 2020-05-12 深圳前海达闼云端智能科技有限公司 Data sharing method, robot controller and storage medium
CN112187774A (en) * 2020-09-23 2021-01-05 东南大学 Encrypted data length reduction method based on HTTP/2 transmission characteristics
CN112199699A (en) * 2020-10-11 2021-01-08 国铁吉讯科技有限公司 Character string encryption and decryption method and device, storage medium and processor
CN112559257A (en) * 2021-02-19 2021-03-26 深圳市中科鼎创科技股份有限公司 Data storage method based on data screening

Also Published As

Publication number Publication date
CN113254975B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
WO2020134657A1 (en) System log desensitization method, desensitization system, computer device, and storage medium
CN107368259A (en) A kind of method and apparatus that business datum is write in the catenary system to block
US11316874B2 (en) Fraud detection using graph databases
EP3756130B1 (en) Image hidden information detector
WO2016138606A1 (en) Secure account management using tokens
US10728036B2 (en) Cryptographically linking related events processed across multiple processing systems
US20210377274A1 (en) Distributed ledger data verification network
US11449491B2 (en) Preventing a transmission of an incorrect copy of a record of data to a distributed ledger system
CN113254975B (en) Digital financial data sharing method
EP3631669B1 (en) Expression evaluation of database statements for restricted data
CN111274571B (en) Iris template protection method and system combining local sequencing and negative database
CN113065151A (en) Relational database information security enhancement method, system, terminal and storage medium
CN110766091B (en) Method and system for identifying trepanning loan group partner
CN112910923A (en) Intelligent financial big data processing system
CN113761576A (en) Privacy protection method and device, storage medium and electronic equipment
CN111177362A (en) Information processing method, device, server and medium
CN110781511A (en) Transaction information storage method and device, computer equipment and storage medium
CN115580841B (en) Method for reducing short message sending delay
CN117459323B (en) Threat modeling method and device for intelligent evolution Internet of things equipment
CN114553811B (en) High-capacity behavior steganography method based on timestamp modulation and carrier selection
US20240119178A1 (en) Anonymizing personal information for use in assessing fraud risk
CN113627938A (en) Data deleting method, device, equipment and storage medium of block chain
Wang et al. Anomaly Analysis of Blockchain-based Decentralized Applications of Transportation
KR20220040186A (en) System and Method for detecting money fraud based on volume of Internet address search
CN116644462A (en) Data desensitization method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant