CN114722416A - Encryption-based financial informatization data processing method and system - Google Patents

Encryption-based financial informatization data processing method and system Download PDF

Info

Publication number
CN114722416A
CN114722416A CN202210643089.8A CN202210643089A CN114722416A CN 114722416 A CN114722416 A CN 114722416A CN 202210643089 A CN202210643089 A CN 202210643089A CN 114722416 A CN114722416 A CN 114722416A
Authority
CN
China
Prior art keywords
financial
file
position code
block
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210643089.8A
Other languages
Chinese (zh)
Other versions
CN114722416B (en
Inventor
唐雨菲
李立辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Normal University
Original Assignee
Hunan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Normal University filed Critical Hunan Normal University
Priority to CN202210643089.8A priority Critical patent/CN114722416B/en
Publication of CN114722416A publication Critical patent/CN114722416A/en
Application granted granted Critical
Publication of CN114722416B publication Critical patent/CN114722416B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a financial informatization data processing method and system based on encryption, wherein the method comprises the following steps: the key module traverses the file content corresponding to each position of the financial file and extracts keywords related to the financial file from the file content; inputting the position codes and the keyword set as input data into a secret level division model in a secret key module so as to output secret levels corresponding to the position codes; the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets each block with the security level as an unreadable block; setting a file key for the financial file; when the user input secret key is consistent with the file secret key, identifying the secret level corresponding to the user authority; and adjusting the block state with the security level in the financial file to be a readable block according to the security level corresponding to the user authority. The invention is beneficial to solving the problem that all the personnel knowing the universal secret key in the existing financial file system can check all the financial files at will.

Description

Financial informatization data processing method and system based on encryption
Technical Field
The invention relates to the technical field of data processing, in particular to a financial informatization data processing method based on encryption and a financial informatization data processing system based on encryption.
Background
The financial document belongs to the internal confidential document of the enterprise, and once the internal financial document of the enterprise is divulged, the result that the enterprise can not estimate is usually brought to the enterprise. Due to the reasons of business vicious competition and the like, part of practitioners can sell the enterprise financial documents to competitors or copy, utilize, spread and distribute the enterprise financial documents at will, immeasurable loss is brought to the enterprise, and the enterprise encrypts the financial documents to prevent the internal confidential documents of the enterprise from being divulged, so that the enterprise financial documents are necessary to be encrypted.
The financial file encryption is generally performed by manually setting a secret key through an encryption function of the file, the encryption process is not complex, but is tedious, and the secret key needs to be manually set every time a new financial file is generated. In addition, in the process of manually setting the key, a general key is often set, that is, a general key is adopted for all encrypted files. The manual encryption mode not only needs to manually set the secret key, but also has the defect that all financial documents can only set the general secret key, so that all personnel knowing the general secret key can randomly check all financial documents.
Disclosure of Invention
The invention mainly aims to provide an encryption-based financial informatization data processing method, and aims to solve the problem that all persons knowing a general secret key in the conventional financial file system can view all financial files at will.
In order to achieve the purpose, the financial informatization data processing method based on encryption adopts an encryption system to encrypt financial files; the encryption system comprises a secret key module and a financial module in signal connection with the secret key module; the method comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document content of each position in the financial documents by adopting a position code through the secret key module, and traversing the document content corresponding to each position code by the secret key module to extract keywords related to the financial documents;
storing each keyword corresponding to the same position code into the same keyword set;
inputting a position code corresponding to the file content of each position in the financial file and a corresponding keyword set as input data into a secret level division model in the secret key module, and outputting a secret level corresponding to each position code through the secret level division model;
the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets each block with the security level as an unreadable block;
setting a file key for the financial file;
judging whether an input secret key input by a user to the financial file is consistent with the file secret key or not;
and when the security levels are consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state.
Preferably, the method further comprises:
establishing a neural network model;
and taking a preset keyword as input data, taking the security classification corresponding to the preset keyword as output data, and bringing the security classification into the security classification model for training to obtain a trained security classification model.
Preferably, the encryption system further comprises a group of decryption terminals in a set sequence, and the decryption terminals are in signal connection with the key module; when the security level is consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state, wherein the method further comprises the following steps:
displaying a key input window in the unreadable block;
when a key input window of the block is clicked, sending a decryption instruction of the block to the key module;
the secret key module determines a plurality of decryption terminals to form a decryption terminal set according to the secret level corresponding to the block, and sends a secret key segment to each decryption terminal in the decryption terminal set, wherein the secret key segments received by each decryption terminal are spliced in sequence according to the decryption terminals to obtain the decryption secret key of the block;
when the decryption key is detected to be input into the key input window, the block is adjusted to be a readable block.
Preferably, the key module is provided with different key pools; the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and the step of sending a key segment to each decryption terminal in the decryption terminal set includes:
the secret key module determines a plurality of decryption terminals according to the secret level corresponding to the block to form a decryption terminal set;
randomly establishing a corresponding relation between each decryption terminal in the decryption terminal set and the secret key pool, wherein the secret key pools corresponding to each decryption terminal in each decryption terminal set are different;
and extracting a key segment from the key pool which is established with the corresponding relation by the decryption terminal, and sending the key segment to the corresponding decryption terminal.
Preferably, the key module is connected to a plurality of financial modules, each financial module being associated with a set of dedicated decryption terminals.
Preferably, the step of the financial module dividing the financial file into blocks of different security levels according to the security level corresponding to each location code is as follows:
Figure 798182DEST_PATH_IMAGE001
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;
Figure 654142DEST_PATH_IMAGE002
the security level corresponding to the file content with the position code of i;
Figure 351840DEST_PATH_IMAGE003
security classification corresponding to file content with position code of i +1(ii) a j is the serial number of the block set, j begins to take a value from 1, and j is a positive integer;
Figure 711277DEST_PATH_IMAGE004
representing the file content with the position code i;
Figure 101807DEST_PATH_IMAGE005
representing the file content with the position code of i + 1;
Figure 976222DEST_PATH_IMAGE006
is the jth block set;
Figure 352977DEST_PATH_IMAGE007
is the j +1 block set;
Figure 629237DEST_PATH_IMAGE008
indicating that the content of a file with a position code of i is added to a block set
Figure 692134DEST_PATH_IMAGE006
Figure 991528DEST_PATH_IMAGE009
Indicating that the file content with the position code of i +1 is added to the block set
Figure 296607DEST_PATH_IMAGE006
Figure 630637DEST_PATH_IMAGE010
Indicating that the file content with the position code of i +1 is added to the block set
Figure 362969DEST_PATH_IMAGE011
And dividing the financial file into blocks with different security levels according to the block set in which the content of each file is positioned.
Preferably, the step of storing each keyword corresponding to the same position code into the same keyword set specifically includes:
Figure 415239DEST_PATH_IMAGE012
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;
Figure 930534DEST_PATH_IMAGE013
a keyword set corresponding to the content of the file with the position code i,
Figure 509283DEST_PATH_IMAGE014
the mth keyword in the content of the file whose position code is i,
Figure 22304DEST_PATH_IMAGE015
Figure 358607DEST_PATH_IMAGE016
the total number of the keywords corresponding to the file content with the position code of i;
the step of inputting the position code corresponding to the file content of each position in the financial file and the corresponding key phrase as input data into the secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model specifically comprises:
Figure 241375DEST_PATH_IMAGE018
wherein the content of the first and second substances,
Figure 549996DEST_PATH_IMAGE019
in order to implement the classified classification model,
Figure 624132DEST_PATH_IMAGE002
the file content with the position code of i corresponds to the security level.
Preferably, when the financial module newly adds a financial document, distinguishing, by the key module, document contents at each position in the financial document by using a position code, and before the step of traversing the document contents corresponding to each position code by the key module to extract keywords related to financial, the method includes:
establishing a financial keyword database
Figure 385414DEST_PATH_IMAGE020
Wherein, in the step (A),
Figure 835987DEST_PATH_IMAGE021
for the nth financial keyword in the financial keyword database,
Figure 795853DEST_PATH_IMAGE022
n is a positive integer, and N is the total number of the financial keywords in the financial keyword database;
when the financial module newly-increases financial documents, the file content of each position in the financial documents is distinguished by adopting the position codes through the secret key module, and the secret key module traverses the file content corresponding to each position code to extract keywords related to financial affairs, which specifically comprises the following steps:
when the financial module newly adds a financial file, distinguishing the file content of each position in the financial file by adopting a position code through the secret key module;
performing semantic segmentation on words in the financial document to obtain a word group set to be searched of the document content with the position code of i
Figure 650676DEST_PATH_IMAGE023
(ii) a Wherein the content of the first and second substances,
Figure 289468DEST_PATH_IMAGE024
the q-th key word in the phrase set to be searched in the file content with the position code of i,
Figure 950257DEST_PATH_IMAGE025
Figure 702312DEST_PATH_IMAGE026
is a position code ofi, the total number of key words in the phrase set to be searched of the file content;
Figure 885294DEST_PATH_IMAGE027
wherein, the first and the second end of the pipe are connected with each other,
Figure 417906DEST_PATH_IMAGE028
representing a keyword set corresponding to the file content with the position code i, wherein i starts to take a value from 1, and i is a positive integer,
Figure 85648DEST_PATH_IMAGE029
show that
Figure 816844DEST_PATH_IMAGE024
Adding to a set of keywords
Figure 341366DEST_PATH_IMAGE028
Figure 298958DEST_PATH_IMAGE030
Indicate that it is not
Figure 301549DEST_PATH_IMAGE024
Added to the keyword set Ai
Preferably, the step of extracting the keywords related to finance from the document content comprises:
setting a plurality of non-crossed keyword word number intervals, wherein each keyword word number interval corresponds to a keyword database with relevant keywords which are not coincident; the method comprises the steps that keywords contained in different keyword databases are not repeated, and the word number of the keyword in the keyword database corresponding to each keyword word number interval belongs to the keyword word number interval;
determining the size of a screening window selected in each round of extraction according to the sequence of the word number intervals of the keywords from large to small, and determining a keyword database selected in each round of extraction; wherein, the size of the screening window selected in each round of extraction refers to that the number of scanned words is equal to the upper limit of the word number interval of the keywords in the round;
during each round of extraction, scanning the file content through the selected screening window, and comparing the scanned information with the keywords in the keyword database selected in the round so as to extract the financial keywords of the file content;
and after each round of extraction is finished, removing the extracted keywords from the file contents to form new file contents serving as the file contents of the next round of extraction.
In order to achieve the above object, the present invention further provides an encryption-based financial information data processing system, which applies any one of the encryption-based financial information data processing methods described above to encrypt a financial document; the encryption system comprises a key module and a financial module in signal connection with the key module.
In the technical scheme of the invention, an encryption system is adopted to encrypt the financial file; extracting keywords from the file content of each position of the financial file, inputting a security classification model, and determining the security of the file content of each position in the financial file according to the security of the keywords of each position; then, the financial document is divided into different security blocks according to the security levels of different positions of the financial document; further, setting all file contents of the financial file to be in an unreadable state; then, the invention automatically endows the financial document with a file secret key for encryption, and the file secret key can generally adopt a universal secret key set by a user, so that personnel who do not have authority to acquire the file secret key can not check any financial document; furthermore, a person who can input a file secret key can adjust the block with the corresponding secret level to a readable block by identifying the secret level corresponding to the user authority, and keep the block with the non-corresponding secret level in the financial file in an unreadable state. Therefore, according to the technical scheme, the security level of the content of each file in the financial file can be automatically identified in a key word extracting mode, the financial file is subjected to security level segmentation, and personnel mastering a file key can be prevented from seeing all the confidential contents of the financial file; furthermore, the invention also identifies the security authority of the personnel who master the secret key of the file, automatically adjusts the file content with the security conformity to a readable block so as to be convenient for the user to check, and the file content with the non-conformity of the security in the financial file is not displayed to the user. Moreover, through the technical scheme of the invention, a user does not need to set a password when uploading financial files, only the financial files are stored in the financial module, the system automatically identifies the security level of each file content in the newly-added financial files, and sets a universal file secret key for encryption processing, and simultaneously, only the file content with the consistent security level can be displayed to a user with authority, but the file content with the inconsistent security level is not displayed to the user without the authority, so that the problem that all financial files can be randomly checked by all personnel knowing the universal secret key in the conventional financial file system is solved.
Drawings
FIG. 1 is a flowchart illustrating an embodiment of an encryption-based financial information data processing method according to the present invention.
The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "unit", "means", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "unit", "means" or "unit" may be used mixedly.
Referring to fig. 1, to achieve the above object, a first embodiment of the present invention provides an encryption-based financial information data processing method, which uses an encryption system to encrypt a financial document; the encryption system comprises a secret key module and a financial module in signal connection with the secret key module; the method comprises the following steps:
step S10, when the financial module adds a new financial document, the key module distinguishes the document content of each position in the financial document by adopting a position code, and the key module traverses the document content corresponding to each position code to extract keywords related to finance; extracting keywords relevant to finance from the file content, and screening the finance content to remove irrelevant file content;
step S20, storing each keyword corresponding to the same position code into the same keyword set;
step S30, inputting the position code corresponding to the file content of each position in the financial file and the corresponding keyword set as input data into a secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model;
step S40, the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets the blocks with each security level as unreadable blocks;
step S50, setting a file key for the financial file;
step S60, judging whether the input secret key input by the user to the financial document is consistent with the document secret key;
and step S70, when the security levels are consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state.
In the technical scheme of the invention, an encryption system is adopted to encrypt the financial file; extracting keywords from the file content of each position of the financial file, inputting a security classification model, and determining the security of the file content of each position in the financial file according to the security of the keywords of each position; then, the financial document is divided into different security blocks according to the security levels of different positions of the financial document; further, setting all file contents of the financial file to be in an unreadable state; then, the invention automatically endows the financial document with a file secret key for encryption, and the file secret key can generally adopt a universal secret key set by a user, so that personnel who do not have authority to acquire the file secret key can not check any financial document; furthermore, a person who can input a file secret key can adjust the block with the corresponding secret level to a readable block by identifying the secret level corresponding to the user authority, and keep the block with the non-corresponding secret level in the financial file in an unreadable state. Therefore, according to the technical scheme, the security level of the content of each file in the financial file can be automatically identified in a key word extracting mode, the financial file is subjected to security level segmentation, and personnel mastering a file key can be prevented from seeing all the confidential contents of the financial file; furthermore, the invention also identifies the security authority of the personnel who master the secret key of the file, automatically adjusts the file content with the security conformity to a readable block so as to be convenient for the user to check, and the file content with the non-conformity of the security in the financial file is not displayed to the user. Moreover, according to the technical scheme of the invention, a user does not need to set a password when uploading financial files, only the financial files are stored in the financial module, the system automatically identifies the security level of each file content in the newly added financial files, and sets a universal file secret key for encryption processing, and simultaneously only the file contents with the security level coincidence can be displayed to users with authority, while the file contents with the security level non-coincidence are not displayed to users without authority, so that the problem that all the financial files can be randomly checked by all the personnel knowing the universal secret key in the existing financial file system is solved.
In particular, the financial document may be a financial statement (such as a profit statement) exported from financial software, a consolidated reimbursement document, or a newly created financial system, and the type of the financial document is not limited herein. The newly added financial file may include one or more financial files, and when the newly added financial file is a plurality of financial files, the newly added financial file may be a folder or a file compression package containing the plurality of financial files, and the content of the financial file contained in each file is generally different, so that each time the newly added financial file is stored in the financial module, the security level corresponding to each position of the newly added financial file needs to be determined, and encryption and processing of reading authority need to be performed.
The financial module is a financial file storage module, and in a specific application, a designated storage area of the user side can be set as the financial module, for example, a financial folder in a D disk of the user side is designated as the financial module.
The key module can be a shared module shared by the plurality of financial modules or an independent module dedicated to the designated financial module, and when the key module is set as the shared module, the key module can be set in the cloud server, and at the moment, the key module is in communication connection with the plurality of financial modules.
Specifically, in step S70, there are various ways to identify the security level corresponding to the user authority, for example, by face recognition, fingerprint recognition, password identification with input authority, and so on.
In an embodiment, when extracting the finance-related keywords from the document content, the method may specifically be:
setting a plurality of non-crossed keyword number intervals, wherein each keyword number interval corresponds to a keyword database with non-coincident related keywords; wherein, the keywords contained in different keyword databases are not repeated; the word number of the keyword in the keyword database corresponding to each keyword word number interval belongs to the keyword word number interval;
determining the size of a screening window selected in each round of extraction according to the sequence of the word number intervals of the keywords from large to small, and determining a keyword database selected in each round of extraction; wherein, the size of the screening window selected in each round of extraction refers to that the number of scanned words is equal to the upper limit of the word number interval of the keywords in the round;
during each round of extraction, scanning the file content through the selected screening window, and comparing the scanned information with the keywords in the keyword database selected in the round so as to extract the financial keywords of the file content;
and after each round of extraction is finished, removing the extracted keywords from the file contents to form new file contents serving as the file contents of the next round of extraction.
And after the extraction of the keywords of all rounds is finished, combining all the extracted keywords to form a keyword set.
For example, three keyword word number intervals are set: the number of words in the first keyword word number interval is (10, 14) corresponding to the first keyword database, the number of words in the second keyword word number interval is (6, 10) corresponding to the second keyword database, the number of words in the third keyword word number interval is (0, 6) corresponding to the third keyword database;
since three keyword number intervals are set, three times of keyword extraction needs to be performed on the file content. During the first round of keyword extraction, taking the upper limit 14 of the word number interval of the first keyword as the size of a screening window; when extracting the second round of keywords, taking the upper limit 10 of the word number interval of the second keyword as the size of a screening window; and in the third round of keyword extraction, taking the upper limit 6 of the number of words in the third keyword number interval as the size of the screening window.
Based on the first embodiment of the encryption-based financial information data processing method of the present invention, in the second embodiment of the encryption-based financial information data processing method of the present invention, the method further includes:
step S80, establishing a neural network model;
and step S90, taking the preset keywords as input data, taking the security classification corresponding to the preset keywords as output data, and taking the security classification into the security classification model for training to obtain a trained security classification model.
Specifically, the classified classification model is
Figure 418409DEST_PATH_IMAGE031
i starts from 1 and is a positive integer,
Figure 51516DEST_PATH_IMAGE014
the mth keyword in the content of the file whose position code is i,
Figure 293141DEST_PATH_IMAGE015
Figure 161740DEST_PATH_IMAGE016
the total number of the keywords corresponding to the keyword corresponding to the file content with the position code of i.
When selecting a keyword as input data, it is necessary to fully consider the synonyms and synonyms of the keyword.
Based on the first embodiment or the second embodiment of the encryption-based financial information data processing method of the present invention, in a third embodiment of the encryption-based financial information data processing method of the present invention, the encryption system further includes a set of decryption terminals having a set order, the decryption terminals being in signal connection with the key module; when the security level is consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state, wherein the method further comprises the following steps:
step S100, displaying a key input window in the unreadable block; specifically, the file content corresponding to the block is directly displayed in the readable block so as to be convenient for a user to look up; the unreadable block is set to an inaccessible state, and when the user clicks the unreadable block, a key input window is displayed.
Step S110, when the key input window of the block is clicked, sending a decryption instruction of the block to the key module; specifically, when the key input window is clicked, the decryption instruction of the block is sent to the key module, so as to ensure that the decryption key of the unreadable block is randomly generated, rather than preset, because the preset key is often easily leaked, and the financial data is in an unsafe state where the financial data is easily stolen.
Step S120, the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and sends a key segment to each decryption terminal in the decryption terminal set, wherein the key segments received by each decryption terminal are sequentially spliced according to the decryption terminals to obtain the decryption keys of the block; in the step of determining that a plurality of decryption terminals form a decryption terminal set, the plurality of decryption terminals refer to at least two decryption terminals, and the number of the plurality of decryption terminals can be determined according to the security level of the block. For example, when the security level is low, two decryption terminals may be determined, and when the security level is high, a larger number of decryption terminals may be determined.
The plurality of decryption terminals respectively receive the key segments and splice the key segments into decryption keys, and the security of the keys is improved. For example, even if the key segment of one of the key terminals is intercepted, the decryption key composed of the key segments of the key terminals cannot be decrypted.
Further, the decryption key is sent to the user terminal, specifically, each decryption terminal has a preset sequence code, each decryption terminal in the decryption terminal set is controlled to send the password segment to the associated user terminal according to the sequence code of each decryption terminal in the decryption terminal set, and the corresponding password segment is spliced in the user terminal, so that the decryption key can be obtained. In order to avoid wrong splicing sequence of the password segments, the sequence of each password segment is synchronously transmitted when the password segments are transmitted to the user terminal. So that the user can splice the password segments by himself according to the sequence of the password segments.
In step S130, when it is detected that the decryption key is input into the key input window, the block is adjusted to be a readable block.
Further, the secret key module is connected with a plurality of financial modules, and each financial module can establish a fixed corresponding relationship or a random corresponding relationship with the decryption terminal. In this embodiment, each financial module is associated with a set of dedicated decryption terminals. And the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and sequentially determines a sufficient number of decryption terminals according to the required number of the decryption terminals and the sequence codes of the decryption terminals. For example, a group of decryption terminals associated with the financial module a includes the decryption terminals 1 to 7, and when 3 decryption terminals are required for the security level corresponding to the block, the decryption terminals 1 to 3 may form a decryption terminal set according to the sequence codes of the decryption terminals.
Based on the third embodiment of the encryption-based financial information data processing method of the present invention, in the fourth embodiment of the encryption-based financial information data processing method of the present invention, the key module is provided with different key pools; the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and sends a key segment to each decryption terminal in the decryption terminal set, wherein the key segment includes:
step S121, the secret key module determines a plurality of decryption terminals according to the secret level corresponding to the block to form a decryption terminal set;
step S122, randomly establishing a correspondence between each decryption terminal in the decryption terminal set and the key pool, where the key pools corresponding to each decryption terminal in each decryption terminal set are different;
step S123, extracting a key segment from the key pool in which the corresponding relationship is established between the decryption terminals, and sending the key segment to the corresponding decryption terminal.
In this embodiment, each key segment is from a pool of keys. The key pool is pre-stored with a plurality of key segments, and the corresponding relationship between each decryption terminal in the decryption terminal set and the key pool is randomly established, so that the possibility of decryption key combinations formed by each key segment is higher, the difficulty of decryption key cracking is improved, and the confidentiality of financial documents is stronger.
Based on the first to fourth embodiments of the encryption-based financial information data processing method according to the present invention, in a fifth embodiment of the encryption-based financial information data processing method according to the present invention, the step of dividing the financial file into blocks with different security levels according to the security level corresponding to each position code by the financial module specifically includes:
Figure 70790DEST_PATH_IMAGE032
(1);
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;
Figure 874798DEST_PATH_IMAGE002
the security level corresponding to the file content with the position code of i;
Figure 433081DEST_PATH_IMAGE003
the security classification is the security classification corresponding to the file content with the position code of i + 1; j is the serial number of the block set, j begins to take a value from 1, and j is a positive integer;
Figure 777475DEST_PATH_IMAGE004
representing the file content with the position code i;
Figure 478714DEST_PATH_IMAGE005
representing the file content with the position code of i + 1;
Figure 250361DEST_PATH_IMAGE033
is the jth block set;
Figure 60054DEST_PATH_IMAGE007
is the j +1 block set;
Figure 145822DEST_PATH_IMAGE034
indicating that the content of a file with a position code of i is added to a block set
Figure 763885DEST_PATH_IMAGE033
Figure 34330DEST_PATH_IMAGE035
Indicating that the file content with the position code of i +1 is added to the block set
Figure 737843DEST_PATH_IMAGE033
Figure 627302DEST_PATH_IMAGE036
Indicating that the content of a file with a position code of i +1 is added to a block set
Figure 427768DEST_PATH_IMAGE037
And dividing the financial file into blocks with different security levels according to the block set in which the content of each file is positioned.
The function of formula (1) in this example is:
when in use
Figure 541217DEST_PATH_IMAGE038
Then, the file content with the position code of i
Figure 669710DEST_PATH_IMAGE004
Is determined as the file content with the position code of i +1
Figure 988958DEST_PATH_IMAGE039
The block set number of (2);
when in use
Figure 581614DEST_PATH_IMAGE040
Then, the file content with the position code of i
Figure 334806DEST_PATH_IMAGE004
Is incremented by 1, and is determined as the file content with the position code of i +1
Figure 75229DEST_PATH_IMAGE005
The block set number of (2).
The specific application refers to the following cases:
specifically, i starts from 1, j starts from 1,
Figure 103228DEST_PATH_IMAGE034
i.e. the content of the file with position code 1
Figure 488073DEST_PATH_IMAGE004
Adding to a set of blocks
Figure 536800DEST_PATH_IMAGE041
The first embodiment is as follows:
when i takes 1: file content if position code is 1
Figure 702202DEST_PATH_IMAGE004
Corresponding secret level
Figure 471575DEST_PATH_IMAGE042
File content equal to position code 2
Figure 101140DEST_PATH_IMAGE043
Corresponding secret level
Figure 992872DEST_PATH_IMAGE044
And the file content with the position code of 1
Figure 583254DEST_PATH_IMAGE004
Has been added to the block set
Figure 953055DEST_PATH_IMAGE041
Then, the file content with the position code of 2 is set
Figure 938591DEST_PATH_IMAGE043
Is also added to the block set
Figure 204487DEST_PATH_IMAGE041
When i takes 2, if the position code is 2 file content
Figure 78902DEST_PATH_IMAGE043
Corresponding secret level
Figure 580291DEST_PATH_IMAGE044
File content equal to position code 3
Figure 856551DEST_PATH_IMAGE045
Corresponding secret level
Figure 27770DEST_PATH_IMAGE046
And the position code is 2
Figure 389481DEST_PATH_IMAGE043
Has been added to the block set
Figure 428981DEST_PATH_IMAGE041
Then, the file content with the position code of 3 is coded
Figure 763010DEST_PATH_IMAGE045
Is also added to the block set
Figure 167447DEST_PATH_IMAGE041
Example two:
when i takes 1: file content if position code is 1
Figure 78771DEST_PATH_IMAGE047
Corresponding secret level
Figure 797328DEST_PATH_IMAGE042
File content equal to position code 2
Figure 48181DEST_PATH_IMAGE043
Corresponding secret level
Figure 175582DEST_PATH_IMAGE044
And the position code is 1
Figure 511885DEST_PATH_IMAGE047
Has been added to the block set
Figure 768554DEST_PATH_IMAGE041
Then, the file content with the position code of 2 is set
Figure 873914DEST_PATH_IMAGE043
Is also added to the block set
Figure 948049DEST_PATH_IMAGE041
When i takes 2, if the position code is 2 file content
Figure 443752DEST_PATH_IMAGE043
Corresponding secret level
Figure 566429DEST_PATH_IMAGE044
File content not equal to position code 3
Figure 588612DEST_PATH_IMAGE045
Corresponding secret level
Figure 505752DEST_PATH_IMAGE046
And the position code is 2
Figure 754331DEST_PATH_IMAGE043
Has been added to the block set
Figure 743016DEST_PATH_IMAGE041
Then, the file content with the position code of 3 is coded
Figure 557388DEST_PATH_IMAGE045
Adding to a set of blocks
Figure 848692DEST_PATH_IMAGE048
Example three:
when i takes 1: file content with position code 1
Figure 381304DEST_PATH_IMAGE047
Corresponding secret level
Figure 143986DEST_PATH_IMAGE042
File content not equal to position code 2
Figure 281707DEST_PATH_IMAGE043
Corresponding secret level
Figure 806229DEST_PATH_IMAGE049
And the position code is 1
Figure 622875DEST_PATH_IMAGE047
Has been added to the block set
Figure 891045DEST_PATH_IMAGE041
Then, the file content with the position code of 2 is set
Figure 617693DEST_PATH_IMAGE043
Adding to a set of blocks
Figure 375433DEST_PATH_IMAGE048
When i takes 2, if the position code is 2 file content
Figure 882638DEST_PATH_IMAGE043
Corresponding secret level
Figure 626603DEST_PATH_IMAGE049
File content not equal to position code 3
Figure 270074DEST_PATH_IMAGE045
Corresponding secret level
Figure 198716DEST_PATH_IMAGE050
And the position code is 2
Figure 927637DEST_PATH_IMAGE043
Has been added to the block set
Figure 475293DEST_PATH_IMAGE048
Then, the file content with the position code of 3 is coded
Figure 68211DEST_PATH_IMAGE045
Is added to the block set
Figure 839858DEST_PATH_IMAGE051
Based on the first to fifth embodiments of the encryption-based financial information data processing method according to the present invention, in a sixth embodiment of the encryption-based financial information data processing method according to the present invention, the step of storing the keywords corresponding to the same position code into the same keyword set specifically includes:
Figure 259338DEST_PATH_IMAGE052
(2);
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;
Figure 407423DEST_PATH_IMAGE053
a set of keywords corresponding to the content of the file with the position code i,
Figure 87803DEST_PATH_IMAGE054
the mth keyword in the content of the file whose position code is i,
Figure 233613DEST_PATH_IMAGE055
Figure 937127DEST_PATH_IMAGE056
the total number of the keywords corresponding to the file content with the position code of i;
the step of inputting the position code corresponding to the file content of each position in the financial file and the corresponding key phrase as input data into the secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model specifically comprises:
Figure 216799DEST_PATH_IMAGE057
(3);
wherein the content of the first and second substances,
Figure 627051DEST_PATH_IMAGE058
in order to implement the classified classification model,
Figure 333976DEST_PATH_IMAGE002
the file content with the position code of i corresponds to the security level.
Therefore, as can be seen from equation (3), the security level corresponding to the content of the file whose position code is i is determined based on the highest security level among the keywords in the position code i.
Based on the first to sixth embodiments of the encryption-based financial information data processing method according to the present invention, in a seventh embodiment of the encryption-based financial information data processing method according to the present invention, when a financial module adds a new financial document, the document content at each position in the financial document is distinguished by using a position code through the key module, and before the step of traversing the document content corresponding to each position code by the key module to extract the keywords related to the financial affairs, the method includes:
establishing a financial keyword database
Figure 524786DEST_PATH_IMAGE059
Wherein, in the step (A),
Figure 952356DEST_PATH_IMAGE060
for the nth financial keyword in the financial keyword database,
Figure 545012DEST_PATH_IMAGE061
n is a positive integer, and N is the total number of the financial keywords in the financial keyword database;
when the financial module newly-increases financial documents, the file content of each position in the financial documents is distinguished by adopting the position codes through the secret key module, and the secret key module traverses the file content corresponding to each position code to extract keywords related to financial affairs, which specifically comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document contents of each position in the financial documents by adopting position codes through the secret key module;
performing semantic segmentation on words in the financial document to obtain a word group set to be searched of the document content with the position code of i
Figure 924303DEST_PATH_IMAGE062
(ii) a Wherein, the first and the second end of the pipe are connected with each other,
Figure 274513DEST_PATH_IMAGE063
the q-th key word in the phrase set to be searched in the file content with the position code of i,
Figure 568091DEST_PATH_IMAGE064
Figure 343149DEST_PATH_IMAGE065
the total number of key words in the phrase set to be searched of the file content with the position code of i;
Figure 1663DEST_PATH_IMAGE066
wherein the content of the first and second substances,
Figure 167065DEST_PATH_IMAGE053
representing a keyword set corresponding to the file content with the position code i, wherein i starts to take a value from 1, and i is a positive integer,
Figure 61072DEST_PATH_IMAGE067
show that
Figure 362740DEST_PATH_IMAGE068
Adding to a set of keywords
Figure 192156DEST_PATH_IMAGE053
Figure 579275DEST_PATH_IMAGE069
Indicate that it is not
Figure 542552DEST_PATH_IMAGE070
Adding to a set of keywords
Figure 901989DEST_PATH_IMAGE053
Wherein the close synonyms and synonyms of the keywords are fully considered in the financial keyword database B. When the position code is iTo-be-searched word group set
Figure 964623DEST_PATH_IMAGE071
In the case of multiple repetitions of the same financial keyword, each financial keyword needs to be added to the keyword set
Figure 402820DEST_PATH_IMAGE053
In order to achieve the above object, the present invention further provides an encryption-based financial information data processing system, which applies any one of the encryption-based financial information data processing methods described above to encrypt a financial document; the encryption system comprises a key module and a financial module in signal connection with the key module.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a computer-readable storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions for enabling a terminal device to enter the method according to the embodiments of the present invention.
In the description herein, references to the description of the term "an embodiment," "another embodiment," "other embodiments," or "first through Xth embodiments," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, method steps, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. The financial informatization data processing method based on encryption is characterized in that an encryption system is adopted to encrypt financial files; the encryption system comprises a secret key module and a financial module in signal connection with the secret key module; the method comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document content of each position in the financial documents by adopting a position code through the secret key module, and traversing the document content corresponding to each position code by the secret key module to extract keywords related to the financial documents;
storing each keyword corresponding to the same position code into the same keyword set;
inputting a position code corresponding to the file content of each position in the financial file and a corresponding keyword set as input data into a secret level division model in the secret key module, and outputting a secret level corresponding to each position code through the secret level division model;
the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets each block with the security level as an unreadable block;
setting a file key for the financial file;
judging whether an input secret key input by a user to the financial file is consistent with the file secret key or not;
and when the security levels are consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state.
2. The encryption-based financial informatization data processing method of claim 1, further comprising:
establishing a neural network model;
and taking a preset keyword as input data, taking the security classification corresponding to the preset keyword as output data, and bringing the security classification into the security classification model for training to obtain a trained security classification model.
3. An encryption-based financial informatization data processing method according to claim 1, wherein the encryption system further comprises a set of decryption terminals in a set order, the decryption terminals being in signal connection with the key module; after the steps of identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level conforming to the readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level not conforming to the readable block in the unreadable state, the method further comprises the following steps:
displaying a key input window in the unreadable block;
when a key input window of the block is clicked, sending a decryption instruction of the block to the key module;
the secret key module determines a plurality of decryption terminals to form a decryption terminal set according to the secret level corresponding to the block, and sends a secret key segment to each decryption terminal in the decryption terminal set, wherein the secret key segments received by each decryption terminal are spliced in sequence according to the decryption terminals to obtain the decryption secret key of the block;
when the decryption key is detected to be input into the key input window, the block is adjusted to be a readable block.
4. The encryption-based financial informatization data processing method of claim 3, wherein the key module is provided with different key pools; the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and the step of sending a key segment to each decryption terminal in the decryption terminal set includes:
the secret key module determines a plurality of decryption terminals according to the secret level corresponding to the block to form a decryption terminal set;
randomly establishing a corresponding relation between each decryption terminal in the decryption terminal set and the secret key pool, wherein the secret key pools corresponding to each decryption terminal in each decryption terminal set are different;
and extracting a key segment from the key pool of which the corresponding relation is established by the decryption terminal, and sending the key segment to the corresponding decryption terminal.
5. An encryption-based financial informationalized data processing method as defined in claim 1, wherein the key module is connected to a plurality of financial modules, each financial module being associated with a dedicated set of decryption terminals.
6. An encryption-based financial informationized data processing method according to any one of claims 1-5, wherein the financial module is configured to divide the financial file into blocks with different security levels according to the security level corresponding to each location code, and specifically:
Figure 49572DEST_PATH_IMAGE001
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;
Figure 638816DEST_PATH_IMAGE002
the secret level corresponding to the file content with the position code of i;
Figure 949712DEST_PATH_IMAGE003
the security level corresponding to the file content with the position code of i + 1; j is the serial number of the block set, j begins to take a value from 1, and j is a positive integer;
Figure 79342DEST_PATH_IMAGE004
representing the file content with the position code i;
Figure 565818DEST_PATH_IMAGE005
representing the file content with the position code of i + 1;
Figure 122702DEST_PATH_IMAGE006
is the jth block set;
Figure 186472DEST_PATH_IMAGE007
is the j +1 block set;
Figure 119793DEST_PATH_IMAGE008
indicating that the content of a file with a position code of i is added to a block set
Figure 696662DEST_PATH_IMAGE006
Figure 486763DEST_PATH_IMAGE009
Indicating that the file content with the position code of i +1 is added to the block set
Figure 975513DEST_PATH_IMAGE006
Figure 384629DEST_PATH_IMAGE010
Indicating that the file content with the position code of i +1 is added to the block set
Figure 439173DEST_PATH_IMAGE011
And dividing the financial file into blocks with different security levels according to the block set in which the content of each file is positioned.
7. An encryption-based financial informationized data processing method according to any one of claims 1-5, wherein the step of storing the keywords corresponding to the same position code in the same keyword set comprises:
Figure 603438DEST_PATH_IMAGE012
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;
Figure 517167DEST_PATH_IMAGE013
a keyword set corresponding to the content of the file with the position code i,
Figure 526711DEST_PATH_IMAGE014
the mth keyword in the content of the file whose position code is i,
Figure 701341DEST_PATH_IMAGE015
Figure 708611DEST_PATH_IMAGE016
the total number of the keywords corresponding to the file content with the position code of i;
the step of inputting the position code corresponding to the file content of each position in the financial file and the corresponding key phrase as input data into the secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model specifically comprises:
Figure 171953DEST_PATH_IMAGE018
wherein the content of the first and second substances,
Figure 47506DEST_PATH_IMAGE019
in order to classify the model in a secret class,
Figure 279904DEST_PATH_IMAGE002
the file content with the position code of i corresponds to the security level.
8. The financial information data processing method based on encryption according to any one of claims 1 to 5, wherein when the financial module adds a new financial document, the key module distinguishes the document content of each position in the financial document by using a position code, and before the step of traversing the document content corresponding to each position code by the key module to extract the keywords related to finance, the method comprises:
establishing a financial keyword database
Figure 956611DEST_PATH_IMAGE020
Wherein, in the step (A),
Figure 703987DEST_PATH_IMAGE021
for the nth financial keyword in the financial keyword database,
Figure 320913DEST_PATH_IMAGE022
n is a positive integer, and N is the total number of the financial keywords in the financial keyword database;
when the financial module newly-increases financial documents, the file content of each position in the financial documents is distinguished by adopting the position codes through the secret key module, and the secret key module traverses the file content corresponding to each position code to extract keywords related to financial affairs, which specifically comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document contents of each position in the financial documents by adopting position codes through the secret key module;
performing semantic segmentation on words in the financial file to obtain a word group set to be searched of the file content with the position code i
Figure 345501DEST_PATH_IMAGE024
(ii) a Wherein the content of the first and second substances,
Figure 22470DEST_PATH_IMAGE025
the q-th key word in the phrase set to be searched in the file content with the position code of i,
Figure 257142DEST_PATH_IMAGE026
Figure 84284DEST_PATH_IMAGE027
the total number of key words in the phrase set to be searched of the file content with the position code of i;
Figure 291274DEST_PATH_IMAGE028
wherein the content of the first and second substances,
Figure 201461DEST_PATH_IMAGE029
a keyword set corresponding to the file content with the position code of i is represented, i takes a value from 1, i is a positive integer,
Figure 861113DEST_PATH_IMAGE030
show that
Figure DEST_PATH_IMAGE031
Adding to a set of keywords
Figure 491945DEST_PATH_IMAGE029
Figure DEST_PATH_IMAGE033
Indicate that it is not
Figure 258169DEST_PATH_IMAGE031
Adding to a set of keywords
Figure 276941DEST_PATH_IMAGE029
9. The encryption-based financial informationized data processing method according to any one of claims 1-5, wherein the step of extracting financial-related keywords from the document contents comprises:
setting a plurality of non-crossed keyword number intervals, wherein each keyword number interval corresponds to a keyword database with non-coincident related keywords; the keywords contained in different keyword databases are not repeated, and the word number of the keyword in the keyword database corresponding to each keyword word number interval belongs to the keyword word number interval;
determining the size of a screening window selected in each round of extraction according to the sequence of the word number intervals of the keywords from large to small, and determining a keyword database selected in each round of extraction; wherein, the size of the screening window selected in each round of extraction refers to that the number of scanned words is equal to the upper limit of the word number interval of the keywords in the round;
during each round of extraction, scanning the file content through the selected screening window, and comparing the scanned information with the keywords in the keyword database selected in the round so as to extract the financial keywords of the file content;
and after each round of extraction is finished, removing the extracted keywords from the file contents to form new file contents serving as the file contents of the next round of extraction.
10. An encryption-based financial informatization data processing system, which is characterized in that the encryption-based financial informatization data processing method according to any one of claims 1 to 9 is applied to encrypt financial files; the encryption system comprises a key module and a financial module in signal connection with the key module.
CN202210643089.8A 2022-06-09 2022-06-09 Financial informatization data processing method and system based on encryption Active CN114722416B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210643089.8A CN114722416B (en) 2022-06-09 2022-06-09 Financial informatization data processing method and system based on encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210643089.8A CN114722416B (en) 2022-06-09 2022-06-09 Financial informatization data processing method and system based on encryption

Publications (2)

Publication Number Publication Date
CN114722416A true CN114722416A (en) 2022-07-08
CN114722416B CN114722416B (en) 2022-10-11

Family

ID=82232568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210643089.8A Active CN114722416B (en) 2022-06-09 2022-06-09 Financial informatization data processing method and system based on encryption

Country Status (1)

Country Link
CN (1) CN114722416B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115587393A (en) * 2022-08-17 2023-01-10 广州红海云计算股份有限公司 Distributed performance data processing method and device
CN115952530A (en) * 2023-03-15 2023-04-11 江西科技学院 Financial data processing method and system for improving confidentiality and computer

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034845A1 (en) * 2000-02-15 2001-10-25 Brunt George B. Secure web-based document control process and system
CN102819604A (en) * 2012-08-20 2012-12-12 徐亮 Method for retrieving confidential information of file and judging and marking security classification based on content correlation
CN110402440A (en) * 2017-02-27 2019-11-01 J·加斯屈埃尔 Segment key Verification System
US20190377889A1 (en) * 2017-02-10 2019-12-12 Michael Mertens Verifiable version control on authenticated and/or encrypted electronic documents
CN111079186A (en) * 2019-12-20 2020-04-28 百度在线网络技术(北京)有限公司 Data analysis method, device, equipment and storage medium
CN111368269A (en) * 2020-02-29 2020-07-03 杭州电子科技大学 Fine-grained access control method based on dense point labeling
CN113918973A (en) * 2021-10-14 2022-01-11 南京中孚信息技术有限公司 Secret mark detection method and device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034845A1 (en) * 2000-02-15 2001-10-25 Brunt George B. Secure web-based document control process and system
CN102819604A (en) * 2012-08-20 2012-12-12 徐亮 Method for retrieving confidential information of file and judging and marking security classification based on content correlation
US20190377889A1 (en) * 2017-02-10 2019-12-12 Michael Mertens Verifiable version control on authenticated and/or encrypted electronic documents
CN110402440A (en) * 2017-02-27 2019-11-01 J·加斯屈埃尔 Segment key Verification System
CN111079186A (en) * 2019-12-20 2020-04-28 百度在线网络技术(北京)有限公司 Data analysis method, device, equipment and storage medium
CN111368269A (en) * 2020-02-29 2020-07-03 杭州电子科技大学 Fine-grained access control method based on dense point labeling
CN113918973A (en) * 2021-10-14 2022-01-11 南京中孚信息技术有限公司 Secret mark detection method and device and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115587393A (en) * 2022-08-17 2023-01-10 广州红海云计算股份有限公司 Distributed performance data processing method and device
CN115952530A (en) * 2023-03-15 2023-04-11 江西科技学院 Financial data processing method and system for improving confidentiality and computer

Also Published As

Publication number Publication date
CN114722416B (en) 2022-10-11

Similar Documents

Publication Publication Date Title
CN114722416B (en) Financial informatization data processing method and system based on encryption
US8254698B2 (en) Methods for document-to-template matching for data-leak prevention
US7940929B1 (en) Method for processing documents containing restricted information
EP2223237B1 (en) System and method for providing identity theft security
US20160012027A9 (en) Redaction with Classification and Archiving for Format Independence
CN101739441A (en) Method of image information input and system thereof
WO2001054333A2 (en) System and method for verification of identity
CN110781460A (en) Copyright authentication method, device, equipment, system and computer readable storage medium
WO2009051951A1 (en) Systems and methods for securely processing form data
US20210351927A1 (en) System, method and computer program product for mitigating customer onboarding risk
CN109429517A (en) Text and fingerprint recognition are carried out in the feeding of database table, text file and data to add salt
CN108664797A (en) It is a kind of for pdf documents into rower it is close and verification method and device
CN114444105A (en) Intelligent audit data reporting safety method
CN107517180A (en) Login method and device
CN112084474A (en) Enterprise archive management method, system, storage medium and electronic equipment
US20110209053A1 (en) Shuffling Documents Containing Restricted Information
EP2996063A1 (en) Distributed identity validation method, system and computer program
CN108199846A (en) Question-type picture authentication server
CN116680617A (en) Data confidentiality detection method and system based on use permission level
CN1643551A (en) Method and system for user authentication in a digital communication system
CN116246745A (en) High-security storage database system based on medical data
CN113220758A (en) Project maturity analysis demonstration method
CA2724729A1 (en) Systems and methods for secure data entry and storage
CN104599074B (en) The IN service acquisition management method and system of real name fabrication
CN116450745B (en) Multi-device-based note file operation method, system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant