CN114722416A - Encryption-based financial informatization data processing method and system - Google Patents
Encryption-based financial informatization data processing method and system Download PDFInfo
- Publication number
- CN114722416A CN114722416A CN202210643089.8A CN202210643089A CN114722416A CN 114722416 A CN114722416 A CN 114722416A CN 202210643089 A CN202210643089 A CN 202210643089A CN 114722416 A CN114722416 A CN 114722416A
- Authority
- CN
- China
- Prior art keywords
- financial
- file
- position code
- block
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
- G06Q40/125—Finance or payroll
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a financial informatization data processing method and system based on encryption, wherein the method comprises the following steps: the key module traverses the file content corresponding to each position of the financial file and extracts keywords related to the financial file from the file content; inputting the position codes and the keyword set as input data into a secret level division model in a secret key module so as to output secret levels corresponding to the position codes; the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets each block with the security level as an unreadable block; setting a file key for the financial file; when the user input secret key is consistent with the file secret key, identifying the secret level corresponding to the user authority; and adjusting the block state with the security level in the financial file to be a readable block according to the security level corresponding to the user authority. The invention is beneficial to solving the problem that all the personnel knowing the universal secret key in the existing financial file system can check all the financial files at will.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a financial informatization data processing method based on encryption and a financial informatization data processing system based on encryption.
Background
The financial document belongs to the internal confidential document of the enterprise, and once the internal financial document of the enterprise is divulged, the result that the enterprise can not estimate is usually brought to the enterprise. Due to the reasons of business vicious competition and the like, part of practitioners can sell the enterprise financial documents to competitors or copy, utilize, spread and distribute the enterprise financial documents at will, immeasurable loss is brought to the enterprise, and the enterprise encrypts the financial documents to prevent the internal confidential documents of the enterprise from being divulged, so that the enterprise financial documents are necessary to be encrypted.
The financial file encryption is generally performed by manually setting a secret key through an encryption function of the file, the encryption process is not complex, but is tedious, and the secret key needs to be manually set every time a new financial file is generated. In addition, in the process of manually setting the key, a general key is often set, that is, a general key is adopted for all encrypted files. The manual encryption mode not only needs to manually set the secret key, but also has the defect that all financial documents can only set the general secret key, so that all personnel knowing the general secret key can randomly check all financial documents.
Disclosure of Invention
The invention mainly aims to provide an encryption-based financial informatization data processing method, and aims to solve the problem that all persons knowing a general secret key in the conventional financial file system can view all financial files at will.
In order to achieve the purpose, the financial informatization data processing method based on encryption adopts an encryption system to encrypt financial files; the encryption system comprises a secret key module and a financial module in signal connection with the secret key module; the method comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document content of each position in the financial documents by adopting a position code through the secret key module, and traversing the document content corresponding to each position code by the secret key module to extract keywords related to the financial documents;
storing each keyword corresponding to the same position code into the same keyword set;
inputting a position code corresponding to the file content of each position in the financial file and a corresponding keyword set as input data into a secret level division model in the secret key module, and outputting a secret level corresponding to each position code through the secret level division model;
the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets each block with the security level as an unreadable block;
setting a file key for the financial file;
judging whether an input secret key input by a user to the financial file is consistent with the file secret key or not;
and when the security levels are consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state.
Preferably, the method further comprises:
establishing a neural network model;
and taking a preset keyword as input data, taking the security classification corresponding to the preset keyword as output data, and bringing the security classification into the security classification model for training to obtain a trained security classification model.
Preferably, the encryption system further comprises a group of decryption terminals in a set sequence, and the decryption terminals are in signal connection with the key module; when the security level is consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state, wherein the method further comprises the following steps:
displaying a key input window in the unreadable block;
when a key input window of the block is clicked, sending a decryption instruction of the block to the key module;
the secret key module determines a plurality of decryption terminals to form a decryption terminal set according to the secret level corresponding to the block, and sends a secret key segment to each decryption terminal in the decryption terminal set, wherein the secret key segments received by each decryption terminal are spliced in sequence according to the decryption terminals to obtain the decryption secret key of the block;
when the decryption key is detected to be input into the key input window, the block is adjusted to be a readable block.
Preferably, the key module is provided with different key pools; the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and the step of sending a key segment to each decryption terminal in the decryption terminal set includes:
the secret key module determines a plurality of decryption terminals according to the secret level corresponding to the block to form a decryption terminal set;
randomly establishing a corresponding relation between each decryption terminal in the decryption terminal set and the secret key pool, wherein the secret key pools corresponding to each decryption terminal in each decryption terminal set are different;
and extracting a key segment from the key pool which is established with the corresponding relation by the decryption terminal, and sending the key segment to the corresponding decryption terminal.
Preferably, the key module is connected to a plurality of financial modules, each financial module being associated with a set of dedicated decryption terminals.
Preferably, the step of the financial module dividing the financial file into blocks of different security levels according to the security level corresponding to each location code is as follows:
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;the security level corresponding to the file content with the position code of i;security classification corresponding to file content with position code of i +1(ii) a j is the serial number of the block set, j begins to take a value from 1, and j is a positive integer;representing the file content with the position code i;representing the file content with the position code of i + 1;is the jth block set;is the j +1 block set;indicating that the content of a file with a position code of i is added to a block set,Indicating that the file content with the position code of i +1 is added to the block set;Indicating that the file content with the position code of i +1 is added to the block set;
And dividing the financial file into blocks with different security levels according to the block set in which the content of each file is positioned.
Preferably, the step of storing each keyword corresponding to the same position code into the same keyword set specifically includes:
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;a keyword set corresponding to the content of the file with the position code i,the mth keyword in the content of the file whose position code is i,,the total number of the keywords corresponding to the file content with the position code of i;
the step of inputting the position code corresponding to the file content of each position in the financial file and the corresponding key phrase as input data into the secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model specifically comprises:
wherein the content of the first and second substances,in order to implement the classified classification model,the file content with the position code of i corresponds to the security level.
Preferably, when the financial module newly adds a financial document, distinguishing, by the key module, document contents at each position in the financial document by using a position code, and before the step of traversing the document contents corresponding to each position code by the key module to extract keywords related to financial, the method includes:
establishing a financial keyword databaseWherein, in the step (A),for the nth financial keyword in the financial keyword database,n is a positive integer, and N is the total number of the financial keywords in the financial keyword database;
when the financial module newly-increases financial documents, the file content of each position in the financial documents is distinguished by adopting the position codes through the secret key module, and the secret key module traverses the file content corresponding to each position code to extract keywords related to financial affairs, which specifically comprises the following steps:
when the financial module newly adds a financial file, distinguishing the file content of each position in the financial file by adopting a position code through the secret key module;
performing semantic segmentation on words in the financial document to obtain a word group set to be searched of the document content with the position code of i(ii) a Wherein the content of the first and second substances,the q-th key word in the phrase set to be searched in the file content with the position code of i,,is a position code ofi, the total number of key words in the phrase set to be searched of the file content;
wherein, the first and the second end of the pipe are connected with each other,representing a keyword set corresponding to the file content with the position code i, wherein i starts to take a value from 1, and i is a positive integer,show thatAdding to a set of keywords,Indicate that it is notAdded to the keyword set Ai。
Preferably, the step of extracting the keywords related to finance from the document content comprises:
setting a plurality of non-crossed keyword word number intervals, wherein each keyword word number interval corresponds to a keyword database with relevant keywords which are not coincident; the method comprises the steps that keywords contained in different keyword databases are not repeated, and the word number of the keyword in the keyword database corresponding to each keyword word number interval belongs to the keyword word number interval;
determining the size of a screening window selected in each round of extraction according to the sequence of the word number intervals of the keywords from large to small, and determining a keyword database selected in each round of extraction; wherein, the size of the screening window selected in each round of extraction refers to that the number of scanned words is equal to the upper limit of the word number interval of the keywords in the round;
during each round of extraction, scanning the file content through the selected screening window, and comparing the scanned information with the keywords in the keyword database selected in the round so as to extract the financial keywords of the file content;
and after each round of extraction is finished, removing the extracted keywords from the file contents to form new file contents serving as the file contents of the next round of extraction.
In order to achieve the above object, the present invention further provides an encryption-based financial information data processing system, which applies any one of the encryption-based financial information data processing methods described above to encrypt a financial document; the encryption system comprises a key module and a financial module in signal connection with the key module.
In the technical scheme of the invention, an encryption system is adopted to encrypt the financial file; extracting keywords from the file content of each position of the financial file, inputting a security classification model, and determining the security of the file content of each position in the financial file according to the security of the keywords of each position; then, the financial document is divided into different security blocks according to the security levels of different positions of the financial document; further, setting all file contents of the financial file to be in an unreadable state; then, the invention automatically endows the financial document with a file secret key for encryption, and the file secret key can generally adopt a universal secret key set by a user, so that personnel who do not have authority to acquire the file secret key can not check any financial document; furthermore, a person who can input a file secret key can adjust the block with the corresponding secret level to a readable block by identifying the secret level corresponding to the user authority, and keep the block with the non-corresponding secret level in the financial file in an unreadable state. Therefore, according to the technical scheme, the security level of the content of each file in the financial file can be automatically identified in a key word extracting mode, the financial file is subjected to security level segmentation, and personnel mastering a file key can be prevented from seeing all the confidential contents of the financial file; furthermore, the invention also identifies the security authority of the personnel who master the secret key of the file, automatically adjusts the file content with the security conformity to a readable block so as to be convenient for the user to check, and the file content with the non-conformity of the security in the financial file is not displayed to the user. Moreover, through the technical scheme of the invention, a user does not need to set a password when uploading financial files, only the financial files are stored in the financial module, the system automatically identifies the security level of each file content in the newly-added financial files, and sets a universal file secret key for encryption processing, and simultaneously, only the file content with the consistent security level can be displayed to a user with authority, but the file content with the inconsistent security level is not displayed to the user without the authority, so that the problem that all financial files can be randomly checked by all personnel knowing the universal secret key in the conventional financial file system is solved.
Drawings
FIG. 1 is a flowchart illustrating an embodiment of an encryption-based financial information data processing method according to the present invention.
The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "unit", "means", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "unit", "means" or "unit" may be used mixedly.
Referring to fig. 1, to achieve the above object, a first embodiment of the present invention provides an encryption-based financial information data processing method, which uses an encryption system to encrypt a financial document; the encryption system comprises a secret key module and a financial module in signal connection with the secret key module; the method comprises the following steps:
step S10, when the financial module adds a new financial document, the key module distinguishes the document content of each position in the financial document by adopting a position code, and the key module traverses the document content corresponding to each position code to extract keywords related to finance; extracting keywords relevant to finance from the file content, and screening the finance content to remove irrelevant file content;
step S20, storing each keyword corresponding to the same position code into the same keyword set;
step S30, inputting the position code corresponding to the file content of each position in the financial file and the corresponding keyword set as input data into a secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model;
step S40, the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets the blocks with each security level as unreadable blocks;
step S50, setting a file key for the financial file;
step S60, judging whether the input secret key input by the user to the financial document is consistent with the document secret key;
and step S70, when the security levels are consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state.
In the technical scheme of the invention, an encryption system is adopted to encrypt the financial file; extracting keywords from the file content of each position of the financial file, inputting a security classification model, and determining the security of the file content of each position in the financial file according to the security of the keywords of each position; then, the financial document is divided into different security blocks according to the security levels of different positions of the financial document; further, setting all file contents of the financial file to be in an unreadable state; then, the invention automatically endows the financial document with a file secret key for encryption, and the file secret key can generally adopt a universal secret key set by a user, so that personnel who do not have authority to acquire the file secret key can not check any financial document; furthermore, a person who can input a file secret key can adjust the block with the corresponding secret level to a readable block by identifying the secret level corresponding to the user authority, and keep the block with the non-corresponding secret level in the financial file in an unreadable state. Therefore, according to the technical scheme, the security level of the content of each file in the financial file can be automatically identified in a key word extracting mode, the financial file is subjected to security level segmentation, and personnel mastering a file key can be prevented from seeing all the confidential contents of the financial file; furthermore, the invention also identifies the security authority of the personnel who master the secret key of the file, automatically adjusts the file content with the security conformity to a readable block so as to be convenient for the user to check, and the file content with the non-conformity of the security in the financial file is not displayed to the user. Moreover, according to the technical scheme of the invention, a user does not need to set a password when uploading financial files, only the financial files are stored in the financial module, the system automatically identifies the security level of each file content in the newly added financial files, and sets a universal file secret key for encryption processing, and simultaneously only the file contents with the security level coincidence can be displayed to users with authority, while the file contents with the security level non-coincidence are not displayed to users without authority, so that the problem that all the financial files can be randomly checked by all the personnel knowing the universal secret key in the existing financial file system is solved.
In particular, the financial document may be a financial statement (such as a profit statement) exported from financial software, a consolidated reimbursement document, or a newly created financial system, and the type of the financial document is not limited herein. The newly added financial file may include one or more financial files, and when the newly added financial file is a plurality of financial files, the newly added financial file may be a folder or a file compression package containing the plurality of financial files, and the content of the financial file contained in each file is generally different, so that each time the newly added financial file is stored in the financial module, the security level corresponding to each position of the newly added financial file needs to be determined, and encryption and processing of reading authority need to be performed.
The financial module is a financial file storage module, and in a specific application, a designated storage area of the user side can be set as the financial module, for example, a financial folder in a D disk of the user side is designated as the financial module.
The key module can be a shared module shared by the plurality of financial modules or an independent module dedicated to the designated financial module, and when the key module is set as the shared module, the key module can be set in the cloud server, and at the moment, the key module is in communication connection with the plurality of financial modules.
Specifically, in step S70, there are various ways to identify the security level corresponding to the user authority, for example, by face recognition, fingerprint recognition, password identification with input authority, and so on.
In an embodiment, when extracting the finance-related keywords from the document content, the method may specifically be:
setting a plurality of non-crossed keyword number intervals, wherein each keyword number interval corresponds to a keyword database with non-coincident related keywords; wherein, the keywords contained in different keyword databases are not repeated; the word number of the keyword in the keyword database corresponding to each keyword word number interval belongs to the keyword word number interval;
determining the size of a screening window selected in each round of extraction according to the sequence of the word number intervals of the keywords from large to small, and determining a keyword database selected in each round of extraction; wherein, the size of the screening window selected in each round of extraction refers to that the number of scanned words is equal to the upper limit of the word number interval of the keywords in the round;
during each round of extraction, scanning the file content through the selected screening window, and comparing the scanned information with the keywords in the keyword database selected in the round so as to extract the financial keywords of the file content;
and after each round of extraction is finished, removing the extracted keywords from the file contents to form new file contents serving as the file contents of the next round of extraction.
And after the extraction of the keywords of all rounds is finished, combining all the extracted keywords to form a keyword set.
For example, three keyword word number intervals are set: the number of words in the first keyword word number interval is (10, 14) corresponding to the first keyword database, the number of words in the second keyword word number interval is (6, 10) corresponding to the second keyword database, the number of words in the third keyword word number interval is (0, 6) corresponding to the third keyword database;
since three keyword number intervals are set, three times of keyword extraction needs to be performed on the file content. During the first round of keyword extraction, taking the upper limit 14 of the word number interval of the first keyword as the size of a screening window; when extracting the second round of keywords, taking the upper limit 10 of the word number interval of the second keyword as the size of a screening window; and in the third round of keyword extraction, taking the upper limit 6 of the number of words in the third keyword number interval as the size of the screening window.
Based on the first embodiment of the encryption-based financial information data processing method of the present invention, in the second embodiment of the encryption-based financial information data processing method of the present invention, the method further includes:
step S80, establishing a neural network model;
and step S90, taking the preset keywords as input data, taking the security classification corresponding to the preset keywords as output data, and taking the security classification into the security classification model for training to obtain a trained security classification model.
i starts from 1 and is a positive integer,the mth keyword in the content of the file whose position code is i,,the total number of the keywords corresponding to the keyword corresponding to the file content with the position code of i.
When selecting a keyword as input data, it is necessary to fully consider the synonyms and synonyms of the keyword.
Based on the first embodiment or the second embodiment of the encryption-based financial information data processing method of the present invention, in a third embodiment of the encryption-based financial information data processing method of the present invention, the encryption system further includes a set of decryption terminals having a set order, the decryption terminals being in signal connection with the key module; when the security level is consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state, wherein the method further comprises the following steps:
step S100, displaying a key input window in the unreadable block; specifically, the file content corresponding to the block is directly displayed in the readable block so as to be convenient for a user to look up; the unreadable block is set to an inaccessible state, and when the user clicks the unreadable block, a key input window is displayed.
Step S110, when the key input window of the block is clicked, sending a decryption instruction of the block to the key module; specifically, when the key input window is clicked, the decryption instruction of the block is sent to the key module, so as to ensure that the decryption key of the unreadable block is randomly generated, rather than preset, because the preset key is often easily leaked, and the financial data is in an unsafe state where the financial data is easily stolen.
Step S120, the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and sends a key segment to each decryption terminal in the decryption terminal set, wherein the key segments received by each decryption terminal are sequentially spliced according to the decryption terminals to obtain the decryption keys of the block; in the step of determining that a plurality of decryption terminals form a decryption terminal set, the plurality of decryption terminals refer to at least two decryption terminals, and the number of the plurality of decryption terminals can be determined according to the security level of the block. For example, when the security level is low, two decryption terminals may be determined, and when the security level is high, a larger number of decryption terminals may be determined.
The plurality of decryption terminals respectively receive the key segments and splice the key segments into decryption keys, and the security of the keys is improved. For example, even if the key segment of one of the key terminals is intercepted, the decryption key composed of the key segments of the key terminals cannot be decrypted.
Further, the decryption key is sent to the user terminal, specifically, each decryption terminal has a preset sequence code, each decryption terminal in the decryption terminal set is controlled to send the password segment to the associated user terminal according to the sequence code of each decryption terminal in the decryption terminal set, and the corresponding password segment is spliced in the user terminal, so that the decryption key can be obtained. In order to avoid wrong splicing sequence of the password segments, the sequence of each password segment is synchronously transmitted when the password segments are transmitted to the user terminal. So that the user can splice the password segments by himself according to the sequence of the password segments.
In step S130, when it is detected that the decryption key is input into the key input window, the block is adjusted to be a readable block.
Further, the secret key module is connected with a plurality of financial modules, and each financial module can establish a fixed corresponding relationship or a random corresponding relationship with the decryption terminal. In this embodiment, each financial module is associated with a set of dedicated decryption terminals. And the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and sequentially determines a sufficient number of decryption terminals according to the required number of the decryption terminals and the sequence codes of the decryption terminals. For example, a group of decryption terminals associated with the financial module a includes the decryption terminals 1 to 7, and when 3 decryption terminals are required for the security level corresponding to the block, the decryption terminals 1 to 3 may form a decryption terminal set according to the sequence codes of the decryption terminals.
Based on the third embodiment of the encryption-based financial information data processing method of the present invention, in the fourth embodiment of the encryption-based financial information data processing method of the present invention, the key module is provided with different key pools; the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and sends a key segment to each decryption terminal in the decryption terminal set, wherein the key segment includes:
step S121, the secret key module determines a plurality of decryption terminals according to the secret level corresponding to the block to form a decryption terminal set;
step S122, randomly establishing a correspondence between each decryption terminal in the decryption terminal set and the key pool, where the key pools corresponding to each decryption terminal in each decryption terminal set are different;
step S123, extracting a key segment from the key pool in which the corresponding relationship is established between the decryption terminals, and sending the key segment to the corresponding decryption terminal.
In this embodiment, each key segment is from a pool of keys. The key pool is pre-stored with a plurality of key segments, and the corresponding relationship between each decryption terminal in the decryption terminal set and the key pool is randomly established, so that the possibility of decryption key combinations formed by each key segment is higher, the difficulty of decryption key cracking is improved, and the confidentiality of financial documents is stronger.
Based on the first to fourth embodiments of the encryption-based financial information data processing method according to the present invention, in a fifth embodiment of the encryption-based financial information data processing method according to the present invention, the step of dividing the financial file into blocks with different security levels according to the security level corresponding to each position code by the financial module specifically includes:
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;the security level corresponding to the file content with the position code of i;the security classification is the security classification corresponding to the file content with the position code of i + 1; j is the serial number of the block set, j begins to take a value from 1, and j is a positive integer;representing the file content with the position code i;representing the file content with the position code of i + 1;is the jth block set;is the j +1 block set;indicating that the content of a file with a position code of i is added to a block set,Indicating that the file content with the position code of i +1 is added to the block set;Indicating that the content of a file with a position code of i +1 is added to a block set;
And dividing the financial file into blocks with different security levels according to the block set in which the content of each file is positioned.
The function of formula (1) in this example is:
when in useThen, the file content with the position code of iIs determined as the file content with the position code of i +1The block set number of (2);
when in useThen, the file content with the position code of iIs incremented by 1, and is determined as the file content with the position code of i +1The block set number of (2).
The specific application refers to the following cases:
specifically, i starts from 1, j starts from 1,i.e. the content of the file with position code 1Adding to a set of blocks;
The first embodiment is as follows:
when i takes 1: file content if position code is 1Corresponding secret levelFile content equal to position code 2Corresponding secret levelAnd the file content with the position code of 1Has been added to the block setThen, the file content with the position code of 2 is setIs also added to the block set;
When i takes 2, if the position code is 2 file contentCorresponding secret levelFile content equal to position code 3Corresponding secret levelAnd the position code is 2Has been added to the block setThen, the file content with the position code of 3 is codedIs also added to the block set;
Example two:
when i takes 1: file content if position code is 1Corresponding secret levelFile content equal to position code 2Corresponding secret levelAnd the position code is 1Has been added to the block setThen, the file content with the position code of 2 is setIs also added to the block set;
When i takes 2, if the position code is 2 file contentCorresponding secret levelFile content not equal to position code 3Corresponding secret levelAnd the position code is 2Has been added to the block setThen, the file content with the position code of 3 is codedAdding to a set of blocks。
Example three:
when i takes 1: file content with position code 1Corresponding secret levelFile content not equal to position code 2Corresponding secret levelAnd the position code is 1Has been added to the block setThen, the file content with the position code of 2 is setAdding to a set of blocks;
When i takes 2, if the position code is 2 file contentCorresponding secret levelFile content not equal to position code 3Corresponding secret levelAnd the position code is 2Has been added to the block setThen, the file content with the position code of 3 is codedIs added to the block set。
Based on the first to fifth embodiments of the encryption-based financial information data processing method according to the present invention, in a sixth embodiment of the encryption-based financial information data processing method according to the present invention, the step of storing the keywords corresponding to the same position code into the same keyword set specifically includes:
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;a set of keywords corresponding to the content of the file with the position code i,the mth keyword in the content of the file whose position code is i,,the total number of the keywords corresponding to the file content with the position code of i;
the step of inputting the position code corresponding to the file content of each position in the financial file and the corresponding key phrase as input data into the secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model specifically comprises:
wherein the content of the first and second substances,in order to implement the classified classification model,the file content with the position code of i corresponds to the security level.
Therefore, as can be seen from equation (3), the security level corresponding to the content of the file whose position code is i is determined based on the highest security level among the keywords in the position code i.
Based on the first to sixth embodiments of the encryption-based financial information data processing method according to the present invention, in a seventh embodiment of the encryption-based financial information data processing method according to the present invention, when a financial module adds a new financial document, the document content at each position in the financial document is distinguished by using a position code through the key module, and before the step of traversing the document content corresponding to each position code by the key module to extract the keywords related to the financial affairs, the method includes:
establishing a financial keyword databaseWherein, in the step (A),for the nth financial keyword in the financial keyword database,n is a positive integer, and N is the total number of the financial keywords in the financial keyword database;
when the financial module newly-increases financial documents, the file content of each position in the financial documents is distinguished by adopting the position codes through the secret key module, and the secret key module traverses the file content corresponding to each position code to extract keywords related to financial affairs, which specifically comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document contents of each position in the financial documents by adopting position codes through the secret key module;
performing semantic segmentation on words in the financial document to obtain a word group set to be searched of the document content with the position code of i(ii) a Wherein, the first and the second end of the pipe are connected with each other,the q-th key word in the phrase set to be searched in the file content with the position code of i,,the total number of key words in the phrase set to be searched of the file content with the position code of i;
wherein the content of the first and second substances,representing a keyword set corresponding to the file content with the position code i, wherein i starts to take a value from 1, and i is a positive integer,show thatAdding to a set of keywords,Indicate that it is notAdding to a set of keywords。
Wherein the close synonyms and synonyms of the keywords are fully considered in the financial keyword database B. When the position code is iTo-be-searched word group setIn the case of multiple repetitions of the same financial keyword, each financial keyword needs to be added to the keyword set。
In order to achieve the above object, the present invention further provides an encryption-based financial information data processing system, which applies any one of the encryption-based financial information data processing methods described above to encrypt a financial document; the encryption system comprises a key module and a financial module in signal connection with the key module.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a computer-readable storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions for enabling a terminal device to enter the method according to the embodiments of the present invention.
In the description herein, references to the description of the term "an embodiment," "another embodiment," "other embodiments," or "first through Xth embodiments," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, method steps, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. The financial informatization data processing method based on encryption is characterized in that an encryption system is adopted to encrypt financial files; the encryption system comprises a secret key module and a financial module in signal connection with the secret key module; the method comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document content of each position in the financial documents by adopting a position code through the secret key module, and traversing the document content corresponding to each position code by the secret key module to extract keywords related to the financial documents;
storing each keyword corresponding to the same position code into the same keyword set;
inputting a position code corresponding to the file content of each position in the financial file and a corresponding keyword set as input data into a secret level division model in the secret key module, and outputting a secret level corresponding to each position code through the secret level division model;
the financial module divides the financial file into blocks with different security levels according to the security level corresponding to each position code, and sets each block with the security level as an unreadable block;
setting a file key for the financial file;
judging whether an input secret key input by a user to the financial file is consistent with the file secret key or not;
and when the security levels are consistent, identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level being consistent to a readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level being inconsistent to an unreadable state.
2. The encryption-based financial informatization data processing method of claim 1, further comprising:
establishing a neural network model;
and taking a preset keyword as input data, taking the security classification corresponding to the preset keyword as output data, and bringing the security classification into the security classification model for training to obtain a trained security classification model.
3. An encryption-based financial informatization data processing method according to claim 1, wherein the encryption system further comprises a set of decryption terminals in a set order, the decryption terminals being in signal connection with the key module; after the steps of identifying the security level corresponding to the user authority, adjusting the block state of the financial file with the security level conforming to the readable block according to the security level corresponding to the user authority, and keeping the block of the financial file with the security level not conforming to the readable block in the unreadable state, the method further comprises the following steps:
displaying a key input window in the unreadable block;
when a key input window of the block is clicked, sending a decryption instruction of the block to the key module;
the secret key module determines a plurality of decryption terminals to form a decryption terminal set according to the secret level corresponding to the block, and sends a secret key segment to each decryption terminal in the decryption terminal set, wherein the secret key segments received by each decryption terminal are spliced in sequence according to the decryption terminals to obtain the decryption secret key of the block;
when the decryption key is detected to be input into the key input window, the block is adjusted to be a readable block.
4. The encryption-based financial informatization data processing method of claim 3, wherein the key module is provided with different key pools; the key module determines a plurality of decryption terminals to form a decryption terminal set according to the security level corresponding to the block, and the step of sending a key segment to each decryption terminal in the decryption terminal set includes:
the secret key module determines a plurality of decryption terminals according to the secret level corresponding to the block to form a decryption terminal set;
randomly establishing a corresponding relation between each decryption terminal in the decryption terminal set and the secret key pool, wherein the secret key pools corresponding to each decryption terminal in each decryption terminal set are different;
and extracting a key segment from the key pool of which the corresponding relation is established by the decryption terminal, and sending the key segment to the corresponding decryption terminal.
5. An encryption-based financial informationalized data processing method as defined in claim 1, wherein the key module is connected to a plurality of financial modules, each financial module being associated with a dedicated set of decryption terminals.
6. An encryption-based financial informationized data processing method according to any one of claims 1-5, wherein the financial module is configured to divide the financial file into blocks with different security levels according to the security level corresponding to each location code, and specifically:
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;the secret level corresponding to the file content with the position code of i;the security level corresponding to the file content with the position code of i + 1; j is the serial number of the block set, j begins to take a value from 1, and j is a positive integer;representing the file content with the position code i;representing the file content with the position code of i + 1;is the jth block set;is the j +1 block set;indicating that the content of a file with a position code of i is added to a block set,Indicating that the file content with the position code of i +1 is added to the block set;Indicating that the file content with the position code of i +1 is added to the block set;
And dividing the financial file into blocks with different security levels according to the block set in which the content of each file is positioned.
7. An encryption-based financial informationized data processing method according to any one of claims 1-5, wherein the step of storing the keywords corresponding to the same position code in the same keyword set comprises:
wherein i is a position code corresponding to the file content in the financial file, the value of i is started from 1, and i is a positive integer;a keyword set corresponding to the content of the file with the position code i,the mth keyword in the content of the file whose position code is i,,the total number of the keywords corresponding to the file content with the position code of i;
the step of inputting the position code corresponding to the file content of each position in the financial file and the corresponding key phrase as input data into the secret level division model in the secret key module, and outputting the secret level corresponding to each position code through the secret level division model specifically comprises:
8. The financial information data processing method based on encryption according to any one of claims 1 to 5, wherein when the financial module adds a new financial document, the key module distinguishes the document content of each position in the financial document by using a position code, and before the step of traversing the document content corresponding to each position code by the key module to extract the keywords related to finance, the method comprises:
establishing a financial keyword databaseWherein, in the step (A),for the nth financial keyword in the financial keyword database,n is a positive integer, and N is the total number of the financial keywords in the financial keyword database;
when the financial module newly-increases financial documents, the file content of each position in the financial documents is distinguished by adopting the position codes through the secret key module, and the secret key module traverses the file content corresponding to each position code to extract keywords related to financial affairs, which specifically comprises the following steps:
when the financial module newly adds financial documents, distinguishing the document contents of each position in the financial documents by adopting position codes through the secret key module;
performing semantic segmentation on words in the financial file to obtain a word group set to be searched of the file content with the position code i(ii) a Wherein the content of the first and second substances,the q-th key word in the phrase set to be searched in the file content with the position code of i,,the total number of key words in the phrase set to be searched of the file content with the position code of i;
9. The encryption-based financial informationized data processing method according to any one of claims 1-5, wherein the step of extracting financial-related keywords from the document contents comprises:
setting a plurality of non-crossed keyword number intervals, wherein each keyword number interval corresponds to a keyword database with non-coincident related keywords; the keywords contained in different keyword databases are not repeated, and the word number of the keyword in the keyword database corresponding to each keyword word number interval belongs to the keyword word number interval;
determining the size of a screening window selected in each round of extraction according to the sequence of the word number intervals of the keywords from large to small, and determining a keyword database selected in each round of extraction; wherein, the size of the screening window selected in each round of extraction refers to that the number of scanned words is equal to the upper limit of the word number interval of the keywords in the round;
during each round of extraction, scanning the file content through the selected screening window, and comparing the scanned information with the keywords in the keyword database selected in the round so as to extract the financial keywords of the file content;
and after each round of extraction is finished, removing the extracted keywords from the file contents to form new file contents serving as the file contents of the next round of extraction.
10. An encryption-based financial informatization data processing system, which is characterized in that the encryption-based financial informatization data processing method according to any one of claims 1 to 9 is applied to encrypt financial files; the encryption system comprises a key module and a financial module in signal connection with the key module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210643089.8A CN114722416B (en) | 2022-06-09 | 2022-06-09 | Financial informatization data processing method and system based on encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210643089.8A CN114722416B (en) | 2022-06-09 | 2022-06-09 | Financial informatization data processing method and system based on encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114722416A true CN114722416A (en) | 2022-07-08 |
CN114722416B CN114722416B (en) | 2022-10-11 |
Family
ID=82232568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210643089.8A Active CN114722416B (en) | 2022-06-09 | 2022-06-09 | Financial informatization data processing method and system based on encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114722416B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115587393A (en) * | 2022-08-17 | 2023-01-10 | 广州红海云计算股份有限公司 | Distributed performance data processing method and device |
CN115952530A (en) * | 2023-03-15 | 2023-04-11 | 江西科技学院 | Financial data processing method and system for improving confidentiality and computer |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010034845A1 (en) * | 2000-02-15 | 2001-10-25 | Brunt George B. | Secure web-based document control process and system |
CN102819604A (en) * | 2012-08-20 | 2012-12-12 | 徐亮 | Method for retrieving confidential information of file and judging and marking security classification based on content correlation |
CN110402440A (en) * | 2017-02-27 | 2019-11-01 | J·加斯屈埃尔 | Segment key Verification System |
US20190377889A1 (en) * | 2017-02-10 | 2019-12-12 | Michael Mertens | Verifiable version control on authenticated and/or encrypted electronic documents |
CN111079186A (en) * | 2019-12-20 | 2020-04-28 | 百度在线网络技术(北京)有限公司 | Data analysis method, device, equipment and storage medium |
CN111368269A (en) * | 2020-02-29 | 2020-07-03 | 杭州电子科技大学 | Fine-grained access control method based on dense point labeling |
CN113918973A (en) * | 2021-10-14 | 2022-01-11 | 南京中孚信息技术有限公司 | Secret mark detection method and device and electronic equipment |
-
2022
- 2022-06-09 CN CN202210643089.8A patent/CN114722416B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010034845A1 (en) * | 2000-02-15 | 2001-10-25 | Brunt George B. | Secure web-based document control process and system |
CN102819604A (en) * | 2012-08-20 | 2012-12-12 | 徐亮 | Method for retrieving confidential information of file and judging and marking security classification based on content correlation |
US20190377889A1 (en) * | 2017-02-10 | 2019-12-12 | Michael Mertens | Verifiable version control on authenticated and/or encrypted electronic documents |
CN110402440A (en) * | 2017-02-27 | 2019-11-01 | J·加斯屈埃尔 | Segment key Verification System |
CN111079186A (en) * | 2019-12-20 | 2020-04-28 | 百度在线网络技术(北京)有限公司 | Data analysis method, device, equipment and storage medium |
CN111368269A (en) * | 2020-02-29 | 2020-07-03 | 杭州电子科技大学 | Fine-grained access control method based on dense point labeling |
CN113918973A (en) * | 2021-10-14 | 2022-01-11 | 南京中孚信息技术有限公司 | Secret mark detection method and device and electronic equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115587393A (en) * | 2022-08-17 | 2023-01-10 | 广州红海云计算股份有限公司 | Distributed performance data processing method and device |
CN115952530A (en) * | 2023-03-15 | 2023-04-11 | 江西科技学院 | Financial data processing method and system for improving confidentiality and computer |
Also Published As
Publication number | Publication date |
---|---|
CN114722416B (en) | 2022-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114722416B (en) | Financial informatization data processing method and system based on encryption | |
US8254698B2 (en) | Methods for document-to-template matching for data-leak prevention | |
US7940929B1 (en) | Method for processing documents containing restricted information | |
EP2223237B1 (en) | System and method for providing identity theft security | |
US20160012027A9 (en) | Redaction with Classification and Archiving for Format Independence | |
CN101739441A (en) | Method of image information input and system thereof | |
WO2001054333A2 (en) | System and method for verification of identity | |
CN110781460A (en) | Copyright authentication method, device, equipment, system and computer readable storage medium | |
WO2009051951A1 (en) | Systems and methods for securely processing form data | |
US20210351927A1 (en) | System, method and computer program product for mitigating customer onboarding risk | |
CN109429517A (en) | Text and fingerprint recognition are carried out in the feeding of database table, text file and data to add salt | |
CN108664797A (en) | It is a kind of for pdf documents into rower it is close and verification method and device | |
CN114444105A (en) | Intelligent audit data reporting safety method | |
CN107517180A (en) | Login method and device | |
CN112084474A (en) | Enterprise archive management method, system, storage medium and electronic equipment | |
US20110209053A1 (en) | Shuffling Documents Containing Restricted Information | |
EP2996063A1 (en) | Distributed identity validation method, system and computer program | |
CN108199846A (en) | Question-type picture authentication server | |
CN116680617A (en) | Data confidentiality detection method and system based on use permission level | |
CN1643551A (en) | Method and system for user authentication in a digital communication system | |
CN116246745A (en) | High-security storage database system based on medical data | |
CN113220758A (en) | Project maturity analysis demonstration method | |
CA2724729A1 (en) | Systems and methods for secure data entry and storage | |
CN104599074B (en) | The IN service acquisition management method and system of real name fabrication | |
CN116450745B (en) | Multi-device-based note file operation method, system and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |