CN114598696A - Digital financial data sharing method - Google Patents
Digital financial data sharing method Download PDFInfo
- Publication number
- CN114598696A CN114598696A CN202210251873.4A CN202210251873A CN114598696A CN 114598696 A CN114598696 A CN 114598696A CN 202210251873 A CN202210251873 A CN 202210251873A CN 114598696 A CN114598696 A CN 114598696A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- financial data
- marking
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000008569 process Effects 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 6
- 230000006855 networking Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Abstract
The invention discloses a digital financial data sharing method, which belongs to the technical field of digital finance, and comprises the following specific steps: s1: financial data acquisition: after financial data are collected, marking according to company information or personal information, marking the identity information at the head of the data, and marking the attribution information of the data while marking the identity information; s2: financial data uploading: uploading the acquired data according to a time sequence, marking the current time information of the data before uploading by adopting an encryption protocol, and marking the time information at the tail of the data; s3: and (3) classifying the financial data: and uploading the marked financial data to a server. The digital financial data sharing method ensures the safety of data sharing, occupies less system resources and shares data more quickly.
Description
Technical Field
The invention belongs to the technical field of digital finance, and particularly relates to a digital financial data sharing method.
Background
Today, information technology is continuously developed, digitalization can provide great convenience for people, and digital finance is provided in the aspect of finance, and is a new-generation financial service combining the traditional financial service state through the internet and information technology means.
For example, a method for sharing digital financial data according to chinese invention application No. CN202110658014.2 includes: acquiring data to be shared, wherein the data to be shared is digital financial data; determining the security attribute of the data to be shared, and processing the data to be shared to form a data character string according to the security attribute; selecting a data channel according to the safety degree of the data character string, wherein the data channel is used for sharing the data character string to a third-party terminal; the four security levels are arranged in the central control unit, the length of the character string added at the tail end of the data is determined according to the security level of the data to be transmitted, the corresponding data channel is selected according to the actual length of the character string to transmit the data, data sharing is achieved, meanwhile, the security of data sharing is improved, the data transmission channel is matched based on the security degree of the data to be shared and the characteristics of the data channel, the specificity of data sharing is improved, and the security of data transmission is improved.
However, the existing sharing method has the problem that the system resources are occupied due to the safety of data sharing.
Disclosure of Invention
The invention aims to provide a digital financial data sharing method to solve the problems in the background technology.
The technical scheme is as follows: a digital financial data sharing method comprises the following specific steps:
s1: financial data acquisition: after financial data are collected, marking according to company information or personal information, marking the identity information at the head of the data, and marking the attribution information of the data while marking the identity information;
s2: financial data uploading: uploading the acquired data according to a time sequence, marking the current time information of the data before uploading by adopting an encryption protocol, and marking the time information at the tail of the data;
s3: and (3) classifying the financial data: uploading the marked financial data to a server, sequentially identifying by the server according to the sequence of attribution information, identity information and time information, classifying all information in real time according to the attribution information and the identity information, and storing the classified information in a database;
s4: financial data sharing: the user sends a sharing demand to the server after verifying through the login information, the server searches the database after knowing the demand, and the database is traversed according to the data of the attribution, the identity and the time during searching, and is shared through an encryption protocol after the data required to be shared are obtained;
s5: encrypting financial data: encrypting data information to be shared at the head part, and then carrying out digital signature at the head part;
s6: and (3) financial data viewing: the user firstly verifies the digital signature after obtaining the shared financial data, then decrypts the shared financial data through a decryptor built in the terminal after verification, the user can check the required financial data after decryption is successful, and the server can verify the login information of the user in real time in the process.
In a further embodiment, the time information is accurate to milliseconds, and the time information is collected and collated through real-time networking.
In a further embodiment, the encryption protocol is the SSL protocol.
In a further embodiment, the home location information includes information for four levels of province, city, prefecture and town, and includes location information for a company address and a personal address.
In a further embodiment, the user needs to log in through a terminal, the login terminal mainly comprises a mobile phone and a computer, wherein the mobile phone adopts a client to log in, and a digital certificate is built in the client.
In a further embodiment, the user logs in through the computer by using the browser, the browser needs to additionally download the digital certificate before login verification is performed, and the browser is restarted after the digital certificate is installed.
In a further embodiment, the encryption algorithm is an RSA encryption algorithm.
In a further embodiment, the database is backed up in real time by RAID 0, and the server is hot backed up by a dual server.
In a further embodiment, the server may be deployed with an api interface for programming by an administrator, and the digital signature and encryption algorithm may be uniformly upgraded through the api interface.
The invention has the technical effects and advantages that: according to the digital financial data sharing method, the collected financial data only needs to be marked before uploading, no extra channel is occupied during uploading, classification, sharing and encryption are carried out through the server, and no extra channel is occupied during sharing after encryption, so that the data sharing safety is ensured, and less system resources are occupied;
the user sends a demand when needing to check the shared data, then the server performs encryption sharing after traversing and searching all winning financial data in the server, the user can check the digital signature after obtaining the financial data and decrypt the digital signature, and the shared data is quicker;
the digital financial data sharing method ensures the safety of data sharing, occupies less system resources and shares data more quickly.
Drawings
FIG. 1 is a flow chart of the steps of the present invention.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without one or more of these specific details. In other instances, well-known features have not been described in order to avoid obscuring the invention.
In order to solve the proposed problem, a digital financial data sharing method as shown in fig. 1 is designed, and the digital financial data sharing method specifically comprises the following steps:
s1: financial data acquisition: the financial data are collected and then marked according to company information or personal information, wherein the company information contains legal information, so that individuals can be specifically known during checking and sharing, the identity information is marked at the head of the data, and the attribution information of the data is marked while the identity information is marked, the attribution information contains information of province, city, district and county and township four levels, and contains positioning information of company addresses and individual addresses, so that a user can conveniently know specific position information, and a server can conveniently classify the financial data;
s2: financial data uploading: the collected data are uploaded according to a time sequence, an encryption protocol is adopted during uploading, the encryption protocol is an SSL protocol, the SSL protocol is a private transmission protocol, the safety of the transmission process can be improved, the data are marked with current time information before uploading, the time information is marked at the tail of the data, the time information is accurate to millisecond, and the time information is collected and corrected through real-time networking, so that the accuracy of the time information is ensured, and errors during classification are avoided;
s3: and (3) classifying the financial data: uploading the marked financial data to a server, wherein the server is provided with an api interface for an administrator to program, the digital signature and the encryption algorithm can be upgraded uniformly through the api interface, so that an administrator can upgrade the system in time through the api interface to ensure the safety, the server sequentially identifies the attribution information, the identity information and the time information, and all the information is classified in real time according to the attribution information and the identity information, the classified information is stored in a database, the data bank adopts RAID 0 to backup in real time, the server adopts dual-computer hot backup to ensure the reliability of the data bank and the server, normal operation can be still ensured under the condition that part of equipment is down, traversal searching is more conveniently carried out by adopting the classification mode, the searching speed can be increased, and data can be shared more quickly;
s4: financial data sharing: the user sends a sharing requirement to the server after being verified through login information, the user needs to log in through a personal terminal, the login terminal mainly comprises a mobile phone and a computer, the mobile phone logs in through a client side, a digital certificate is built in the client side, the user does not need to download, the use is more convenient, the user uses a browser when logging in through the computer, the digital certificate needs to be additionally downloaded before login verification is carried out through the browser, the safety can be improved through digital signature of the digital certificate, the browser is restarted after the digital certificate is installed, the digital certificate is ensured to be started successfully, the server searches a database after knowing the requirement, traversal is carried out according to data of attribution, identity and time during searching, and sharing is carried out through an encryption protocol after the required sharing data is obtained;
s5: encrypting financial data: the data information needing to be shared is encrypted at the head, the encryption algorithm is an RSA encryption algorithm, the efficiency is high under the condition that the safety is guaranteed, then the digital signature is carried out at the head, and the user terminal needs to verify the digital signature and then decrypt the digital signature, so that the data sharing is safer;
s6: and (3) financial data viewing: the user firstly verifies the digital signature after obtaining the shared financial data, then decrypts the shared financial data through the decryptor after verification, the user can check the required financial data after decryption is successful, and the server can verify the login information of the user in real time in the process.
It is noted that, herein, relational terms such as one and two are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation. The use of the phrase "comprising one of the elements does not exclude the presence of other like elements in the process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (9)
1. A method for sharing digital financial data is characterized in that: the digital financial data sharing method specifically comprises the following steps:
s1: financial data acquisition: after financial data are collected, marking according to company information or personal information, marking the identity information at the head of the data, and marking the attribution information of the data while marking the identity information;
s2: financial data uploading: uploading the acquired data according to a time sequence, marking the current time information of the data before uploading by adopting an encryption protocol, and marking the time information at the tail of the data;
s3: and (3) classifying the financial data: uploading the marked financial data to a server, sequentially identifying by the server according to the sequence of attribution information, identity information and time information, classifying all information in real time according to the attribution information and the identity information, and storing the classified information in a database;
s4: financial data sharing: a user sends a sharing demand to a server after verifying login information, the server searches a database after learning the demand, traversal is carried out according to data of attribution, identity and time during searching, and sharing is carried out through an encryption protocol after the data required to be shared are obtained;
s5: encrypting financial data: encrypting data information to be shared at the head part, and then carrying out digital signature at the head part;
s6: and (3) financial data viewing: the user firstly verifies the digital signature after obtaining the shared financial data, then decrypts the shared financial data through a decryptor built in the terminal after verification, the user can check the required financial data after decryption is successful, and the server can verify the login information of the user in real time in the process.
2. The method of claim 1, wherein the method comprises: the time information is accurate to millisecond, and the time information is collected and calibrated through real-time networking.
3. The method of claim 1, wherein the method comprises: the encryption protocol is an SSL protocol.
4. The method of claim 1, wherein the method comprises: the home location information includes information of four levels of province, city, prefecture and town, and includes positioning information of a company address and a personal address.
5. The method of claim 1, wherein the method comprises: the user needs to log in through the terminal, the login terminal mainly comprises a mobile phone and a computer, wherein the mobile phone adopts a client to log in, and a digital certificate is built in the client.
6. The method according to claim 5, wherein the method comprises the following steps: a user adopts a browser when logging in through a computer, the browser needs to additionally download a digital certificate before login verification is carried out, and the browser is restarted after the digital certificate is installed.
7. The method of claim 1, wherein the method comprises: the encryption algorithm is an RSA encryption algorithm.
8. The method of claim 1, wherein the method comprises: the database adopts RAID 0 to perform real-time backup, and the server adopts dual-computer hot backup.
9. The method of claim 1, wherein the method comprises: the server is provided with an api interface for programming by an administrator, and digital signatures and encryption algorithms can be upgraded uniformly through the api interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210251873.4A CN114598696A (en) | 2022-03-15 | 2022-03-15 | Digital financial data sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210251873.4A CN114598696A (en) | 2022-03-15 | 2022-03-15 | Digital financial data sharing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114598696A true CN114598696A (en) | 2022-06-07 |
Family
ID=81809197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210251873.4A Pending CN114598696A (en) | 2022-03-15 | 2022-03-15 | Digital financial data sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114598696A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180129782A1 (en) * | 2016-11-09 | 2018-05-10 | General Electric Company | System and method for saving medical imaging data |
CN111625568A (en) * | 2020-05-22 | 2020-09-04 | 珠海玖零科技有限公司 | Big data statistics collection algorithm |
CN112231334A (en) * | 2020-10-06 | 2021-01-15 | 辽宁便利电科技有限公司 | Intelligent analysis system and method based on data storage application |
CN112291063A (en) * | 2020-11-03 | 2021-01-29 | 西安万像电子科技有限公司 | Image data transmission method and device and image data receiving method and device |
CN113535859A (en) * | 2021-05-31 | 2021-10-22 | 贵州艾特信安科技有限公司 | Data collection and analysis system based on private cloud computing platform |
CN113742745A (en) * | 2021-08-26 | 2021-12-03 | 安徽银杰信息科技有限公司 | Audit process evidence obtaining link management system and management method |
-
2022
- 2022-03-15 CN CN202210251873.4A patent/CN114598696A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180129782A1 (en) * | 2016-11-09 | 2018-05-10 | General Electric Company | System and method for saving medical imaging data |
CN111625568A (en) * | 2020-05-22 | 2020-09-04 | 珠海玖零科技有限公司 | Big data statistics collection algorithm |
CN112231334A (en) * | 2020-10-06 | 2021-01-15 | 辽宁便利电科技有限公司 | Intelligent analysis system and method based on data storage application |
CN112291063A (en) * | 2020-11-03 | 2021-01-29 | 西安万像电子科技有限公司 | Image data transmission method and device and image data receiving method and device |
CN113535859A (en) * | 2021-05-31 | 2021-10-22 | 贵州艾特信安科技有限公司 | Data collection and analysis system based on private cloud computing platform |
CN113742745A (en) * | 2021-08-26 | 2021-12-03 | 安徽银杰信息科技有限公司 | Audit process evidence obtaining link management system and management method |
Non-Patent Citations (1)
Title |
---|
王希龙;: "金融数据采集与分析系统设计研究", 数字通信世界, no. 09, 1 September 2018 (2018-09-01) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7090800B2 (en) | Distributed document and entity validation engine | |
US8856937B1 (en) | Methods and systems for identifying fraudulent websites | |
US20170140386A1 (en) | Transaction assessment and/or authentication | |
US10754634B1 (en) | Customized application package with context specific token | |
US20200159847A1 (en) | Contribution of multiparty data aggregation using distributed ledger technology | |
KR101948721B1 (en) | Method and apparatus for examining forgery of file by using file hash value | |
US9479338B2 (en) | Method and system for certificate discovery and ranking certificate authorities | |
WO2016165536A1 (en) | Identity verification method and device | |
JP4964338B2 (en) | User confirmation apparatus, method and program | |
US10523699B1 (en) | Privilege escalation vulnerability detection using message digest differentiation | |
US10484372B1 (en) | Automatic replacement of passwords with secure claims | |
US20110276804A1 (en) | Server authentication method and client terminal | |
US20170300708A1 (en) | Metrics authorization based on a certificate | |
US20090328142A1 (en) | Systems and Methods for Webpage Verification Using Data-Hiding Technology | |
EP3241137B1 (en) | Method carried out in an identity document and corresponding identity document | |
WO2019114246A1 (en) | Identity authentication method, server and client device | |
CN108028843A (en) | Passive type web application firewalls | |
WO2012064566A1 (en) | Methods for identifying the guarantor of an application | |
RU2638779C1 (en) | Method and server for executing authorization of application on electronic device | |
US9860230B1 (en) | Systems and methods for digitally signing executables with reputation information | |
CN114598696A (en) | Digital financial data sharing method | |
CN115297104B (en) | File uploading method and device, electronic equipment and storage medium | |
CN110995454A (en) | Service verification method and system | |
US10003464B1 (en) | Biometric identification system and associated methods | |
US20080228900A1 (en) | Method and system for facilitating the transfer of a computer file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |