CN114491610B - Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key - Google Patents

Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key Download PDF

Info

Publication number
CN114491610B
CN114491610B CN202210339607.7A CN202210339607A CN114491610B CN 114491610 B CN114491610 B CN 114491610B CN 202210339607 A CN202210339607 A CN 202210339607A CN 114491610 B CN114491610 B CN 114491610B
Authority
CN
China
Prior art keywords
value
hash
data
financial data
financial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210339607.7A
Other languages
Chinese (zh)
Other versions
CN114491610A (en
Inventor
蓝飞
金翔
刘明辉
杨仁标
柴小康
戴黎
沈华强
孙泉辉
王海庆
翁凌略
徐文迪
黄建英
张冰野
郁静
蒋嘉明
龙瓯燕
聂海涛
朱海军
包江雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN202210339607.7A priority Critical patent/CN114491610B/en
Publication of CN114491610A publication Critical patent/CN114491610A/en
Application granted granted Critical
Publication of CN114491610B publication Critical patent/CN114491610B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N10/00Quantum computing, i.e. information processing based on quantum-mechanical phenomena
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Abstract

The invention provides a smart sharing financial platform and a system based on a Hash encryption algorithm and a quantum key, comprising: the method comprises the steps that a middle station receives first financial data sent by a data sending terminal, and a corresponding first Hash encryption algorithm is selected according to type information of the first financial data to calculate the first financial data to obtain a first Hash value; the middle station receives a quantum encryption public key sent by the quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and calculates the second financial data according to a second hash encryption algorithm to obtain a second hash value; the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value; and the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, and sends the hash table and the second financial data to a data receiving end.

Description

Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key
Technical Field
The invention relates to the technical field of fusion encryption, in particular to an intelligent sharing financial platform based on a Hash encryption algorithm and a quantum key.
Background
Financial data is of vital importance to a company, who typically processes the financial data in a confidential manner. However, in the actual production and operation activities of a company, it is necessary to frequently transmit and retrieve a certain type of financial data, and the retrieved financial data is transmitted between networks or terminals, and in the process, the financial data is easily stolen by others.
The quantum encryption technology is a series of encryption technologies such as key generation, plaintext obfuscation encryption, ciphertext restoration decryption, ciphertext communication, anti-eavesdropping and the like by using a quantum principle. Generally, a quantum encryption key is generated by a quantum server and is sent to a terminal needing to be encrypted, and the encrypted terminal encrypts data to be encrypted according to the quantum key.
Financial data is generally larger, and a lot of numerical values exist in the financial data, if one numerical value is wrong, the whole financial data is wrong, and the subsequent production and operation activities are affected by workers, so that a method capable of guaranteeing the safety of the financial data and guaranteeing the accuracy of information is urgently needed.
Disclosure of Invention
The embodiment of the invention provides a smart sharing financial platform and a system based on a Hash encryption algorithm and a quantum key, which can effectively ensure and verify the safety and the integrity of financial data by combining the Hash encryption algorithm and the quantum key when the financial data are transmitted between different terminals, ensure that the transmitted financial data are safely transmitted and ensure the information accuracy of the financial data.
In a first aspect of the embodiments of the present invention, a smart sharing financial platform based on a hash encryption algorithm and a quantum key is provided, including a central station and a quantum server connected to the central station, and implementing shared transmission of financial information between a data sending terminal and a data receiving terminal based on the smart sharing financial platform by the following steps, including:
the method comprises the steps that a middle station receives first financial data sent by a data sending terminal, and a corresponding first Hash encryption algorithm is selected according to type information of the first financial data to calculate the first financial data to obtain a first Hash value;
the middle station receives a quantum encryption public key sent by a quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and selects a corresponding second Hash encryption algorithm according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value;
the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value;
the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, the hash table and the second financial data are sent to a data receiving end, the middle station sends a key instruction to the quantum server, and the quantum server sends a quantum encryption private key corresponding to the quantum encryption public key to the data receiving end based on the key instruction.
Optionally, in a possible implementation manner of the first aspect, in the step of receiving, by the central station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the first financial data is converted into character type information, selecting a first Hash encryption algorithm of a first type, wherein the first Hash encryption algorithm of the first type is
Figure 284559DEST_PATH_IMAGE001
The algorithm,
Figure 186787DEST_PATH_IMAGE002
An algorithm and
Figure 575043DEST_PATH_IMAGE003
any one of the algorithms;
and converting the first financial data into a text string, and calculating the text string according to the first Hash encryption algorithm of the first type to obtain a first Hash value.
Optionally, in a possible implementation manner of the first aspect, in the step of converting the first financial data into a text string and calculating the text string according to the first type of first hash encryption algorithm to obtain the first hash value, the method specifically includes:
randomly selecting a plurality of character tables with target quantity in the first financial data, respectively adding a first label to the selected plurality of character tables, and sequencing to obtain a first sequencing result, wherein each character table has a corresponding financial value;
respectively adding a first label to the plurality of character tables, sequencing the character tables to obtain an event of a first sequencing result, recording the event and generating first monitoring information;
after the plurality of character tables are sorted according to a first sorting result, the character string formed by the plurality of character tables is subjected to calculation of a first type of first Hash encryption algorithm to obtain a first Hash value, and the first monitoring information and the first Hash value are bound.
Optionally, in a possible implementation manner of the first aspect, in the step of receiving, by the central station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the type information is image type information, selecting a first Hash encryption algorithm of a second type, wherein the first Hash encryption algorithm of the first type is
Figure 634045DEST_PATH_IMAGE001
The algorithm,
Figure 160972DEST_PATH_IMAGE002
An algorithm and
Figure 737447DEST_PATH_IMAGE003
any one of the algorithms;
and converting the first financial data into an image character string, and calculating the image character string according to the second type of first Hash encryption algorithm to obtain a first Hash value.
Optionally, in a possible implementation manner of the first aspect, in the step of converting the first financial data into an image string and calculating the image string according to the second type of first hash encryption algorithm to obtain a first hash value, the method specifically includes:
randomly selecting a plurality of images of a target quantity in the first financial data, respectively adding second labels to the selected plurality of images, and sequencing to obtain a second sequencing result, wherein each image has a corresponding financial value;
respectively adding a second label to the plurality of images, sequencing the images to obtain an event of a second sequencing result, recording the event and generating second monitoring information;
and after the plurality of images are sequenced according to a second sequencing result, calculating an image character string formed by the plurality of images by using a second type of first Hash encryption algorithm to obtain a first Hash value, and binding the second monitoring information and the first Hash value.
Optionally, in a possible implementation manner of the first aspect, the receiving, at the middle station, a quantum encryption public key sent by a quantum server, performing encryption processing on the first financial data according to the quantum encryption public key to obtain second financial data, and selecting a corresponding second hash encryption algorithm according to type information of the second financial data to calculate the second financial data to obtain a second hash value specifically includes:
if the second financial data is judged to be encrypted, selecting a second Hash encryption algorithm, wherein the second Hash encryption algorithm is
Figure 945706DEST_PATH_IMAGE004
The algorithm,
Figure 353553DEST_PATH_IMAGE005
An algorithm and
Figure 785803DEST_PATH_IMAGE006
any one of the algorithms;
and converting the encrypted second financial data into a fusion character string, and calculating the fusion character string according to the second Hash encryption algorithm to obtain a second Hash value.
Optionally, in a possible implementation manner of the first aspect, the determining the target number includes:
acquiring a quantity value of a document corresponding to financial information in first financial data and a data value of each document, wherein the document is any one of a character table or an image;
acquiring a current processing quantity value and a current cache quantity value of a middle station at the current moment;
and generating a data evaluation value according to the quantity value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middle station, and obtaining a target quantity according to the data evaluation value and the processing evaluation value.
Optionally, in a possible implementation manner of the first aspect, in the step of generating a data evaluation value according to a quantity value of documents in the first financial data and a data value of each document, generating a processing evaluation value according to a current processing quantity value and a current cache quantity value of the middle station, and obtaining the target quantity according to the data evaluation value and the processing evaluation value, the method specifically includes:
calculating to obtain a data evaluation value based on a preset data conversion coefficient and data values of all documents, obtaining a processing evaluation value based on a preset processing amount conversion value, a buffer storage amount conversion value, a current processing amount value and a current buffer storage amount value, respectively weighting the data evaluation value and the processing evaluation value according to a first weight value and a second weight value, and multiplying the data evaluation value and the processing evaluation value by a reference amount value to obtain a target number;
if the preliminary target quantity is an integer, taking the preliminary target quantity as a final target quantity;
and if the preliminary target quantity is not an integer, processing the preliminary target quantity in a rounding mode to obtain the target quantity of the integer.
Optionally, in a possible implementation manner of the first aspect, the method further includes a training module, and adjusting the reference quantity value based on the training module includes the following steps:
receiving the target quantity actively input by the user, and comparing the target quantity actively input by the user with the calculated target quantity to obtain a comparison value;
and adjusting the reference quantity value according to the comparison value.
In a second aspect of the embodiments of the present invention, there is provided a smart shared finance system based on a hash encryption algorithm and a quantum key, including the smart shared finance platform according to the first aspect and various possible designs of the first aspect of the present invention, and further including:
the data receiving end receives the hash table and the second financial data sent by the middle station;
the data receiving end receives a quantum encryption private key sent by the quantum server;
the data receiving end extracts a first hash value and a second hash value in the hash table, and calculates the first hash value and the second hash value based on a third hash encryption algorithm to obtain a fourth hash value;
if the fourth hash value corresponds to the third hash value, the first hash value and the second hash value are determined to be correct, and the second financial data is calculated according to a second hash encryption algorithm to obtain a fifth hash value;
if the fifth hash value corresponds to the second hash value, the second financial data is determined to be correct, and the received quantum encryption private key is called to decrypt the second financial data to obtain first financial data;
and calculating the first financial data based on a first Hash encryption algorithm to obtain a sixth Hash value, and if the sixth Hash value corresponds to the first Hash value, judging that the first financial data received by a data receiving end is correct.
The invention provides an intelligent sharing financial platform and system based on a Hash encryption algorithm and a quantum key. Firstly, the first financial data is subjected to calculation of a Hash encryption algorithm to obtain a corresponding first Hash value, and the purpose that the data receiving end verifies the first financial data can be achieved through the first Hash value. And then encrypting the financial data according to the quantum encryption public key to obtain the encrypted second financial data, and the mode can ensure the quantum encryption of the financial data and the safety of the financial data. After the encrypted second financial data is obtained, the hash encryption algorithm is calculated on the second financial data to obtain a corresponding second hash value, the purpose of verifying the second financial data by the data receiving end can be achieved through the second hash value, a third hash value is obtained through the first hash value and the second hash value, and the purpose of verifying the first hash value and the second hash value by the data receiving end can be achieved through the third hash value. According to the method, through verification at multiple levels, the correctness of the transmitted first financial data, the encrypted second financial data and the first hash value and the second hash value for verifying the first financial data and the second financial data can be respectively verified, so that the first financial data, the second financial data, the first hash value and the second hash value cannot be falsified in the generation, use and transmission processes, the accuracy of the financial data is ensured, the financial data is effectively encrypted through the quantum encryption public key, and the financial data is prevented from being acquired by other people.
According to the technical scheme provided by the invention, when the hash values of different types of financial data are calculated, different types of hash encryption algorithms are adopted, and partial character tables or images are selected according to different data volumes of the financial data to calculate the first hash value, so that the data volume of the first hash value is reduced. And through the first monitoring information and the second monitoring information, a mode of calculating the first hash value based on a part of the character table or the image can be recorded, so that a sixth hash value calculated by the data receiving end when the data receiving end verifies the first financial data is the same as the first hash value.
According to the technical scheme provided by the invention, when the target number of the first financial data documents is selected, calculation is carried out according to the number values of all data documents included in the current first financial data, the data value of each document, the current processing value of the middle desk and the current cache value, so that the calculation of the first hash value can be carried out according to the data values of the first financial data and the working state of the middle desk when the first hash value is calculated, the first hash value is obtained on the premise of ensuring that large calculation pressure cannot be caused on the middle desk, the accuracy of the first financial data is maximally ensured on the premise of ensuring the stable working of the middle desk, and the robustness of the technical scheme provided by the invention is improved.
Drawings
FIG. 1 is a block diagram of a smart shared financial platform based on a hash encryption algorithm and quantum keys;
FIG. 2 is a flow diagram of a first embodiment of a smart shared financial platform based on a hash encryption algorithm and quantum keys;
FIG. 3 is a flowchart of a second embodiment of a smart sharing financial platform based on a hash algorithm and a quantum key.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that A, B, C all comprise, "comprises A, B or C" means comprise one of A, B, C, "comprises A, B and/or C" means comprise any 1 or any 2 or 3 of A, B, C.
It should be understood that in the present invention, "B corresponding to a", "a corresponds to B", or "B corresponds to a" means that B is associated with a, and B can be determined from a. Determining B from a does not mean determining B from a alone, but may also be determined from a and/or other information. And the matching of A and B means that the similarity of A and B is greater than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
The invention provides a smart shared finance platform based on a Hash encryption algorithm and a quantum key, and is shown in a schematic connection structure diagram of the smart shared finance platform in figure 1. Wisdom sharing financial platform include well platform and with the quantum server that well platform is connected. Wisdom sharing financial platform includes well platform, well platform is connected with a plurality of data transmission terminal and data receiving terminal respectively, can understand like this, data sending end can be regarded as the inside terminal of company, data sending end can pass through internal network with well platform promptly and be connected, data receiving terminal can be the outside terminal of company, data receiving terminal can pass through external network with well platform and be connected, when needs carry out the biography financial data outward, need handle the financial data in the data sending end through the terminal, well platform sends to data receiving terminal after handling data.
The quantum server may have two ways, one built by the company and one built in cooperation with a third party. The quantum server built by the company can be equipment belonging to an internal network of the company, but the quantum server also needs to be connected with an external network, and the quantum server can transmit the quantum encrypted public key to the intermediate station through the internal network. The quantum server established in cooperation with the third party also needs to be connected with the external network when sending the quantum key to the intermediate station, so the configuration mode of the quantum service is not limited in any way, and can be set according to actual scenes.
The technical scheme provided by the invention realizes the sharing transmission of financial information between a data sending terminal and a data receiving terminal based on an intelligent sharing financial platform through the following steps, as shown in figure 2, the method comprises the following steps:
step S110, the middle station receives first financial data sent by a data sending terminal, and selects a corresponding first Hash encryption algorithm according to the type information of the first financial data to calculate the first financial data to obtain a first Hash value. According to the technical scheme provided by the invention, the middle station firstly receives first financial data sent by the data sending terminal, the first financial data comprises a plurality of first financial information, and the first financial information can be annual tax payment statement, asset liability statement, profit statement, detail account, chronological account and the like. In the practical use process, the financial information can be expressed in various forms, such as a form (EXCEL form) and an image form (financial value scanning piece), and the financial information of different types of information can be transmitted according to different requirements and scenes. The invention adopts different modes of calculating the first hash value according to different types of the financial data.
In a possible implementation manner of the technical solution provided by the present invention, step S110 specifically includes:
if the first financial data is converted into character type information, selecting a first Hash encryption algorithm of a first type, wherein the first Hash encryption algorithm of the first type is
Figure 597376DEST_PATH_IMAGE001
The algorithm,
Figure 655331DEST_PATH_IMAGE002
An algorithm and
Figure 871680DEST_PATH_IMAGE003
any one of the algorithms. Generally, the amount of data before encryption is less than the amount of data after encryption, so the collision rate of the first hash value obtained by calculating the first hash encryption algorithm is lower, so the invention can choose
Figure 209252DEST_PATH_IMAGE001
The algorithm,
Figure 822635DEST_PATH_IMAGE002
An algorithm and
Figure 372697DEST_PATH_IMAGE003
the algorithm is used as a first hash encryption algorithm.
And converting the first financial data into a text string, and calculating the text string according to the first Hash encryption algorithm of the first type to obtain a first Hash value. The method can firstly convert the first financial data into a character string, all documents and data consist of codes and characters in a computer language, and the method can acquire the character string corresponding to the first financial data, namely convert the Excel-form first financial data into the character string, and at the moment, the character string can represent the corresponding first financial data. According to the invention, the character string is calculated according to the first type of the first hash encryption algorithm to obtain the first hash value, the hash value length of the first hash value is shorter, and the corresponding relation between the hash value length of the first hash value and the first hash encryption algorithm is shown in table 1.
Figure 692820DEST_PATH_IMAGE007
In the technical scheme provided by the present invention, in the step of converting the first financial data into a text string and calculating the text string according to the first type of first hash encryption algorithm to obtain a first hash value, the method specifically comprises:
and randomly selecting a plurality of character tables with target quantity in the first financial data, respectively adding a first label to the plurality of selected character tables, and sequencing to obtain a first sequencing result, wherein each character table has a corresponding financial value. According to the technical scheme provided by the invention, a plurality of character tables can be randomly selected, for example, the first financial data comprises financial information 1 to financial information 6, a plurality of character tables with target quantity can be randomly selected from the 6 financial information, the target quantity can be 2, for example, the randomly selected financial information is financial information 3 and financial information 5, the invention adds a first label to the financial information 3 and the financial information 5 respectively, and the first label can be a letter, for example A, B, C, D and the like. The first label added to the text table can be randomly added, for example, the first label added to the financial information 3 is A, and the first label added to the financial information 5 is B. The invention can sort the character table according to the sorting sequence of the first label, and if the sorting sequence of the first label is AB, the first sorting result is financial information 3-financial information 5. Each text table has a corresponding financial value, for example, if the text table is an annual tax return form, the value corresponding to the annual tax amount is the financial value.
And respectively adding a first label to the plurality of character tables, sequencing the character tables to obtain an event of a first sequencing result, recording the event, and generating first monitoring information. The invention records the event of adding the first label and obtaining the first sequencing result, and then generates corresponding first monitoring information (data receiving terminal), wherein the first monitoring information is used for enabling the data receiving terminal to determine the generation mode of the first hash value, and further can verify the first hash value according to the same mode.
After the plurality of character tables are sorted according to a first sorting result, the character string formed by the plurality of character tables is subjected to calculation of a first type of first Hash encryption algorithm to obtain a first Hash value, and the first monitoring information and the first Hash value are bound. According to the technical scheme provided by the invention, the corresponding character strings can be obtained according to the first sequencing result, the character content of the character strings can be obtained according to the financial information 3 and the financial information 5, and the character sequence of the character strings can be obtained according to the sequencing sequence of the financial information 3 and the financial information 5. The invention can calculate the selected character table through the first Hash encryption algorithm of the first type to obtain the first Hash value, and binds the first Hash value with the first monitoring information, so that the invention can inform the data receiving end of the generation mode of the first Hash value, and the data receiving end can normally verify the first financial data.
According to the technical scheme provided by the invention, the correctness of the first financial data can be verified through the first hash value, and when the first hash value is generated, in order to reduce the data processing amount of a middle station, the target amount of financial information in the financial data can be randomly selected, and all financial information in the financial data can not be selected, so that the data processing amount for generating the first hash value is reduced. Generally, when the first financial data changes, the probability of a plurality of financial information in the first financial data is influenced, so that the integrity of all financial information can be reflected by the randomly determined part of financial information, and all financial information is guaranteed to be unaffected.
In another possible implementation manner of the technical solution provided by the present invention, step S110 specifically includes:
if the type information is image type information, selecting a first Hash encryption algorithm of a second type, wherein the first Hash encryption algorithm of the first type is
Figure 729521DEST_PATH_IMAGE001
The algorithm,
Figure 518617DEST_PATH_IMAGE002
An algorithm and
Figure 652795DEST_PATH_IMAGE003
any one of the algorithms. Generally, the amount of data before encryption is less than the amount of data after encryption, so the collision rate of the first hash value obtained by calculating the first hash encryption algorithm is lower, so the invention can choose
Figure 640474DEST_PATH_IMAGE001
The algorithm,
Figure 523110DEST_PATH_IMAGE002
An algorithm and
Figure 111086DEST_PATH_IMAGE003
the algorithm is used as a first hash encryption algorithm.
And converting the first financial data into an image character string, and calculating the image character string according to the second type of first Hash encryption algorithm to obtain a first Hash value. The invention can firstly convert the first financial data into the image character string, in the computer language, all images are composed of codes and characters, the invention can acquire the image character string corresponding to the first financial data, namely, the first financial data in the form of the image is converted into the image character string, and at the moment, the image character string can represent the corresponding first financial data. According to the invention, the image character string is calculated according to the second type of first hash encryption algorithm to obtain the first hash value, the hash value length of the first hash value is shorter, and the corresponding relation between the hash value length of the first hash value and the first hash encryption algorithm is shown in table 2.
Figure DEST_PATH_IMAGE008
The first hash encryption algorithm of the first type and the second type may be the same algorithm or different algorithms.
In the technical solution provided by the present invention, in the step of converting the first financial data into an image string and calculating the image string according to the second type of first hash encryption algorithm to obtain a first hash value, the method specifically includes:
and randomly selecting a plurality of images of the target number in the first financial data, respectively adding second labels to the plurality of selected images, and sequencing to obtain a second sequencing result, wherein each image has a corresponding financial value. According to the technical scheme provided by the invention, a plurality of images can be randomly selected, for example, the first financial data comprises financial information 1 to financial information 6, a target number of the images can be randomly selected from the 6 financial information, the target number can be 2, for example, the randomly selected financial information is financial information 3 and financial information 5, the invention adds a first label to the financial information 3 and the financial information 5 respectively, and the first label can be a letter, such as A, B, C, D and the like. The first label added to the image may be randomly added, for example, the first label added to the financial information 3 is a, and the first label added to the financial information 5 is B. The images can be sorted according to the sorting order of the first labels, and if the sorting order of the first labels is AB, the first sorting result is financial information 3-financial information 5. Each image has a corresponding financial value, for example, if the image is an annual tax return, the value corresponding to the annual tax amount is the financial value.
And respectively adding a second label to the plurality of images, sequencing the images to obtain an event of a second sequencing result, recording the event, and generating second monitoring information. The invention records the event which is added with the second label and obtains the second sequencing result, and then generates corresponding second monitoring information, wherein the second monitoring information is used for enabling the data receiving end to determine the generation mode of the first hash value, and further can verify the first hash value according to the same mode.
And after the plurality of images are sequenced according to a second sequencing result, calculating a second type of first Hash encryption algorithm on an image character string formed by the plurality of images to obtain a first Hash value, and binding the second monitoring information and the first Hash value. According to the technical scheme provided by the invention, the corresponding image character strings can be obtained according to the second sequencing result, the character content of the image character strings can be obtained according to the financial information 3 and the financial information 5, and the character sequence of the image character strings can be obtained according to the sequencing sequence of the financial information 3 and the financial information 5. The method calculates the selected image through the second type of first Hash encryption algorithm to obtain the first Hash value, and binds the first Hash value with the second monitoring information, so that the method informs the data receiving end of the generation mode of the first Hash value, and the data receiving end can normally verify the first financial data.
Generally, the financial data of the image type information is larger than the financial data of the text table type information, so when the first hash encryption algorithm of the first type and the first hash encryption algorithm of the second type are selected, the length of the hash value obtained by the first hash encryption algorithm of the second type can be larger than the length of the hash value obtained by the first hash encryption algorithm of the first type, and further, the method and the device can adjust different types of data to match different hash encryption algorithms according to the possibility of collision rate.
Step S120, the middle station receives the quantum encryption public key sent by the quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and selects a corresponding second Hash encryption algorithm according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value. According to the technical scheme provided by the invention, the middle station can receive the quantum encryption public key sent by the quantum server, and the second financial data can be obtained by encrypting the first financial data through the quantum encryption public key. According to the method and the device, the second hash value is obtained by calculating the second financial data through the second hash encryption algorithm, so that the data receiving end can verify the correctness of the second financial data through the second hash value.
In a possible implementation manner of the technical solution provided by the present invention, step S120 specifically includes:
if the second financial data is judged to be encrypted, selecting a second Hash encryption algorithm, wherein the second Hash encryption algorithm is
Figure 78649DEST_PATH_IMAGE004
The algorithm,
Figure 435681DEST_PATH_IMAGE005
An algorithm and
Figure 754798DEST_PATH_IMAGE006
any one of the algorithms. According to the technical scheme provided by the invention, after the second financial data is encrypted, the type information of the second financial data is considered to correspond to the second Hash encryption algorithm
Figure 846382DEST_PATH_IMAGE004
The algorithm,
Figure 525625DEST_PATH_IMAGE005
An algorithm and
Figure 219387DEST_PATH_IMAGE006
the algorithm selects a corresponding algorithm.
And converting the encrypted second financial data into a fusion character string, and calculating the fusion character string according to the second Hash encryption algorithm to obtain a second Hash value. The method can convert the encrypted second financial data into the fusion character string, the fusion character string has the character information of the first financial data and also includes the character information of the quantum encryption public key, and the second hash value obtained by calculation can verify the accuracy of the encrypted second financial data.
In a possible implementation manner, the technical solution provided by the present invention determines the target number by the following steps, as shown in fig. 3, including:
step S210, obtaining the quantity value of the document corresponding to the financial information in the first financial data and the data value of each document, wherein the document is any one of a character table or an image. According to the technical scheme provided by the invention, each piece of financial information is taken as a document, the document can be the text table or the image, and the quantity value of the document and the data value of each document are obtained.
And step S220, acquiring the current processing quantity value and the current cache quantity value of the middle station at the current moment. Before the first financial data is calculated, the working state of the middle station at the current moment can be obtained, the working state of the middle station can be reflected through the current processing quantity value and the current cache quantity value of the middle station, the current processing quantity value can be regarded as the CPU occupancy rate of the residual processing quantity, for example, the current CPU occupancy rate is 30 percent, and the current processing quantity value is 70 percent of the CPU occupancy rate at the moment, namely, the computing power and the computing quantity of the CPU occupancy rate are idle 70 percent. The current buffer amount value may be regarded as a remaining amount value buffered at the current time, for example, the buffer space is 2GB, and at this time, the buffer space already occupies 1GB, and then the current buffer amount value may be the remaining unoccupied 1 GB.
Step S230, generating a data evaluation value according to the number value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing value and the current buffer value of the middle station, and obtaining a target number according to the data evaluation value and the processing evaluation value. According to the technical scheme provided by the invention, a data evaluation value is generated according to the quantity value of the documents in the first financial data and the data value of each document, the data evaluation value can evaluate the data quantity of the first financial data needing to be processed, generally speaking, the larger the data quantity of the first financial data is, the more financial information needs to be processed at the moment, and the more target quantity needs to be determined by the method; conversely, the smaller the data size of the first financial data is, the smaller the financial information to be processed at that time is, and the smaller the target amount to be determined by the present invention is, so that the present invention is obtained based on the first financial data when determining the target amount. The invention can generate a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middle station, the larger the processing evaluation value is, the better the state of the middle station is, the stronger the data processing capability is, more data can be processed, so the target quantity can be increased; conversely, if the processing evaluation value is smaller, the state of the middle station is proved to be poor at this time, and the data processing capability is weaker, less data can be processed at this time, so that the target number can be adjusted to be lower at this time, so that the invention is obtained according to the state of the middle station when determining the target number.
In one possible embodiment, the method for obtaining the target number according to the data evaluation value and the processing evaluation value includes:
and calculating to obtain a data evaluation value based on a preset data conversion coefficient and data values of all documents, obtaining a processing evaluation value based on a preset processing quantity conversion value, a buffer storage quantity conversion value, a current processing quantity value and a current buffer storage quantity value, respectively weighting the data evaluation value and the processing evaluation value according to a first weight value and a second weight value, and multiplying the data evaluation value and the processing evaluation value by a reference quantity value to obtain a target quantity.
The preliminary target number is calculated by the following first formula,
Figure 506143DEST_PATH_IMAGE009
wherein the content of the first and second substances,
Figure 553864DEST_PATH_IMAGE010
is a numerical value of the preliminary target number,
Figure 771219DEST_PATH_IMAGE011
is a first weight value of the first weight value,
Figure 853576DEST_PATH_IMAGE012
as an evaluation value of the data,
Figure 763763DEST_PATH_IMAGE013
is a second weight value of the first weight value,
Figure 295851DEST_PATH_IMAGE014
in order to handle the evaluation value(s),
Figure 67629DEST_PATH_IMAGE015
is used as a reference quantity value and is used as a reference quantity value,
Figure 988180DEST_PATH_IMAGE016
the standard value of the quantity is used as the standard value,
Figure 820001DEST_PATH_IMAGE017
is the quantitative value of the documents in the first financial data,
Figure 842315DEST_PATH_IMAGE018
is a first
Figure 463789DEST_PATH_IMAGE019
The data value of each of the documents is,
Figure 986650DEST_PATH_IMAGE020
in order to convert the coefficients for the data,
Figure 723793DEST_PATH_IMAGE021
is the upper limit value of the document,
Figure 217091DEST_PATH_IMAGE022
in order to be the current value of the processed quantity,
Figure 392989DEST_PATH_IMAGE023
is a value of a standard process quantity,
Figure 38865DEST_PATH_IMAGE024
in order to handle the amount-of-conversion value,
Figure 196177DEST_PATH_IMAGE025
in order to be the current value of the buffer size,
Figure 190153DEST_PATH_IMAGE026
is a standard buffer size value and is,
Figure 904162DEST_PATH_IMAGE027
is a buffer storage conversion value.
The technical scheme provided by the invention can be used
Figure 591495DEST_PATH_IMAGE028
Calculating an evaluation value of the data by
Figure 998337DEST_PATH_IMAGE029
An average data value of all documents can be obtained by
Figure 154643DEST_PATH_IMAGE030
The trend value of the quantity value of the document can be obtained, when the average data value of the document and the quantity value of the document are larger, the corresponding preliminary target quantity is larger, and the average data value and the trend value of the quantity value can be converted and calculated through the data conversion coefficient, so that the obtained data evaluation value is a numerical value meeting the requirement of the corresponding magnitude.
The technical scheme provided by the invention can be used
Figure 921611DEST_PATH_IMAGE031
Evaluation of calculation processingValue, standard process value
Figure 562587DEST_PATH_IMAGE023
And standard buffer size
Figure 343592DEST_PATH_IMAGE026
May be preset, if the larger the current processing quantity value and the current cache quantity value are, the larger the current processing quantity value and the current cache quantity value are
Figure 236462DEST_PATH_IMAGE031
The larger; conversely, if the current process magnitude and the current cache magnitude are smaller, then
Figure 557853DEST_PATH_IMAGE031
The smaller. The current state of the middle stage can be evaluated through the processing evaluation value, and the larger the processing evaluation value is, the better the current state of the middle stage is.
According to the technical scheme provided by the invention, a reference quantity value is preset, and the reference quantity value can be 2. In general terms, the amount of the solvent to be used,
Figure 767249DEST_PATH_IMAGE032
is a number greater than 1, so the preliminary target number will typically be greater than 2. Through the first calculation formula, the deviation of the reference quantity value can be calculated according to the quantity value of the financial information of the first financial data and the difference of the data values, and the deviation of the reference quantity value can be calculated according to the difference of the processing states of the middleboxes at the current moment, so that the invention refers to information and data of multiple dimensions when calculating the target quantity, selects the sample of the financial information for calculating the first hash value to the maximum extent on the premise of ensuring the stable work of the middleboxes, and ensures the accuracy of the first financial data during verification.
And if the preliminary target quantity is an integer, taking the preliminary target quantity as a final target quantity. When calculating the preliminary quantity, if the preliminary target quantity is an integer, the invention directly takes the preliminary target quantity as the final target quantity.
And if the preliminary target number is not an integer, processing the preliminary target number in a rounding mode to obtain the target number of the integer. When calculating the preliminary number, if the preliminary target number is not an integer, then the preliminary target number needs to be subjected to an integer processing, and the manner of the integer processing may be to calculate and adjust the preliminary target number by rounding to obtain the target number of the integer.
In a possible embodiment, the technical solution provided by the present invention further includes a training module, which trains the first formula calculation based on the training module, and adjusts the reference quantity value, and includes the following steps:
and receiving the target quantity actively input by the user, and comparing the target quantity actively input by the user with the calculated target quantity to obtain a comparison value. The method comprises the steps that when the target quantity is calculated, calculation is carried out according to an initialized reference quantity value, in a data transmission scene with strict requirements, in order to guarantee the accuracy of financial data, a user can intervene actively to adjust the target quantity, a comparison value can be obtained by comparing the target quantity actively input by the user with the calculated target quantity, the comparison value can be regarded as the difference between the target quantity calculated by the method and the quantity which is expected to be determined by an administrator and the user, and if the difference is larger, the difference between the calculated target quantity and the target quantity expected by the administrator and the user psychology is proved to be larger.
Adjusting the reference quantity value in the first formula according to the comparison value, calculating the adjusted reference quantity value through a second formula,
Figure 702844DEST_PATH_IMAGE033
wherein the content of the first and second substances,
Figure 893129DEST_PATH_IMAGE034
for the target number that the user actively enters,
Figure 221473DEST_PATH_IMAGE035
to calculateThe target number of (a) is,
Figure 65801DEST_PATH_IMAGE036
in order to adjust the value of the reference quantity,
Figure 798396DEST_PATH_IMAGE037
the weight value of the first adjustment is adjusted,
Figure 475978DEST_PATH_IMAGE038
the second weight value is adjusted.
According to the technical scheme provided by the invention, calculation is carried out according to the second formula, and the reference quantity value in the first formula is adjusted, so that the adjusted reference quantity value is more in line with the calculation scene required by a user and an administrator, the expectation of the user and the administrator is more in line with when the target quantity is calculated next time, and the accuracy of target quantity calculation is improved.
Step S130, the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value. During the transmission of the first hash value and the second hash value, the first hash value and the second hash value may be damaged, in order to ensure the accuracy of the first hash value and the second hash value, the first hash value and the second hash value are combined, the combination mode of the first hash value and the second hash value can be regarded as that the characters of the first hash value and the second hash value are sorted, the invention obtains the first combined hash value after the first hash value and the second hash value are combined, at the moment, the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value, at the moment, the third hash value can verify the accuracy of the first combined hash value, and the data receiving end can verify the first combined hash value, the first hash value and the second hash value according to the third hash value. Thereby ensuring the accuracy of the transmitted first financial data.
Step S140, the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, the hash table and the second financial data are sent to a data receiving end, the middle station sends a key instruction to the quantum server, and the quantum server sends a quantum encryption private key corresponding to the quantum encryption public key to the data receiving end based on the key instruction. According to the technical scheme provided by the invention, the middle station can generate the hash table for the first hash value, the second hash value and the third hash value, and simultaneously send the corresponding hash table and the second financial data to the data receiving end. Before or at the same time, the central station sends a key instruction to the quantum server, where the key instruction may instruct the quantum server to send the quantum encryption private key to the corresponding data receiving end. After the quantum server receives the key instruction, the corresponding quantum encryption private key can be sent to the data receiving end, the encrypted data and the quantum encryption private key can be sent in a distributed mode, when a certain transmission link is damaged, the encrypted data (second financial data) and the quantum encryption private key cannot be intercepted simultaneously, and the safety of the encrypted data (second financial data) is guaranteed. The number of the data sending ends and the number of the data receiving ends can be multiple, and one data sending end can respectively send corresponding information and data to the multiple data receiving ends based on the middleboxes.
The technical scheme provided by the invention also provides a smart sharing financial system based on the Hash encryption algorithm and the quantum key, which comprises the smart sharing financial platform based on the Hash encryption algorithm and the quantum key, wherein the data receiving end decrypts the second financial data and verifies the correctness of the first financial data through the following steps,
and the data receiving end receives the hash table and the second financial data sent by the middle station. The data receiving end can receive the hash table and the second financial data sent by the middlebox, the hash table can verify the second financial data, the hash table can not be encrypted, and the financial data cannot be obtained through the hash table due to lawless persons, but the data receiving end can verify each data and information in the second financial data through the hash value in the hash table.
And the data receiving end receives the quantum encryption private key sent by the quantum server. And the data receiving end receives the quantum encryption private key sent by the quantum server. The time when the quantum server sends the quantum encryption private key is not limited in any way, and the quantum encryption private key can be sent to the data receiving end while the quantum encryption public key is sent to the middle station, or the quantum encryption private key can be sent to the data receiving end after the quantum encryption public key is sent to the middle station.
And the data receiving end extracts the first hash value and the second hash value in the hash table, and calculates the first hash value and the second hash value based on a third hash encryption algorithm to obtain a fourth hash value. In general, the data receiving end may calculate the hash values in an order opposite to the order in which the middleboxes produce the hash values. After the data receiving end receives the hash table and the second financial data, the data receiving end firstly calculates the first hash value and the second hash value through a third hash encryption algorithm to obtain a fourth hash value, in the process, the first hash value and the second hash value are combined to obtain a second combined hash value, then the second combined hash value is calculated according to the third hash encryption algorithm to obtain a corresponding fourth hash value, and the accuracy of the first hash value and the accuracy of the second hash value can be verified through the relation between the third hash value and the fourth hash value.
If the fourth hash value corresponds to the third hash value, the first hash value and the second hash value are determined to be correct, and the second financial data are calculated according to a second hash encryption algorithm to obtain a fifth hash value. If the fourth hash value is equal to the third hash value, the fourth hash value is considered to correspond to the third hash value, the first hash value and the second hash value can be considered to be correct, and the authenticity of the second financial data and the authenticity of the first financial data can be verified through the first hash value and the second hash value. According to the method and the device, the second financial data is calculated according to the second hash encryption algorithm to obtain the fifth hash value, the correctness of the second financial data obtained by encrypting the first financial data based on the quantum encryption public key is verified through the fifth hash value, and therefore the second financial data which is stable and encrypted when the second financial data is received by the data receiving end is ensured. The algorithm for calculating the second hash value and the fifth hash value is the same algorithm.
And if the fifth hash value corresponds to the second hash value, the second financial data is determined to be correct, and the received quantum encryption private key is called to decrypt the second financial data to obtain the first financial data. When the fifth hash value corresponds to the second hash value, the data receiving end may consider that the received second financial data is the same as the second financial data sent by the middle station, and at this time, the invention decrypts the second financial data according to the quantum encryption private key to obtain the first financial data.
And calculating the first financial data based on a first Hash encryption algorithm to obtain a sixth Hash value, and if the sixth Hash value corresponds to the first Hash value, judging that the first financial data received by a data receiving end is correct. According to the method and the device, after the first financial data is obtained, the first financial data is calculated according to the first Hash encryption algorithm to obtain the sixth Hash value, and when the sixth Hash value is corresponding to and identical to the first Hash value, the first financial data received by the data receiving end at the moment is proved to be correct. The algorithm for calculating the sixth hash value and the first hash value is the same algorithm.
Because the first hash value can be bound with the first monitoring information or the second monitoring information, the data receiving end can obtain a generation mode of the first hash value according to the first monitoring information or the second monitoring information, call a first label, a first sorting result or a second label, and a second sorting result stored in the first monitoring information or the second monitoring information, and select corresponding financial information to sort and calculate according to the first label, the first sorting result or the second label, and the second sorting result.
In the above embodiments of the terminal or the server, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and these modifications or substitutions do not depart from the spirit of the corresponding technical solutions of the embodiments of the present invention.

Claims (4)

1. Wisdom sharing financial platform based on hash encryption algorithm and quantum key, its characterized in that, including well platform and with the quantum server that well platform is connected realizes through following steps that financial information carries out sharing transmission between data sending terminal and data receiving terminal based on wisdom sharing financial platform, includes:
the method comprises the steps that a middle station receives first financial data sent by a data sending terminal, and a corresponding first Hash encryption algorithm is selected according to type information of the first financial data to calculate the first financial data to obtain a first Hash value;
the middle station receives a quantum encryption public key sent by a quantum server, encrypts the first financial data according to the quantum encryption public key to obtain second financial data, and selects a corresponding second Hash encryption algorithm according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value;
the middle station combines the first hash value and the second hash value to obtain a first combined hash value, and the middle station calls a third hash encryption algorithm to calculate the first combined hash value to obtain a third hash value;
the middle station generates a hash table according to the first hash value, the second hash value and the third hash value, and sends the hash table and the second financial data to a data receiving end;
in the step of receiving, at a middling station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the first financial data is character type information, selecting a first Hash encryption algorithm of a first type;
converting the first financial data into a text string, and calculating the text string according to the first Hash encryption algorithm of the first type to obtain a first Hash value;
in the step of converting the first financial data into a text string and calculating the text string according to the first hash encryption algorithm of the first type to obtain a first hash value, the method specifically includes:
randomly selecting a plurality of character tables with target quantity in the first financial data, respectively adding a first label to the selected plurality of character tables, and sequencing to obtain a first sequencing result, wherein each character table has a corresponding financial value;
respectively adding a first label to the plurality of character tables, sequencing the character tables to obtain an event of a first sequencing result, recording the event and generating first monitoring information;
after the plurality of character tables are sorted according to a first sorting result, calculating a character string formed by the plurality of character tables by using a first type of first Hash encryption algorithm to obtain a first Hash value, and binding the first monitoring information and the first Hash value;
in the step of receiving, at a middling station, first financial data sent by a data sending terminal, and selecting a corresponding first hash encryption algorithm according to type information of the first financial data to calculate the first financial data to obtain a first hash value, the method specifically includes:
if the type information is image type information, selecting a first Hash encryption algorithm of a second type;
converting the first financial data into an image character string, and calculating the image character string according to the second type of first Hash encryption algorithm to obtain a first Hash value;
in the step of converting the first financial data into an image string and calculating the image string according to the second type of first hash encryption algorithm to obtain a first hash value, the method specifically includes:
randomly selecting a plurality of images of a target quantity in the first financial data, respectively adding second labels to the selected plurality of images, and sequencing to obtain a second sequencing result, wherein each image has a corresponding financial value;
respectively adding a second label to the plurality of images, sequencing the images to obtain an event of a second sequencing result, recording the event and generating second monitoring information;
after the plurality of images are sequenced according to a second sequencing result, calculating a second type of first Hash encryption algorithm on an image character string formed by the plurality of images to obtain a first Hash value, and binding the second monitoring information with the first Hash value;
determining the target number by:
acquiring a quantity value of a document corresponding to financial information in first financial data and a data value of each document, wherein the document is any one of a character table or an image;
acquiring a current processing quantity value and a current cache quantity value of a middle station at the current moment;
generating a data evaluation value according to the quantity value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middle station, and obtaining a target quantity according to the data evaluation value and the processing evaluation value;
the method specifically includes the steps of generating a data evaluation value according to the quantity value of the documents in the first financial data and the data value of each document, generating a processing evaluation value according to the current processing quantity value and the current cache quantity value of the middlebox, and obtaining a target quantity according to the data evaluation value and the processing evaluation value:
calculating to obtain a data evaluation value based on a preset data conversion coefficient and data values of all documents, obtaining a processing evaluation value based on a preset processing amount conversion value, a buffer storage amount conversion value, a current processing amount value and a current buffer storage amount value, respectively weighting the data evaluation value and the processing evaluation value according to a first weight value and a second weight value, and multiplying the data evaluation value and the processing evaluation value by a reference amount value to obtain a target number;
the preliminary target number is calculated by the following first formula,
Figure 689175DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 966835DEST_PATH_IMAGE002
as a numerical value of the preliminary target number,
Figure 136785DEST_PATH_IMAGE003
is a first weight value of the first weight value,
Figure 155163DEST_PATH_IMAGE004
as an evaluation value of the data,
Figure 156486DEST_PATH_IMAGE005
is a second weight value of the first weight value,
Figure 916632DEST_PATH_IMAGE006
in order to handle the evaluation value(s),
Figure 872080DEST_PATH_IMAGE007
is used as a reference quantity value and is used as a reference quantity value,
Figure 743084DEST_PATH_IMAGE008
the standard value of the quantity is used as the standard value,
Figure 598914DEST_PATH_IMAGE009
is the quantitative value of the documents in the first financial data,
Figure 529961DEST_PATH_IMAGE010
is as follows
Figure 969776DEST_PATH_IMAGE011
The data value of each of the documents is,
Figure 378892DEST_PATH_IMAGE012
in order to convert the coefficients for the data,
Figure 823648DEST_PATH_IMAGE013
is the upper limit value of the document,
Figure 879591DEST_PATH_IMAGE014
in order to be the current value of the processed quantity,
Figure 777009DEST_PATH_IMAGE015
in order to be a standard process quantity value,
Figure 698739DEST_PATH_IMAGE016
in order to handle the amount of conversion value,
Figure 466844DEST_PATH_IMAGE017
for the current value of the buffer size,
Figure 474114DEST_PATH_IMAGE018
is a standard buffer size value and is,
Figure 94714DEST_PATH_IMAGE019
is a buffer storage conversion value;
if the preliminary target quantity is an integer, taking the preliminary target quantity as a final target quantity;
and if the preliminary target quantity is not an integer, processing the preliminary target quantity in a rounding mode to obtain the integral target quantity.
2. The intelligent shared financial platform based on hash encryption algorithm and quantum key of claim 1,
the method specifically comprises the steps that a quantum encryption public key sent by a quantum server is received at a middle station, the first financial data is encrypted according to the quantum encryption public key to obtain second financial data, and a corresponding second Hash encryption algorithm is selected according to the type information of the second financial data to calculate the second financial data to obtain a second Hash value:
if the second financial data is judged to be encrypted, selecting a second Hash encryption algorithm;
and converting the encrypted second financial data into a fusion character string, and calculating the fusion character string according to the second Hash encryption algorithm to obtain a second Hash value.
3. The intelligent shared financial platform based on hash encryption and quantum keys of claim 1 further comprising a training module based on which the reference quantity value is adjusted, comprising the steps of:
receiving the target quantity actively input by the user, and comparing the target quantity actively input by the user with the calculated target quantity to obtain a comparison value;
and adjusting the reference quantity value according to the comparison value.
4. The intelligent shared finance system based on the hash encryption algorithm and the quantum key comprises the intelligent shared finance platform based on the hash encryption algorithm and the quantum key according to any one of claims 1 to 3, the data receiving end decrypts the second financial data and verifies the correctness of the first financial data through the following steps,
the data receiving end receives the hash table and the second financial data sent by the middle station;
the data receiving end receives a quantum encryption private key sent by the quantum server;
the data receiving end extracts a first hash value and a second hash value in the hash table, and calculates the first hash value and the second hash value based on a third hash encryption algorithm to obtain a fourth hash value;
if the fourth hash value corresponds to the third hash value, the first hash value and the second hash value are determined to be correct, and the second financial data is calculated according to a second hash encryption algorithm to obtain a fifth hash value;
if the fifth hash value corresponds to the second hash value, the second financial data is determined to be correct, and the received quantum encryption private key is called to decrypt the second financial data to obtain first financial data;
and calculating the first financial data based on a first Hash encryption algorithm to obtain a sixth Hash value, and if the sixth Hash value corresponds to the first Hash value, judging that the first financial data received by a data receiving end is correct.
CN202210339607.7A 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key Active CN114491610B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210339607.7A CN114491610B (en) 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210339607.7A CN114491610B (en) 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key

Publications (2)

Publication Number Publication Date
CN114491610A CN114491610A (en) 2022-05-13
CN114491610B true CN114491610B (en) 2022-07-08

Family

ID=81489057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210339607.7A Active CN114491610B (en) 2022-04-01 2022-04-01 Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key

Country Status (1)

Country Link
CN (1) CN114491610B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114677057B (en) * 2022-05-25 2022-08-26 国网浙江省电力有限公司 Green energy financial data acquisition and evaluation method and system based on machine learning
CN116781234B (en) * 2023-05-04 2024-02-02 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN117151068B (en) * 2023-10-23 2024-01-26 国网浙江省电力有限公司 Digital intelligent financial sharing method and sharing center

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812886A (en) * 2012-11-09 2014-05-21 中国科学院上海高等研究院 Computer cluster resource allocation system and method
CN105871902A (en) * 2016-05-25 2016-08-17 安徽问天量子科技股份有限公司 Data encryption and isolation system
CN106778283A (en) * 2016-11-21 2017-05-31 惠州Tcl移动通信有限公司 A kind of guard method of system partitioning critical data and system
CA2957584A1 (en) * 2016-02-12 2017-08-12 Coho Data, Inc. Methods, systems, and devices for adaptive data resource assignment and placement in distributed data storage systems
CN108683688A (en) * 2018-07-20 2018-10-19 中国建设银行股份有限公司浙江省分行 A method of information transmission security is realized based on Digital Envelope Technology
CN111917535A (en) * 2020-06-30 2020-11-10 山东信通电子股份有限公司 Data encryption storage method and device and server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726224A (en) * 2020-05-13 2020-09-29 北京信息科技大学 Quantum secret communication-based data integrity rapid authentication method, system, terminal and storage medium
CN113067816A (en) * 2021-03-17 2021-07-02 南京维沃软件技术有限公司 Data encryption method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812886A (en) * 2012-11-09 2014-05-21 中国科学院上海高等研究院 Computer cluster resource allocation system and method
CA2957584A1 (en) * 2016-02-12 2017-08-12 Coho Data, Inc. Methods, systems, and devices for adaptive data resource assignment and placement in distributed data storage systems
CN105871902A (en) * 2016-05-25 2016-08-17 安徽问天量子科技股份有限公司 Data encryption and isolation system
CN106778283A (en) * 2016-11-21 2017-05-31 惠州Tcl移动通信有限公司 A kind of guard method of system partitioning critical data and system
CN108683688A (en) * 2018-07-20 2018-10-19 中国建设银行股份有限公司浙江省分行 A method of information transmission security is realized based on Digital Envelope Technology
CN111917535A (en) * 2020-06-30 2020-11-10 山东信通电子股份有限公司 Data encryption storage method and device and server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Quantum Safe Cloud Computing Using Hash-based Digital Signatures;Zainab Iftikhar等;《2021 26th International Conference on Automation and Computing 》;20211115;第1-6页 *
基于格的大数据动态存储完整性验证方案;李雪晓等;《信息网络安全》;20140430;第46-50页 *

Also Published As

Publication number Publication date
CN114491610A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN114491610B (en) Intelligent shared financial platform and system based on Hash encryption algorithm and quantum key
CN109450772B (en) Message sending method, server and computer readable storage medium
US8661240B2 (en) Joint encryption of data
CN107592308A (en) A kind of two server multiple-factor authentication method towards mobile payment scene
US20180366036A1 (en) Pre-calculation device, method, computer-readable recording medium, vector multiplication device, and method
CN101647229B (en) Compressed ecdsa signatures
CN110765478A (en) Big data information secure storage encryption system and method thereof
CN107682316B (en) Method for generating dynamic password sending strategy and method for sending dynamic password
CN115049070A (en) Screening method and device of federal characteristic engineering data, equipment and storage medium
CN114205084B (en) Quantum key-based electronic mail multi-operation encryption method and device
CN102231181B (en) Computer system used for file encryption and file encryption method
CN113472537B (en) Data encryption method, system and computer readable storage medium
CN113449829A (en) Data transmission method based on optical character recognition technology and related device
CN113935059A (en) Dynamic encryption method and device suitable for financial data and storage medium
CN116389170B (en) Network information security management method
Bentafat et al. Towards real-time privacy-preserving video surveillance
CN113225180A (en) Method and system for protecting communication key
CN115098890B (en) Privacy calculation security audit method and system
WO2020140616A1 (en) Data encryption method and related device
CN110737705A (en) Data acquisition system for forwarding behaviors
CN114785501A (en) Data judging method, device and storage medium
CN105809802B (en) A kind of live number obtaining method based on individual mobile terminal
CN110585727B (en) Resource acquisition method and device
CN108632228B (en) Decision engine scheduling method and system
CN110598531A (en) Method and system for recognizing electronic seal based on face of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant