CN114598696A - Digital financial data sharing method - Google Patents

Digital financial data sharing method Download PDF

Info

Publication number
CN114598696A
CN114598696A CN202210251873.4A CN202210251873A CN114598696A CN 114598696 A CN114598696 A CN 114598696A CN 202210251873 A CN202210251873 A CN 202210251873A CN 114598696 A CN114598696 A CN 114598696A
Authority
CN
China
Prior art keywords
information
data
financial data
marking
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210251873.4A
Other languages
Chinese (zh)
Inventor
帅青红
李忠俊
邓婉秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210251873.4A priority Critical patent/CN114598696A/en
Publication of CN114598696A publication Critical patent/CN114598696A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Abstract

The invention discloses a digital financial data sharing method, which belongs to the technical field of digital finance, and comprises the following specific steps: s1: financial data acquisition: after financial data are collected, marking according to company information or personal information, marking the identity information at the head of the data, and marking the attribution information of the data while marking the identity information; s2: financial data uploading: uploading the acquired data according to a time sequence, marking the current time information of the data before uploading by adopting an encryption protocol, and marking the time information at the tail of the data; s3: and (3) classifying the financial data: and uploading the marked financial data to a server. The digital financial data sharing method ensures the safety of data sharing, occupies less system resources and shares data more quickly.

Description

Digital financial data sharing method
Technical Field
The invention belongs to the technical field of digital finance, and particularly relates to a digital financial data sharing method.
Background
Today, information technology is continuously developed, digitalization can provide great convenience for people, and digital finance is provided in the aspect of finance, and is a new-generation financial service combining the traditional financial service state through the internet and information technology means.
For example, a method for sharing digital financial data according to chinese invention application No. CN202110658014.2 includes: acquiring data to be shared, wherein the data to be shared is digital financial data; determining the security attribute of the data to be shared, and processing the data to be shared to form a data character string according to the security attribute; selecting a data channel according to the safety degree of the data character string, wherein the data channel is used for sharing the data character string to a third-party terminal; the four security levels are arranged in the central control unit, the length of the character string added at the tail end of the data is determined according to the security level of the data to be transmitted, the corresponding data channel is selected according to the actual length of the character string to transmit the data, data sharing is achieved, meanwhile, the security of data sharing is improved, the data transmission channel is matched based on the security degree of the data to be shared and the characteristics of the data channel, the specificity of data sharing is improved, and the security of data transmission is improved.
However, the existing sharing method has the problem that the system resources are occupied due to the safety of data sharing.
Disclosure of Invention
The invention aims to provide a digital financial data sharing method to solve the problems in the background technology.
The technical scheme is as follows: a digital financial data sharing method comprises the following specific steps:
s1: financial data acquisition: after financial data are collected, marking according to company information or personal information, marking the identity information at the head of the data, and marking the attribution information of the data while marking the identity information;
s2: financial data uploading: uploading the acquired data according to a time sequence, marking the current time information of the data before uploading by adopting an encryption protocol, and marking the time information at the tail of the data;
s3: and (3) classifying the financial data: uploading the marked financial data to a server, sequentially identifying by the server according to the sequence of attribution information, identity information and time information, classifying all information in real time according to the attribution information and the identity information, and storing the classified information in a database;
s4: financial data sharing: the user sends a sharing demand to the server after verifying through the login information, the server searches the database after knowing the demand, and the database is traversed according to the data of the attribution, the identity and the time during searching, and is shared through an encryption protocol after the data required to be shared are obtained;
s5: encrypting financial data: encrypting data information to be shared at the head part, and then carrying out digital signature at the head part;
s6: and (3) financial data viewing: the user firstly verifies the digital signature after obtaining the shared financial data, then decrypts the shared financial data through a decryptor built in the terminal after verification, the user can check the required financial data after decryption is successful, and the server can verify the login information of the user in real time in the process.
In a further embodiment, the time information is accurate to milliseconds, and the time information is collected and collated through real-time networking.
In a further embodiment, the encryption protocol is the SSL protocol.
In a further embodiment, the home location information includes information for four levels of province, city, prefecture and town, and includes location information for a company address and a personal address.
In a further embodiment, the user needs to log in through a terminal, the login terminal mainly comprises a mobile phone and a computer, wherein the mobile phone adopts a client to log in, and a digital certificate is built in the client.
In a further embodiment, the user logs in through the computer by using the browser, the browser needs to additionally download the digital certificate before login verification is performed, and the browser is restarted after the digital certificate is installed.
In a further embodiment, the encryption algorithm is an RSA encryption algorithm.
In a further embodiment, the database is backed up in real time by RAID 0, and the server is hot backed up by a dual server.
In a further embodiment, the server may be deployed with an api interface for programming by an administrator, and the digital signature and encryption algorithm may be uniformly upgraded through the api interface.
The invention has the technical effects and advantages that: according to the digital financial data sharing method, the collected financial data only needs to be marked before uploading, no extra channel is occupied during uploading, classification, sharing and encryption are carried out through the server, and no extra channel is occupied during sharing after encryption, so that the data sharing safety is ensured, and less system resources are occupied;
the user sends a demand when needing to check the shared data, then the server performs encryption sharing after traversing and searching all winning financial data in the server, the user can check the digital signature after obtaining the financial data and decrypt the digital signature, and the shared data is quicker;
the digital financial data sharing method ensures the safety of data sharing, occupies less system resources and shares data more quickly.
Drawings
FIG. 1 is a flow chart of the steps of the present invention.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without one or more of these specific details. In other instances, well-known features have not been described in order to avoid obscuring the invention.
In order to solve the proposed problem, a digital financial data sharing method as shown in fig. 1 is designed, and the digital financial data sharing method specifically comprises the following steps:
s1: financial data acquisition: the financial data are collected and then marked according to company information or personal information, wherein the company information contains legal information, so that individuals can be specifically known during checking and sharing, the identity information is marked at the head of the data, and the attribution information of the data is marked while the identity information is marked, the attribution information contains information of province, city, district and county and township four levels, and contains positioning information of company addresses and individual addresses, so that a user can conveniently know specific position information, and a server can conveniently classify the financial data;
s2: financial data uploading: the collected data are uploaded according to a time sequence, an encryption protocol is adopted during uploading, the encryption protocol is an SSL protocol, the SSL protocol is a private transmission protocol, the safety of the transmission process can be improved, the data are marked with current time information before uploading, the time information is marked at the tail of the data, the time information is accurate to millisecond, and the time information is collected and corrected through real-time networking, so that the accuracy of the time information is ensured, and errors during classification are avoided;
s3: and (3) classifying the financial data: uploading the marked financial data to a server, wherein the server is provided with an api interface for an administrator to program, the digital signature and the encryption algorithm can be upgraded uniformly through the api interface, so that an administrator can upgrade the system in time through the api interface to ensure the safety, the server sequentially identifies the attribution information, the identity information and the time information, and all the information is classified in real time according to the attribution information and the identity information, the classified information is stored in a database, the data bank adopts RAID 0 to backup in real time, the server adopts dual-computer hot backup to ensure the reliability of the data bank and the server, normal operation can be still ensured under the condition that part of equipment is down, traversal searching is more conveniently carried out by adopting the classification mode, the searching speed can be increased, and data can be shared more quickly;
s4: financial data sharing: the user sends a sharing requirement to the server after being verified through login information, the user needs to log in through a personal terminal, the login terminal mainly comprises a mobile phone and a computer, the mobile phone logs in through a client side, a digital certificate is built in the client side, the user does not need to download, the use is more convenient, the user uses a browser when logging in through the computer, the digital certificate needs to be additionally downloaded before login verification is carried out through the browser, the safety can be improved through digital signature of the digital certificate, the browser is restarted after the digital certificate is installed, the digital certificate is ensured to be started successfully, the server searches a database after knowing the requirement, traversal is carried out according to data of attribution, identity and time during searching, and sharing is carried out through an encryption protocol after the required sharing data is obtained;
s5: encrypting financial data: the data information needing to be shared is encrypted at the head, the encryption algorithm is an RSA encryption algorithm, the efficiency is high under the condition that the safety is guaranteed, then the digital signature is carried out at the head, and the user terminal needs to verify the digital signature and then decrypt the digital signature, so that the data sharing is safer;
s6: and (3) financial data viewing: the user firstly verifies the digital signature after obtaining the shared financial data, then decrypts the shared financial data through the decryptor after verification, the user can check the required financial data after decryption is successful, and the server can verify the login information of the user in real time in the process.
It is noted that, herein, relational terms such as one and two are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation. The use of the phrase "comprising one of the elements does not exclude the presence of other like elements in the process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (9)

1. A method for sharing digital financial data is characterized in that: the digital financial data sharing method specifically comprises the following steps:
s1: financial data acquisition: after financial data are collected, marking according to company information or personal information, marking the identity information at the head of the data, and marking the attribution information of the data while marking the identity information;
s2: financial data uploading: uploading the acquired data according to a time sequence, marking the current time information of the data before uploading by adopting an encryption protocol, and marking the time information at the tail of the data;
s3: and (3) classifying the financial data: uploading the marked financial data to a server, sequentially identifying by the server according to the sequence of attribution information, identity information and time information, classifying all information in real time according to the attribution information and the identity information, and storing the classified information in a database;
s4: financial data sharing: a user sends a sharing demand to a server after verifying login information, the server searches a database after learning the demand, traversal is carried out according to data of attribution, identity and time during searching, and sharing is carried out through an encryption protocol after the data required to be shared are obtained;
s5: encrypting financial data: encrypting data information to be shared at the head part, and then carrying out digital signature at the head part;
s6: and (3) financial data viewing: the user firstly verifies the digital signature after obtaining the shared financial data, then decrypts the shared financial data through a decryptor built in the terminal after verification, the user can check the required financial data after decryption is successful, and the server can verify the login information of the user in real time in the process.
2. The method of claim 1, wherein the method comprises: the time information is accurate to millisecond, and the time information is collected and calibrated through real-time networking.
3. The method of claim 1, wherein the method comprises: the encryption protocol is an SSL protocol.
4. The method of claim 1, wherein the method comprises: the home location information includes information of four levels of province, city, prefecture and town, and includes positioning information of a company address and a personal address.
5. The method of claim 1, wherein the method comprises: the user needs to log in through the terminal, the login terminal mainly comprises a mobile phone and a computer, wherein the mobile phone adopts a client to log in, and a digital certificate is built in the client.
6. The method according to claim 5, wherein the method comprises the following steps: a user adopts a browser when logging in through a computer, the browser needs to additionally download a digital certificate before login verification is carried out, and the browser is restarted after the digital certificate is installed.
7. The method of claim 1, wherein the method comprises: the encryption algorithm is an RSA encryption algorithm.
8. The method of claim 1, wherein the method comprises: the database adopts RAID 0 to perform real-time backup, and the server adopts dual-computer hot backup.
9. The method of claim 1, wherein the method comprises: the server is provided with an api interface for programming by an administrator, and digital signatures and encryption algorithms can be upgraded uniformly through the api interface.
CN202210251873.4A 2022-03-15 2022-03-15 Digital financial data sharing method Pending CN114598696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210251873.4A CN114598696A (en) 2022-03-15 2022-03-15 Digital financial data sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210251873.4A CN114598696A (en) 2022-03-15 2022-03-15 Digital financial data sharing method

Publications (1)

Publication Number Publication Date
CN114598696A true CN114598696A (en) 2022-06-07

Family

ID=81809197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210251873.4A Pending CN114598696A (en) 2022-03-15 2022-03-15 Digital financial data sharing method

Country Status (1)

Country Link
CN (1) CN114598696A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180129782A1 (en) * 2016-11-09 2018-05-10 General Electric Company System and method for saving medical imaging data
CN111625568A (en) * 2020-05-22 2020-09-04 珠海玖零科技有限公司 Big data statistics collection algorithm
CN112231334A (en) * 2020-10-06 2021-01-15 辽宁便利电科技有限公司 Intelligent analysis system and method based on data storage application
CN112291063A (en) * 2020-11-03 2021-01-29 西安万像电子科技有限公司 Image data transmission method and device and image data receiving method and device
CN113535859A (en) * 2021-05-31 2021-10-22 贵州艾特信安科技有限公司 Data collection and analysis system based on private cloud computing platform
CN113742745A (en) * 2021-08-26 2021-12-03 安徽银杰信息科技有限公司 Audit process evidence obtaining link management system and management method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180129782A1 (en) * 2016-11-09 2018-05-10 General Electric Company System and method for saving medical imaging data
CN111625568A (en) * 2020-05-22 2020-09-04 珠海玖零科技有限公司 Big data statistics collection algorithm
CN112231334A (en) * 2020-10-06 2021-01-15 辽宁便利电科技有限公司 Intelligent analysis system and method based on data storage application
CN112291063A (en) * 2020-11-03 2021-01-29 西安万像电子科技有限公司 Image data transmission method and device and image data receiving method and device
CN113535859A (en) * 2021-05-31 2021-10-22 贵州艾特信安科技有限公司 Data collection and analysis system based on private cloud computing platform
CN113742745A (en) * 2021-08-26 2021-12-03 安徽银杰信息科技有限公司 Audit process evidence obtaining link management system and management method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王希龙;: "金融数据采集与分析系统设计研究", 数字通信世界, no. 09, 1 September 2018 (2018-09-01) *

Similar Documents

Publication Publication Date Title
JP7090800B2 (en) Distributed document and entity validation engine
US8856937B1 (en) Methods and systems for identifying fraudulent websites
US20170140386A1 (en) Transaction assessment and/or authentication
US10754634B1 (en) Customized application package with context specific token
US20200159847A1 (en) Contribution of multiparty data aggregation using distributed ledger technology
KR101948721B1 (en) Method and apparatus for examining forgery of file by using file hash value
US9479338B2 (en) Method and system for certificate discovery and ranking certificate authorities
WO2016165536A1 (en) Identity verification method and device
JP4964338B2 (en) User confirmation apparatus, method and program
US10523699B1 (en) Privilege escalation vulnerability detection using message digest differentiation
US10484372B1 (en) Automatic replacement of passwords with secure claims
US20110276804A1 (en) Server authentication method and client terminal
US20170300708A1 (en) Metrics authorization based on a certificate
US20090328142A1 (en) Systems and Methods for Webpage Verification Using Data-Hiding Technology
EP3241137B1 (en) Method carried out in an identity document and corresponding identity document
WO2019114246A1 (en) Identity authentication method, server and client device
CN108028843A (en) Passive type web application firewalls
WO2012064566A1 (en) Methods for identifying the guarantor of an application
RU2638779C1 (en) Method and server for executing authorization of application on electronic device
US9860230B1 (en) Systems and methods for digitally signing executables with reputation information
CN114598696A (en) Digital financial data sharing method
CN115297104B (en) File uploading method and device, electronic equipment and storage medium
CN110995454A (en) Service verification method and system
US10003464B1 (en) Biometric identification system and associated methods
US20080228900A1 (en) Method and system for facilitating the transfer of a computer file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination