CN116668188A - Financial data hierarchical encryption method and system - Google Patents

Financial data hierarchical encryption method and system Download PDF

Info

Publication number
CN116668188A
CN116668188A CN202310891308.9A CN202310891308A CN116668188A CN 116668188 A CN116668188 A CN 116668188A CN 202310891308 A CN202310891308 A CN 202310891308A CN 116668188 A CN116668188 A CN 116668188A
Authority
CN
China
Prior art keywords
data
grading
encryption
hierarchical
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310891308.9A
Other languages
Chinese (zh)
Inventor
王彦哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang Weizhen Network Technology And Culture Co ltd
Original Assignee
Shenyang Weizhen Network Technology And Culture Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Weizhen Network Technology And Culture Co ltd filed Critical Shenyang Weizhen Network Technology And Culture Co ltd
Priority to CN202310891308.9A priority Critical patent/CN116668188A/en
Publication of CN116668188A publication Critical patent/CN116668188A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a financial data hierarchical encryption method and a financial data hierarchical encryption system. Wherein the method comprises the following steps: acquiring original financial data; carrying out grading operation on the original financial data according to the primary grading rule to obtain first grading data; performing encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data; performing secondary classification on the first encrypted data through the identification classification matrix to obtain second classification data; and encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result. The application solves the technical problems that in the prior art, encryption of financial data is usually carried out only by encrypting or decrypting data generated in real time through equipment such as a cipher machine and the like, and the transmission data is normalized and managed by utilizing a special protocol in the transmission process, but when encountering large-volume financial data or a professional cracking team, the financial data is easy to suffer from data security attack to generate leakage data.

Description

Financial data hierarchical encryption method and system
Technical Field
The application relates to the field of financial data security processing, in particular to a financial data hierarchical encryption method and system.
Background
Along with the continuous development of intelligent science and technology, intelligent equipment is increasingly used in life, work and study of people, and the quality of life of people is improved and the learning and working efficiency of people is increased by using intelligent science and technology means.
At present, aiming at financial data generated by the financial industry, most of the data belong to important data levels, the privacy involved in the data is strong and wide in range, and once leakage or damage occurs, the loss is huge, so that great risks are brought to personal, enterprise and even national security. However, in the prior art, encryption of financial data is often only to encrypt or decrypt data generated in real time through a cryptographic machine and other devices, and to perform standardized management on the transmitted data by using a special protocol in the transmission process, however, when encountering a larger amount of financial data or a more specialized cracking team, the situation of leaking data due to data security attack is easily suffered.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the application provides a financial data hierarchical encryption method and a financial data hierarchical encryption system, which at least solve the technical problems that in the prior art, encryption of financial data is usually carried out only by encrypting or decrypting data generated in real time through equipment such as a cipher machine, and the like, and the transmitted data is normalized and managed by utilizing a special protocol in the transmission process, however, when encountering large-volume financial data or a professional cracking team, the financial data is easy to suffer from data security attack to generate leakage data.
According to an aspect of an embodiment of the present application, there is provided a hierarchical encryption method for financial data, including: acquiring original financial data; performing grading operation on the original financial data according to a primary grading rule to obtain first grading data; performing encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data; performing secondary grading on the first encrypted data through a recognition grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas; and encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result.
Optionally, the complexity of the first preset algorithm is smaller than that of the second preset algorithm.
Optionally, the second grading data is obtained by secondarily grading the first encrypted data by identifying a grading matrix, where the second grading data includes a plurality of grading areas including: acquiring a data tag of the first encrypted data; inputting the data tag into the identification grading matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data.
Optionally, encrypting all the classified areas in the second classified data one by one according to a second preset algorithm, and obtaining an encryption result includes: acquiring a grading area label in the second grading data; and encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national cipher SM4 algorithm.
According to another aspect of the embodiment of the present application, there is also provided a hierarchical encryption system for financial data, including: the acquisition module is used for acquiring the original financial data; the first grading module is used for carrying out grading operation on the original financial data according to the primary grading rule to obtain first grading data; the first encryption module is used for carrying out encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data; the second grading module is used for secondarily grading the first encrypted data through the identification grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas; and the second encryption module is used for encrypting all the classified areas in the second classified data one by one according to a second preset algorithm to obtain an encryption result.
Optionally, the complexity of the first preset algorithm is smaller than that of the second preset algorithm.
Optionally, the second classification module includes: an acquisition unit configured to acquire a data tag of the first encrypted data; an input unit for inputting the data tag into the recognition and classification matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data.
Optionally, the second encryption module includes: an acquisition unit configured to acquire a hierarchical region tag in the second hierarchical data; and the encryption unit is used for encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national secret SM4 algorithm.
According to another aspect of the embodiment of the present application, there is also provided a nonvolatile storage medium, where the nonvolatile storage medium includes a stored program, and when the program runs, the program controls a device in which the nonvolatile storage medium is located to execute a hierarchical encryption method for financial data.
According to another aspect of an embodiment of the present application, there is also provided an electronic system including a processor and a memory; the memory stores computer readable instructions, and the processor is configured to execute the computer readable instructions, where the computer readable instructions execute a method for hierarchical encryption of financial data.
In the embodiment of the application, the original financial data is acquired; performing grading operation on the original financial data according to a primary grading rule to obtain first grading data; performing encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data; performing secondary grading on the first encrypted data through a recognition grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas; the method comprises the steps of encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result, so that the technical problem that in the prior art, encryption of financial data is usually carried out only by encrypting or decrypting data generated in real time through equipment such as a cipher machine, and the like, and the transmission data is subjected to standardized management by utilizing a special protocol in the transmission process is solved, however, when a large amount of financial data or a professional cracking team is encountered, the situation of data leakage caused by data security attack is easily encountered.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a flow chart of a method of hierarchical encryption of financial data according to an embodiment of the application;
FIG. 2 is a block diagram of a hierarchical encryption system for financial data according to an embodiment of the present application;
fig. 3 is a block diagram of a terminal device for performing the method according to the application according to an embodiment of the application;
fig. 4 is a memory unit for holding or carrying program code for implementing a method according to the application, according to an embodiment of the application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an embodiment of the present application, there is provided a method embodiment of a hierarchical encryption method for financial data, it being noted that the steps shown in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
Example 1
Fig. 1 is a flowchart of a hierarchical encryption method for financial data according to an embodiment of the present application, as shown in fig. 1, the method comprising the steps of:
step S102, obtaining original financial data.
In particular, the embodiment of the application aims to solve the technical problems that in the prior art, encryption of financial data is usually carried out by encrypting or decrypting data generated in real time through equipment such as a cipher machine and the like, and transmission data is normalized and managed by utilizing a special protocol in the transmission process, however, when larger financial data or a professional cracking team is encountered, the situation that data security attack is easily suffered to generate leakage data is easy to occur, and when the embodiment starts to execute, original financial data which are important financial data to be encrypted by the embodiment of the application need to be acquired first.
Step S104, grading operation is carried out on the original financial data according to the primary grading rule, and first grading data are obtained.
Specifically, in order to perform preliminary classification and grading processing on original financial data so as to perform first data encryption operation, the original financial data is required to be classified according to a preliminary grading rule to obtain data areas with different grades after rough classification, and the data area information with different grades is summarized to obtain first grading data, wherein the first grading data comprises all data contents and first grading results.
Optionally, the primary grading rule includes: weight analysis rules.
Optionally, the weight analysis rule includes: inputting the original financial data as an input feature vector by using a weight model to obtain a weight tag and a data tag; marking the original financial data according to the data tag to obtain a partition marking result; carrying out weight sorting on the partition marking results according to the weight labels to obtain sorting results; and generating the first grading data according to the sorting result.
Step S106, the first hierarchical data is subjected to encryption operation of a first preset algorithm, and first encrypted data are obtained.
Specifically, in order to perform primary encryption protection on the first hierarchical data so as to perform subsequent re-classification and re-encryption on the first hierarchical data, the first hierarchical data needs to be uniformly encrypted according to a primary encryption policy, namely a first preset algorithm, and key information is stored so as to facilitate subsequent further processing of the first encrypted data.
And S108, carrying out secondary grading on the first encrypted data through the identification grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas.
Optionally, the second grading data is obtained by secondarily grading the first encrypted data by identifying a grading matrix, where the second grading data includes a plurality of grading areas including: acquiring a data tag of the first encrypted data; inputting the data tag into the identification grading matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data.
Specifically, for the data tag of the first encrypted data, D1 and D2 of the data tag represent elements of an identifiable array in the data tag, for example, (0101001) the binary coded array represents an array tag field of a certain segment of the first encrypted data, which needs to be processed and analyzed, and the field is input as D1 into the identification hierarchical matrix of the embodiment of the present application, an input port of the matrix may accept binary digits and arrays from the encrypted database, so that the matrix recognizes 010 and 1001 of D1 through the receiving end and marks a header of the tag, and performs a matrix content stack mapping operation on the tag to obtain mapped D1, where D1 is D1 data obtained by matching the data tag D1 (0101001) of the first encrypted data, and the data may be used in subsequent summarization and encryption processing.
Step S110, encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result.
Optionally, the complexity of the first preset algorithm is smaller than that of the second preset algorithm.
Optionally, encrypting all the classified areas in the second classified data one by one according to a second preset algorithm, and obtaining an encryption result includes: acquiring a grading area label in the second grading data; and encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national cipher SM4 algorithm.
Through the embodiment, the technical problems that in the prior art, encryption of financial data is usually carried out by encrypting or decrypting data generated in real time through equipment such as a cipher machine and the like, and the transmission data is subjected to standardized management by utilizing a special protocol in the transmission process, but when a large amount of financial data or a professional cracking team is encountered, the situation of leaking data caused by data security attack is easily encountered are solved.
Example two
Fig. 2 is a block diagram illustrating a structure of a hierarchical encryption system for financial data according to an embodiment of the present application, as shown in fig. 2, the system including:
the acquiring module 20 is configured to acquire original financial data.
In particular, the embodiment of the application aims to solve the technical problems that in the prior art, encryption of financial data is usually carried out by encrypting or decrypting data generated in real time through equipment such as a cipher machine and the like, and transmission data is normalized and managed by utilizing a special protocol in the transmission process, however, when larger financial data or a professional cracking team is encountered, the situation that data security attack is easily suffered to generate leakage data is easy to occur, and when the embodiment starts to execute, original financial data which are important financial data to be encrypted by the embodiment of the application need to be acquired first.
The first grading module 22 is configured to perform grading operation on the original financial data according to a primary grading rule, so as to obtain first grading data.
Specifically, in order to perform preliminary classification and grading processing on original financial data so as to perform first data encryption operation, the original financial data is required to be classified according to a preliminary grading rule to obtain data areas with different grades after rough classification, and the data area information with different grades is summarized to obtain first grading data, wherein the first grading data comprises all data contents and first grading results.
Optionally, the primary grading rule includes: weight analysis rules.
Optionally, the weight analysis rule includes: inputting the original financial data as an input feature vector by using a weight model to obtain a weight tag and a data tag; marking the original financial data according to the data tag to obtain a partition marking result; carrying out weight sorting on the partition marking results according to the weight labels to obtain sorting results; and generating the first grading data according to the sorting result.
The first encryption module 24 is configured to perform an encryption operation of a first preset algorithm on the first hierarchical data, to obtain first encrypted data.
Specifically, in order to perform primary encryption protection on the first hierarchical data so as to perform subsequent re-classification and re-encryption on the first hierarchical data, the first hierarchical data needs to be uniformly encrypted according to a primary encryption policy, namely a first preset algorithm, and key information is stored so as to facilitate subsequent further processing of the first encrypted data.
And a second classification module 26, configured to perform secondary classification on the first encrypted data by identifying a classification matrix, to obtain second classification data, where the second classification data includes a plurality of classification areas.
Optionally, the second classification module includes: an acquisition unit configured to acquire a data tag of the first encrypted data; an input unit for inputting the data tag into the recognition and classification matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data.
And the second encryption module 28 is configured to encrypt all the hierarchical regions in the second hierarchical data one by one according to a second preset algorithm, so as to obtain an encryption result.
Optionally, the complexity of the first preset algorithm is smaller than that of the second preset algorithm.
Optionally, the second encryption module includes: an acquisition unit configured to acquire a hierarchical region tag in the second hierarchical data; and the encryption unit is used for encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national secret SM4 algorithm.
Through the embodiment, the technical problems that in the prior art, encryption of financial data is usually carried out by encrypting or decrypting data generated in real time through equipment such as a cipher machine and the like, and the transmission data is subjected to standardized management by utilizing a special protocol in the transmission process, but when a large amount of financial data or a professional cracking team is encountered, the situation of leaking data caused by data security attack is easily encountered are solved.
According to another aspect of the embodiment of the present application, there is also provided a nonvolatile storage medium, where the nonvolatile storage medium includes a stored program, and when the program runs, the program controls a device in which the nonvolatile storage medium is located to execute a hierarchical encryption method for financial data.
Specifically, the method comprises the following steps: acquiring original financial data; performing grading operation on the original financial data according to a primary grading rule to obtain first grading data; performing encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data; performing secondary grading on the first encrypted data through a recognition grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas; and encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result. Optionally, the complexity of the first preset algorithm is smaller than that of the second preset algorithm. Optionally, the second grading data is obtained by secondarily grading the first encrypted data by identifying a grading matrix, where the second grading data includes a plurality of grading areas including: acquiring a data tag of the first encrypted data; inputting the data tag into the identification grading matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data. Optionally, encrypting all the classified areas in the second classified data one by one according to a second preset algorithm, and obtaining an encryption result includes: acquiring a grading area label in the second grading data; and encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national cipher SM4 algorithm.
According to another aspect of an embodiment of the present application, there is also provided an electronic system including a processor and a memory; the memory stores computer readable instructions, and the processor is configured to execute the computer readable instructions, where the computer readable instructions execute a method for hierarchical encryption of financial data.
Specifically, the method comprises the following steps: acquiring original financial data; performing grading operation on the original financial data according to a primary grading rule to obtain first grading data; performing encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data; performing secondary grading on the first encrypted data through a recognition grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas; and encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result. Optionally, the complexity of the first preset algorithm is smaller than that of the second preset algorithm. Optionally, the second grading data is obtained by secondarily grading the first encrypted data by identifying a grading matrix, where the second grading data includes a plurality of grading areas including: acquiring a data tag of the first encrypted data; inputting the data tag into the identification grading matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data. Optionally, encrypting all the classified areas in the second classified data one by one according to a second preset algorithm, and obtaining an encryption result includes: acquiring a grading area label in the second grading data; and encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national cipher SM4 algorithm.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The system embodiments described above are merely exemplary, and for example, the division of the units may be a logic function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, fig. 3 is a schematic hardware structure of a terminal device according to an embodiment of the present application. As shown in fig. 3, the terminal device may include an input device 30, a processor 31, an output device 32, a memory 33, and at least one communication bus 34. The communication bus 34 is used to enable communication connections between the elements. The memory 33 may comprise a high-speed RAM memory or may further comprise a non-volatile memory NVM, such as at least one magnetic disk memory, in which various programs may be stored for performing various processing functions and implementing the method steps of the present embodiment.
Alternatively, the processor 31 may be implemented as, for example, a central processing unit (Central Processing Unit, abbreviated as CPU), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and the processor 31 is coupled to the input device 30 and the output device 32 through wired or wireless connections.
Alternatively, the input device 30 may include a variety of input devices, for example, may include at least one of a user-oriented user interface, a device-oriented device interface, a programmable interface of software, a camera, and a sensor. Optionally, the device interface facing the device may be a wired interface for data transmission between devices, or may be a hardware insertion interface (such as a USB interface, a serial port, etc.) for data transmission between devices; alternatively, the user-oriented user interface may be, for example, a user-oriented control key, a voice input device for receiving voice input, and a touch-sensitive device (e.g., a touch screen, a touch pad, etc. having touch-sensitive functionality) for receiving user touch input by a user; optionally, the programmable interface of the software may be, for example, an entry for a user to edit or modify a program, for example, an input pin interface or an input interface of a chip, etc.; optionally, the transceiver may be a radio frequency transceiver chip, a baseband processing chip, a transceiver antenna, etc. with a communication function. An audio input device such as a microphone may receive voice data. The output device 32 may include a display, audio, or the like.
In this embodiment, the processor of the terminal device may include functions for executing each module of the data processing system in each device, and specific functions and technical effects may be referred to the above embodiments and are not described herein again.
Fig. 4 is a schematic hardware structure of a terminal device according to another embodiment of the present application. Fig. 4 is a specific embodiment of the implementation of fig. 3. As shown in fig. 4, the terminal device of the present embodiment includes a processor 41 and a memory 42.
The processor 41 executes the computer program code stored in the memory 42 to implement the methods of the above-described embodiments.
The memory 42 is configured to store various types of data to support operation at the terminal device. Examples of such data include instructions for any application or method operating on the terminal device, such as messages, pictures, video, etc. The memory 42 may include a random access memory (random access memory, simply referred to as RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
Optionally, a processor 41 is provided in the processing assembly 40. The terminal device may further include: a communication component 43, a power supply component 44, a multimedia component 45, an audio component 46, an input/output interface 47 and/or a sensor component 48. The components and the like specifically included in the terminal device are set according to actual requirements, which are not limited in this embodiment.
The processing component 40 generally controls the overall operation of the terminal device. The processing component 40 may include one or more processors 41 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 40 may include one or more modules that facilitate interactions between the processing component 40 and other components. For example, processing component 40 may include a multimedia module to facilitate interaction between multimedia component 45 and processing component 40.
The power supply assembly 44 provides power to the various components of the terminal device. Power supply components 44 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for terminal devices.
The multimedia component 45 comprises a display screen between the terminal device and the user providing an output interface. In some embodiments, the display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the display screen includes a touch panel, the display screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation.
The audio component 46 is configured to output and/or input audio signals. For example, the audio component 46 includes a Microphone (MIC) configured to receive external audio signals when the terminal device is in an operational mode, such as a speech recognition mode. The received audio signals may be further stored in the memory 42 or transmitted via the communication component 43. In some embodiments, audio assembly 46 further includes a speaker for outputting audio signals.
The input/output interface 47 provides an interface between the processing assembly 40 and peripheral interface modules, which may be click wheels, buttons, etc. These buttons may include, but are not limited to: volume button, start button and lock button.
The sensor assembly 48 includes one or more sensors for providing status assessment of various aspects for the terminal device. For example, the sensor assembly 48 may detect the open/closed state of the terminal device, the relative positioning of the assembly, the presence or absence of user contact with the terminal device. The sensor assembly 48 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact, including detecting the distance between the user and the terminal device. In some embodiments, the sensor assembly 48 may also include a camera or the like.
The communication component 43 is configured to facilitate communication between the terminal device and other devices in a wired or wireless manner. The terminal device may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In one embodiment, the terminal device may include a SIM card slot, where the SIM card slot is used to insert a SIM card, so that the terminal device may log into a GPRS network, and establish communication with a server through the internet.
From the above, it will be appreciated that the communication component 43, the audio component 46, and the input/output interface 47, the sensor component 48 referred to in the embodiment of fig. 4 may be implemented as an input device in the embodiment of fig. 3.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The system embodiments described above are merely exemplary, and for example, the division of the units may be a logic function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.

Claims (10)

1. A hierarchical encryption method for financial data, comprising:
acquiring original financial data;
performing grading operation on the original financial data according to a primary grading rule to obtain first grading data;
performing encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data;
performing secondary grading on the first encrypted data through a recognition grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas;
and encrypting all the grading areas in the second grading data one by one according to a second preset algorithm to obtain an encryption result.
2. The method of claim 1, wherein the first predetermined algorithm is less complex than the second predetermined algorithm.
3. The method of claim 1, wherein the secondarily grading the first encrypted data by identifying a grading matrix to obtain second grading data, wherein the second grading data includes a number of grading areas comprising:
acquiring a data tag of the first encrypted data;
inputting the data tag into the identification grading matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data.
4. The method according to claim 1, wherein encrypting all the hierarchical regions in the second hierarchical data one by one according to a second preset algorithm, to obtain an encryption result includes:
acquiring a grading area label in the second grading data;
and encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national cipher SM4 algorithm.
5. A hierarchical encryption system for financial data, comprising:
the acquisition module is used for acquiring the original financial data;
the first grading module is used for carrying out grading operation on the original financial data according to the primary grading rule to obtain first grading data;
the first encryption module is used for carrying out encryption operation of a first preset algorithm on the first hierarchical data to obtain first encrypted data;
the second grading module is used for secondarily grading the first encrypted data through the identification grading matrix to obtain second grading data, wherein the second grading data comprises a plurality of grading areas;
and the second encryption module is used for encrypting all the classified areas in the second classified data one by one according to a second preset algorithm to obtain an encryption result.
6. The system of claim 5, wherein the first predetermined algorithm is less complex than the second predetermined algorithm.
7. The system of claim 5, wherein the second classification module comprises:
an acquisition unit configured to acquire a data tag of the first encrypted data;
an input unit for inputting the data tag into the recognition and classification matrix
And obtaining the second hierarchical data, wherein D1 and D2 are data labels of the first encrypted data, and D1 and D2 are the second hierarchical data.
8. The system of claim 5, wherein the second encryption module comprises:
an acquisition unit configured to acquire a hierarchical region tag in the second hierarchical data;
and the encryption unit is used for encrypting the second grading data by using the second preset algorithm according to the grading area label to obtain the encryption result based on the grading area label, wherein the second budget algorithm adopts a national secret SM4 algorithm.
9. A non-volatile storage medium, characterized in that the non-volatile storage medium comprises a stored program, wherein the program, when run, controls a device in which the non-volatile storage medium is located to perform the method of any one of claims 1 to 4.
10. An electronic system comprising a processor and a memory; the memory has stored therein computer readable instructions for executing the processor, wherein the computer readable instructions when executed perform the method of any of claims 1 to 4.
CN202310891308.9A 2023-07-20 2023-07-20 Financial data hierarchical encryption method and system Pending CN116668188A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310891308.9A CN116668188A (en) 2023-07-20 2023-07-20 Financial data hierarchical encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310891308.9A CN116668188A (en) 2023-07-20 2023-07-20 Financial data hierarchical encryption method and system

Publications (1)

Publication Number Publication Date
CN116668188A true CN116668188A (en) 2023-08-29

Family

ID=87711989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310891308.9A Pending CN116668188A (en) 2023-07-20 2023-07-20 Financial data hierarchical encryption method and system

Country Status (1)

Country Link
CN (1) CN116668188A (en)

Similar Documents

Publication Publication Date Title
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN109271798A (en) Sensitive data processing method and system
CN104541281A (en) Method and devices for selective RAM scrambling
US20130163756A1 (en) Visual universal decryption apparatus and methods
WO2019209630A1 (en) File processing method and system, and data processing method
CN101232380A (en) Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN103378971B (en) A kind of data encryption system and method
CN103942896A (en) System for money withdrawing without card on ATM
CN110232021A (en) The method and device of page test
CN109639676A (en) The method, apparatus, equipment and system of tampering detection when log transmission
US9317707B2 (en) Method and system for protecting a driver
CN113779592A (en) Intelligent equipment shear plate data encryption system and method
CN106685897B (en) Safe input method, device and system
CN107248972B (en) Data encryption and decryption method and device and electronic equipment
CN107092834A (en) A kind of finger print data management method and terminal
CN114666135A (en) Data encryption method and device, electronic equipment and storage medium
CN110069907A (en) Big data source tracing method and system based on digital watermarking
CN116668188A (en) Financial data hierarchical encryption method and system
CN114357524B (en) Electronic document processing method and device
CN113037760B (en) Message sending method and device
CN113259348A (en) Heterogeneous data processing method and device, computer equipment and storage medium
CN112270004B (en) Content encryption method and device and electronic equipment
CN109872148A (en) Trust data processing method, device and mobile terminal based on TUI
CN106156571B (en) Encrypting fingerprint tool, encrypting fingerprint tool encrypting and deciphering system and encipher-decipher method
CN111221803B (en) Feature library management method and coprocessor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination