CN102684879A - Method and system for remote bid opening and bid evaluation - Google Patents

Method and system for remote bid opening and bid evaluation Download PDF

Info

Publication number
CN102684879A
CN102684879A CN2012101323190A CN201210132319A CN102684879A CN 102684879 A CN102684879 A CN 102684879A CN 2012101323190 A CN2012101323190 A CN 2012101323190A CN 201210132319 A CN201210132319 A CN 201210132319A CN 102684879 A CN102684879 A CN 102684879A
Authority
CN
China
Prior art keywords
bid
tender documents
documents
opening
long
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101323190A
Other languages
Chinese (zh)
Inventor
王文
印泽斌
卜献文
甘朝晖
徐松
邓秀兵
丁文
彭绍全
张云德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN CONSTRUCTION NETWORK CO Ltd
Original Assignee
SICHUAN CONSTRUCTION NETWORK CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN CONSTRUCTION NETWORK CO Ltd filed Critical SICHUAN CONSTRUCTION NETWORK CO Ltd
Priority to CN2012101323190A priority Critical patent/CN102684879A/en
Publication of CN102684879A publication Critical patent/CN102684879A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to data safety technology, and particularly discloses a method and a system for remote bid opening and bid evaluation. The method includes the steps: uploading bidding documents, primarily encrypting the bidding documents and secondarily encrypting a primary encryption key; receiving and decrypting the bidding documents in an online manner, decrypting the primary encryption key by acquiring a secondary primary encryption key, and then decrypting the bidding documents by the aid of the primary encryption key; verifying validity of the bidding documents and generating a bid opening list when bid opening time comes; distributing bid inviting documents, the bidding documents and bid opening process documents; and performing evaluation according to preset evaluation standards to obtain bid evaluation results. The system comprises a bidding service subsystem, a bid opening service subsystem and a bid evaluation service subsystem, wherein the bid opening service subsystem is capable of decrypting the secondarily encrypted bidding documents in the online manner and providing the corresponding bid inviting documents, the bidding documents and the bid opening process documents to the bid evaluation service subsystem for evaluation. By the aid of the method and the system, safety of the bidding documents is facilitated, and decrypting efficiency is improved.

Description

A kind of long-range open sealed tenders method and system
Technical field
The present invention relates to the data security technology, is a kind of long-range open sealed tenders method and system based on the Internet specifically, and the long-range opening of bid, the bid that are applied to bid are professional, can improve the Information Security in the electronics open sealed tenders process effectively.
Background technology
At present, along with the maturation of Internet technology, various based on network application services are developed rapidly, long-range Tender System (like government procurement) a kind of instance that comes to this.Long-range Tender System all comprises long-range opening of bid process and long-range assessment of bids process:
So-called long-range opening of bid refers to through the bid service channel, the acceptance of tenders file, and scene or network decrypting tender documents also verify that it closes activity, reads tender documents, generate the opening of bid list;
Assessment of bids service channel is specified in the so-called long-range assessment of bids, distribution bidding document, tender documents, opening of bid list and procedure file, the organization network assessment of bids (local network or strange land network); Assessment of bids expert according to the requirement of bidding document and relevant policies, carries out the assessment of bids through special-purpose software.
For traditional invitation system, have remarkable advantages based on the long-range invitation system of the Internet:
In the tradition bid activity, the bidder must arrive the on-the-spot opening of bid of participating in of opening of bid of bid inviter's appointment, and assessment of bids expert must arrive the assessment of bids place of appointment, participates in the assessment of bids; Before the opening of bid,, can't know in advance, increase the opening of bid expense if do not meet legal opening of bid condition (like discontented 3 families of effective bidder); Means fall behind in the open sealed tenders process, and mode is single, inefficiency, and work quality is low; Assessment of bids result receives about assessment of bids expert, and the assessment of bids is unfair, injustice; Assessment of bids process lacks supervision; Bidder's traveling expense height of participating in opening bid.
In the long-range open sealed tenders system, through building special-purpose bid service channel, assessment of bids service channel, accomplish the network open sealed tenders, the bidder can arrive the on-the-spot opening of bid of participating in, and assessment of bids expert also need not be to unique given place participation assessment of bids; Before the opening of bid, can remind the bid inviter automatically, whether reach legal opening of bid condition; Realize the open sealed tenders procedural informationization, increase work efficiency and the as received basis reason, improve assessment of bids process supervision; Reduce bidder, bid inviter's expense.
There is certain defective in existing long-range open sealed tenders scheme; Mainly show the Information Security of tender documents is considered not enough science, specifically comprise the following aspects: tender documents all are to use simple symmetrical expression algorithm or the precession of asymmetric algorithm close.The simple symmetrical expression algorithm for encryption of using, dangerous, easy crack; The simple asymmetric algorithm secret key of using, encryption/decryption speed is slow, be not easy to management in the use.Because the asymmetric algorithm need provide private key to decipher deciphering, thereby often needs the user to provide private key to accomplish deciphering to the scene, has brought the problem of fail safe and efficient like this.
Summary of the invention
To the defective of prior art, the object of the present invention is to provide a kind of long-range open sealed tenders method and system, help improving the Information Security of tender documents.
For solving above technical problem, technical scheme provided by the invention is that a kind of long-range open sealed tenders method may further comprise the steps:
Upload tender documents, these tender documents are once encrypted, and an encryption key is carried out superencipher;
Receive and online deciphering tender documents, through obtaining the superencipher key, in order to decipher this encryption key, afterwards with these these tender documents of encryption key deciphering;
Checking tender documents legitimacy, and when the opening of bid time arrives, generate the opening of bid list;
Evaluation criteria according to predetermined is evaluated, and obtains assessment of bids result.
More excellent ground is once encrypted and is adopted symmetrical expression to calculate encryption, and superencipher adopts the asymmetric algorithm for encryption.
More excellent ground, the ciphering process of tender documents is:
Tender documents are once encrypted with the symmetrical expression algorithm;
An encrypted symmetric key is carried out superencipher with the asymmetric algorithm;
The online decrypting process of tender documents is:
Obtain the superencipher asymmetric privacy keys;
With encrypted symmetric key of superencipher asymmetric privacy keys deciphering;
According to an encrypted symmetric key after the deciphering, tender documents are deciphered.
More excellent ground, encrypted symmetric key and superencipher asymmetric privacy keys are random key.
More excellent ground, tender documents carry out digital signature.
More excellent ground, the concrete grammar of digital signature is:
The original meaning of one's words of data remains unchanged in the data meaning of one's words after signer is initiatively revised original license file to be signed and made modification in the license file and the original license file;
Utilize hash function that amended license file is carried out computing and obtain first hashed value;
First hashed value encrypted obtain digital signature;
License file to be verified and said digital signature are submitted to authentication, and said license file to be verified is an initiatively amended license file of signature back, or signer initiatively amended license file after third party's malicious modification, treat signature file;
Authentication is deciphered first hashed value of said digital signature, and utilizes one-way function that license file to be verified is carried out computing to obtain second hashed value;
Confirm whether first hashed value is identical with second hashed value, if identical then verify successfully, otherwise authentication failed.
More excellent ground; Said active be revised as according to the data type of original license file increase, deletion and/or replacement and do not change the content of the original meaning of one's words of data, the bit wide that makes up sum according to the various modifications mode is not more than the principle of the hashed value bit wide of said one-way hash function and makes amendment.
More excellent ground, said active are revised as an additional scrambler at random that inserts the afterbody of original license file in original license file, and the width of said scrambler at random is not more than the width of said one-way hash function hashed value.
On this basis, the present invention is also corresponding to provide a kind of long-range open sealed tenders system, comprises bid service subsystem, opening of bid service subsystem and assessment of bids service subsystem through Internet connection, wherein:
Said bid service subsystem is used to upload tender documents, and these tender documents are once encrypted, and an encryption key is carried out superencipher;
Said opening of bid service subsystem is used for receiving and online deciphering tender documents, through obtaining the superencipher key, in order to decipher this encryption key, afterwards with these these tender documents of encryption key deciphering; Checking tender documents legitimacy, and when the opening of bid time arrives, generate the opening of bid list; And distribution bidding document, tender documents and opening of bid procedure file;
Said assessment of bids service subsystem is used for evaluating according to predetermined evaluation criteria, obtains assessment of bids result.
More excellent ground, said bid service subsystem is provided with the digital signature unit, is used for carrying out digital signature to tender documents.
Compared with prior art; In the long-range open sealed tenders technical scheme provided by the invention; Tender documents have adopted the mode of superencipher, promptly when once encrypting tender documents, encryption key are carried out superencipher, can conveniently adopt the online manner of decryption of remote authorization to tender documents thus; Thereby guarantee the Information Security of tender documents, improve the deciphering efficient of tender documents.Especially, tender documents have also carried out digital signature, can prevent the possibility that tender documents are distorted, and have strengthened the Information Security of tender documents, help the potential safety hazard of the system of eliminating.
Description of drawings
In order to be illustrated more clearly in the present invention or technical scheme of the prior art, will do to introduce simply to the accompanying drawing of required use in the embodiment of the invention or the prior art below.Obviously, the accompanying drawing in describing below only is some embodiments of the present invention.For those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the long-range open sealed tenders method of the embodiment of the invention;
Fig. 2 is the ciphering process figure of tender documents in the long-range open sealed tenders method of the embodiment of the invention;
Fig. 3 is the decrypting process figure of tender documents in the long-range open sealed tenders method of the embodiment of the invention;
Fig. 4 is the digital signature procedure figure of tender documents in the long-range open sealed tenders method of the embodiment of the invention;
Fig. 5 is the composition frame chart of the long-range open sealed tenders of embodiment of the invention system.
Embodiment
The basic design of the embodiment of the invention is that tender documents carry out superencipher, to guarantee the Information Security of tender documents; And further, tender documents adopt digital signature, prevent that tender documents from being distorted, and strengthen the Information Security of tender documents.
In order to make those skilled in the art understand technical scheme of the present invention better, the present invention is done further detailed description below in conjunction with accompanying drawing and specific embodiment.
Referring to Fig. 1, the flow chart of the long-range open sealed tenders method of the expression embodiment of the invention.Tender documents in the long-range open sealed tenders method of this embodiment have used the method for superencipher, can improve the data security of tender documents, specifically may further comprise the steps:
S101, upload tender documents, these tender documents are once encrypted, and an encryption key is carried out superencipher;
S102, reception and online deciphering tender documents are through obtaining the superencipher key, in order to decipher this encryption key, afterwards with this these tender documents of encryption key deciphering;
S103, checking tender documents legitimacy, and when the opening of bid time arrives, generate the opening of bid list;
S104, distribution bidding document, tender documents and opening of bid procedure file;
S105, evaluate (comprising computer evaluation automatically, preliminary review, evaluation in detail, gross differences evaluation), obtain assessment of bids result according to predetermined evaluation criteria.
Because tender documents have adopted the mode of superencipher; Promptly when once encrypting tender documents, encryption key is carried out superencipher; Can adopt the online manner of decryption of remote authorization to tender documents easily thus; Thereby guarantee the Information Security of tender documents, improve the deciphering efficient of tender documents.
In the embodiment of the invention; Once encryption and superencipher adopt the compound mode of symmetrical expression algorithm and/or asymmetric algorithm: so-called symmetrical expression encryption/decryption algorithm is exactly that same key is used in encryption and decryption; Usually the encryption technology that is referred to as " Session Key " is at present by extensive employing; Like the des encryption standard that U.S. government adopted is exactly a kind of typical " symmetrical expression " enciphered method, and its Session Key length is 56Bits; It is not same key that so-called asymmetric enciphering and deciphering algorithm is exactly encryption and decryption employed; Two keys are arranged usually, be called " PKI " and " private key ", their two essential pairings are used; Otherwise can not open encrypt file (like RSA Algorithm); Here " PKI " refer to externally to announce, " private key " then can not, can only know by people of holder.
In the present embodiment, once encrypt and adopt symmetrical expression to calculate encryption, superencipher adopts the asymmetric algorithm for encryption.
In the long-range open sealed tenders method of present embodiment, the concrete encryption of tender documents, decrypting process are described below.
Referring to Fig. 2, the ciphering process of tender documents in the long-range open sealed tenders method of expression present embodiment specifically may further comprise the steps:
S201, tender documents are once encrypted with the symmetrical expression algorithm;
S202, an encrypted symmetric key is carried out superencipher with the asymmetric algorithm.
Referring to Fig. 3, the online decrypting process of tender documents in the long-range open sealed tenders method of expression present embodiment specifically may further comprise the steps:
S301, obtain and use the superencipher asymmetric privacy keys;
S302, with encryption key of superencipher asymmetric privacy keys deciphering;
S303, according to the deciphering after an encrypted symmetric key, tender documents are deciphered.
In addition, the tender documents in the long-range open sealed tenders method of the embodiment of the invention also carry out digital signature.So-called digital signature is attached to some data on the data cell exactly, or the cryptographic transformation that the data unit is done.This data or conversion allow the recipient of data cell in order to the source of affirmation data cell and the integrality and the protected data of data cell, prevent to be forged by people (for example recipient).It is a kind of method that the message of electronic form is signed, and wherein each signature information can be transmitted in a communication network.
Like this, present embodiment can prevent the possibility that tender documents are distorted, and strengthens the Information Security of open sealed tenders file, eliminates the potential safety hazard of open sealed tenders system.
For further improving the security reliability of tender documents digital signature, the embodiment of the invention is improved the mode of digital signature, further describes as follows.
Referring to Fig. 4, the process of digital signature in the long-range open sealed tenders method of expression present embodiment specifically may further comprise the steps:
The original meaning of one's words of data remains unchanged in the data meaning of one's words after S401, signer (tenderer) are initiatively revised original license file (tender documents) to be signed and made modification in the license file and the original license file;
S402, utilize hash function that amended license file is carried out computing to obtain first hashed value;
S403, to the close digital signature that obtains of the first hashed value precession;
S404, license file to be verified and said digital signature are submitted to authentication, said license file to be verified is an initiatively amended license file of signature back, or signer initiatively amended license file after third party's malicious modification, treat signature file;
S405, authentication are deciphered first hashed value of said digital signature, and utilize one-way function that license file to be verified is carried out computing to obtain second hashed value;
S406, confirm whether first hashed value is identical with second hashed value, if identical then verify successfully, otherwise authentication failed.
Digital signature in the long-range open sealed tenders method of the foregoing description is encrypted, is deciphered and adopt symmetrical encryption/decryption algorithm or asymmetric encryption/decryption algorithm; Initiatively revise and can adopt one of following mode:
(1) according to the data type of original license file increase, deletion and/or replacement and do not change the content of the original meaning of one's words of data, the bit wide that wherein makes up sum according to the various modifications mode is not more than the principle of the hashed value bit wide of said one-way hash function and makes amendment;
(2) be an additional scrambler (can be the pseudo random number ordered series of numbers constitutes) at random in original license file, said scrambler at random inserts the afterbody of original license file, and the width of scrambler is not more than the width of said one-way hash function hashed value at random;
Thus; Initiatively original license file is carried out constant the distorting of the original meaning of one's words of protected data through signer; Do not have in performance under the prerequisite of obviously influence digital signature system; Let the fail safe of digital signature physique depend on the second preimage problem that more is difficult to resolve of used one-way hash function, be no longer dependent on the collision problem of relatively easy solution, thereby the fail safe of digital signature system is provided effectively.
More than the long-range open sealed tenders method of the present invention has been carried out detailed description; A kind of long-range open sealed tenders system has been proposed on this basis; It is through building special-purpose bid service channel (subsystem), opening of bid service channel (subsystem) and assessment of bids service channel (subsystem); Can accomplish the network open sealed tenders, the bidder can arrive the on-the-spot opening of bid of participating in, and assessment of bids expert also need not participate in the assessment of bids to unique given place; Before the opening of bid, can remind the bid inviter automatically, whether reach legal opening of bid condition; Realize the open sealed tenders procedural informationization, increase work efficiency and the as received basis reason, improve assessment of bids process supervision; Reduce bidder, bid inviter's expense.
The structure of this embodiment is that (1) set up special-purpose assessment of bids service channel; (2) online deciphering tender documents; (3) generate the opening of bid list; (4) distribution bidding document, tender documents, opening of bid procedure file; (5) the automatically evaluation that uses a computer.Further the long-range open sealed tenders system of this embodiment is described below.
Referring to Fig. 5, the composition frame chart of the long-range open sealed tenders of expression embodiment of the invention system.This long-range open sealed tenders system 500 comprises bid service subsystem 501, opening of bid service subsystem 502 and the assessment of bids service subsystem 503 through Internet connection, wherein:
Bid service subsystem 501 is used to upload tender documents, and these tender documents are once encrypted, and an encryption key is carried out superencipher;
Opening of bid service subsystem 502 is used for receiving and online deciphering tender documents, through obtaining the superencipher key, in order to decipher this encryption key, afterwards with these these tender documents of encryption key deciphering; Checking tender documents legitimacy, and when the opening of bid time arrives, generate the opening of bid list; And distribution bidding document, tender documents and opening of bid procedure file;
Assessment of bids service subsystem 503 is used for evaluating according to predetermined evaluation criteria, obtains assessment of bids result.
In the long-range open sealed tenders technical scheme shown in this embodiment; Tender documents have adopted the mode of superencipher; Promptly when once encrypting tender documents, encryption key is carried out superencipher; Can conveniently adopt the online manner of decryption of remote authorization thus, thereby guarantee the Information Security of tender documents, improve the deciphering efficient of tender documents tender documents.
Especially; Be provided with digital signature unit (scheming not shown) in the bid service subsystem 501, be used for carrying out digital signature, with the possibility that prevents that tender documents from being distorted to tender documents; Strengthen the Information Security of open sealed tenders file, eliminate the potential safety hazard of open sealed tenders system.
The above embodiment of the present invention can realize that for example C language, assembler language are realized with software, and corresponding software can be stored in the storage medium that can read, for example in the hard disk of computer, the internal memory.
Only be preferred implementation of the present invention below, should be pointed out that above-mentioned preferred implementation should not be regarded as limitation of the present invention, protection scope of the present invention should be as the criterion with claim institute restricted portion.For those skilled in the art, do not breaking away from the spirit and scope of the present invention, can also make some improvement and retouching, these improvement and retouching also should be regarded as protection scope of the present invention.

Claims (10)

1. a long-range open sealed tenders method is characterized in that, may further comprise the steps:
Upload tender documents, these tender documents are once encrypted, and an encryption key is carried out superencipher;
Receive and online deciphering tender documents, through obtaining the superencipher key, in order to decipher this encryption key, afterwards with these these tender documents of encryption key deciphering;
Checking tender documents legitimacy, and when the opening of bid time arrives, generate the opening of bid list;
Distribution bidding document, tender documents and opening of bid procedure file;
Evaluation criteria according to predetermined is evaluated, and obtains assessment of bids result.
2. long-range open sealed tenders method as claimed in claim 1 is characterized in that, once encrypts and adopts symmetrical expression to calculate encryption, and superencipher adopts the asymmetric algorithm for encryption.
3. long-range open sealed tenders method as claimed in claim 2 is characterized in that,
The ciphering process of tender documents is:
Tender documents are once encrypted with the symmetrical expression algorithm;
An encrypted symmetric key is carried out superencipher with the asymmetric algorithm;
The online decrypting process of tender documents is:
Obtain the superencipher asymmetric privacy keys;
With encrypted symmetric key of superencipher asymmetric privacy keys deciphering;
According to an encrypted symmetric key after the deciphering, tender documents are deciphered.
4. long-range open sealed tenders method as claimed in claim 3 is characterized in that, encrypted symmetric key and superencipher asymmetric privacy keys are random key.
5. like each described long-range open sealed tenders method of claim 1~4, it is characterized in that tender documents carry out digital signature.
6. long-range open sealed tenders method as claimed in claim 5 is characterized in that the concrete grammar of digital signature is:
The original meaning of one's words of data remains unchanged in the data meaning of one's words after signer is initiatively revised original license file to be signed and made modification in the license file and the original license file;
Utilize hash function that amended license file is carried out computing and obtain first hashed value;
First hashed value encrypted obtain digital signature;
License file to be verified and said digital signature are submitted to authentication, and said license file to be verified is an initiatively amended license file of signature back, or signer initiatively amended license file after third party's malicious modification, treat signature file;
Authentication is deciphered first hashed value of said digital signature, and utilizes one-way function that license file to be verified is carried out computing to obtain second hashed value;
Confirm whether first hashed value is identical with second hashed value, if identical then verify successfully, otherwise authentication failed.
7. long-range open sealed tenders method as claimed in claim 6; It is characterized in that; Said active be revised as according to the data type of original license file increase, deletion and/or replacement and do not change the content of the original meaning of one's words of data, the bit wide that makes up sum according to the various modifications mode is not more than the principle of the hashed value bit wide of said one-way hash function and makes amendment.
8. long-range open sealed tenders method as claimed in claim 6; It is characterized in that; Said active is revised as an additional scrambler at random that inserts the afterbody of original license file in original license file, and the width of said scrambler at random is not more than the width of said one-way hash function hashed value.
9. a long-range open sealed tenders system is characterized in that, comprises bid service subsystem, opening of bid service subsystem and assessment of bids service subsystem through Internet connection, wherein:
Said bid service subsystem is used to upload tender documents, and these tender documents are once encrypted, and an encryption key is carried out superencipher;
Said opening of bid service subsystem is with receiving and online deciphering tender documents, through obtaining the superencipher key, in order to decipher this encryption key, afterwards with these these tender documents of encryption key deciphering; Checking tender documents legitimacy, and when the opening of bid time arrives, generate the opening of bid list; And distribution bidding document, tender documents and opening of bid procedure file;
Said assessment of bids service subsystem is used for evaluating according to predetermined evaluation criteria, obtains assessment of bids result.
10. long-range open sealed tenders as claimed in claim 9 system is characterized in that said bid service subsystem is provided with the digital signature unit, is used for carrying out digital signature to tender documents.
CN2012101323190A 2012-05-02 2012-05-02 Method and system for remote bid opening and bid evaluation Pending CN102684879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101323190A CN102684879A (en) 2012-05-02 2012-05-02 Method and system for remote bid opening and bid evaluation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101323190A CN102684879A (en) 2012-05-02 2012-05-02 Method and system for remote bid opening and bid evaluation

Publications (1)

Publication Number Publication Date
CN102684879A true CN102684879A (en) 2012-09-19

Family

ID=46816282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101323190A Pending CN102684879A (en) 2012-05-02 2012-05-02 Method and system for remote bid opening and bid evaluation

Country Status (1)

Country Link
CN (1) CN102684879A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078841A (en) * 2012-12-03 2013-05-01 厦门市美亚柏科信息股份有限公司 Method and system for preventive electronic data security
CN103530555A (en) * 2013-10-31 2014-01-22 浙江云巢科技有限公司 Method and device for preventing program from executing malice operation
CN104809644A (en) * 2015-04-30 2015-07-29 四川建设网有限责任公司 Electronic competitive-bidding system and control method thereof
CN106603233A (en) * 2017-01-04 2017-04-26 顾建明 Encryption and decryption method for remote bid opening type bidding system
CN106789927A (en) * 2016-11-28 2017-05-31 华迪计算机集团有限公司 A kind of on-line bid method and system
CN106933838A (en) * 2015-12-29 2017-07-07 北京广联达正源兴邦科技有限公司 Tender Evaluation Method and bid evaluation system
CN107087002A (en) * 2017-05-15 2017-08-22 武汉斗鱼网络科技有限公司 A kind of encipher-decipher method of data, device and electronic equipment
CN108055272A (en) * 2017-12-21 2018-05-18 广州科瑞工程信息咨询有限公司 Tender documents screening technique and system based on remote authorization
CN108171525A (en) * 2018-01-24 2018-06-15 中航技国际经贸发展有限公司 A kind of online opening of bid management method and system
CN108319860A (en) * 2018-02-07 2018-07-24 南通市公共资源交易中心 A kind of long-range bid opening and bid appraisal management method, management system and management equipment
CN108370318A (en) * 2015-12-21 2018-08-03 万事达卡国际股份有限公司 Method and system for the block chain modification for using digital signature
CN110633579A (en) * 2019-09-02 2019-12-31 上海同在互联网科技有限公司 Bidding file online decryption result prediction method, system, device and storage medium
CN111786997A (en) * 2020-06-30 2020-10-16 贵州光奕科科技有限公司 Encryption and decryption encryption system for remote bid opening type bidding
CN112182596A (en) * 2020-03-24 2021-01-05 工保科技(浙江)有限公司 Method for bidding and opening bid through electronic insurance policy system and data security method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1753360A (en) * 2004-09-26 2006-03-29 华为技术有限公司 Method of improving digital signing safety
CN101459661A (en) * 2007-12-14 2009-06-17 鸿富锦精密工业(深圳)有限公司 Electronic document protection system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1753360A (en) * 2004-09-26 2006-03-29 华为技术有限公司 Method of improving digital signing safety
CN101459661A (en) * 2007-12-14 2009-06-17 鸿富锦精密工业(深圳)有限公司 Electronic document protection system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘忠强等: "在线招投标系统的安全性研究", 《山东科学》, vol. 21, no. 3, 30 June 2008 (2008-06-30), pages 69 - 71 *
徐立新等: "在线招投标Web系统安全结构及关键技术的研究", 《计算机工程与设计》, vol. 27, no. 17, 30 September 2006 (2006-09-30) *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014086166A1 (en) * 2012-12-03 2014-06-12 厦门市美亚柏科信息股份有限公司 Method and system for preventively preserving electronic data
CN103078841B (en) * 2012-12-03 2016-01-13 厦门市美亚柏科信息股份有限公司 The method and system that a kind of preventative electronic data is saved from damage
CN103078841A (en) * 2012-12-03 2013-05-01 厦门市美亚柏科信息股份有限公司 Method and system for preventive electronic data security
CN103530555A (en) * 2013-10-31 2014-01-22 浙江云巢科技有限公司 Method and device for preventing program from executing malice operation
CN104809644A (en) * 2015-04-30 2015-07-29 四川建设网有限责任公司 Electronic competitive-bidding system and control method thereof
CN108370318A (en) * 2015-12-21 2018-08-03 万事达卡国际股份有限公司 Method and system for the block chain modification for using digital signature
CN106933838B (en) * 2015-12-29 2020-11-10 北京广联达正源兴邦科技有限公司 Bidding evaluation method and bidding evaluation system
CN106933838A (en) * 2015-12-29 2017-07-07 北京广联达正源兴邦科技有限公司 Tender Evaluation Method and bid evaluation system
CN106789927A (en) * 2016-11-28 2017-05-31 华迪计算机集团有限公司 A kind of on-line bid method and system
CN106603233B (en) * 2017-01-04 2020-01-21 顾建明 Encryption and decryption method for remote bid opening type bidding system
CN106603233A (en) * 2017-01-04 2017-04-26 顾建明 Encryption and decryption method for remote bid opening type bidding system
CN107087002B (en) * 2017-05-15 2019-09-20 武汉斗鱼网络科技有限公司 A kind of encipher-decipher method of data, device and electronic equipment
CN107087002A (en) * 2017-05-15 2017-08-22 武汉斗鱼网络科技有限公司 A kind of encipher-decipher method of data, device and electronic equipment
CN108055272A (en) * 2017-12-21 2018-05-18 广州科瑞工程信息咨询有限公司 Tender documents screening technique and system based on remote authorization
CN108055272B (en) * 2017-12-21 2021-05-18 广州科瑞工程信息咨询有限公司 Remote authorization-based bid document screening method and system
CN108171525A (en) * 2018-01-24 2018-06-15 中航技国际经贸发展有限公司 A kind of online opening of bid management method and system
CN108319860A (en) * 2018-02-07 2018-07-24 南通市公共资源交易中心 A kind of long-range bid opening and bid appraisal management method, management system and management equipment
CN110633579A (en) * 2019-09-02 2019-12-31 上海同在互联网科技有限公司 Bidding file online decryption result prediction method, system, device and storage medium
CN112182596A (en) * 2020-03-24 2021-01-05 工保科技(浙江)有限公司 Method for bidding and opening bid through electronic insurance policy system and data security method
CN112182596B (en) * 2020-03-24 2021-12-31 工保科技(浙江)有限公司 Method for bidding and opening bid through electronic insurance policy system and data security method
CN111786997A (en) * 2020-06-30 2020-10-16 贵州光奕科科技有限公司 Encryption and decryption encryption system for remote bid opening type bidding

Similar Documents

Publication Publication Date Title
CN102684879A (en) Method and system for remote bid opening and bid evaluation
CN106603233B (en) Encryption and decryption method for remote bid opening type bidding system
CN110022217B (en) Advertisement media service data credible storage system based on block chain
CN101883100B (en) Digital content distributed authorization method
CN102802036B (en) System and method for identifying digital television
US20140325225A1 (en) Self-authenticated method with timestamp
US20210097187A1 (en) Protecting data from brute force attack
CN102594558A (en) Anonymous digital certificate system and verification method of trustable computing environment
CN104243494B (en) A kind of data processing method
CN108632296B (en) Dynamic encryption and decryption method for network communication
CN108880995B (en) Block chain-based unfamiliar social network user information and message pushing encryption method
US9712519B2 (en) Efficient encryption, escrow and digital signatures
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN102024123A (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN114726546B (en) Digital identity authentication method, device, equipment and storage medium
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN103973714A (en) E-mail account generating method and system
CN112564906A (en) Block chain-based data security interaction method and system
CN102999710A (en) Method, equipment and system for safely sharing digital content
CN114513327B (en) Block chain-based Internet of things private data rapid sharing method
CN102857487A (en) Method and system for remote tender invitation
CN110611679A (en) Data transmission method, device, equipment and system
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
CN101964039A (en) Encryption protection method and system of copyright object

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120919