CN106789927A - A kind of on-line bid method and system - Google Patents
A kind of on-line bid method and system Download PDFInfo
- Publication number
- CN106789927A CN106789927A CN201611064317.7A CN201611064317A CN106789927A CN 106789927 A CN106789927 A CN 106789927A CN 201611064317 A CN201611064317 A CN 201611064317A CN 106789927 A CN106789927 A CN 106789927A
- Authority
- CN
- China
- Prior art keywords
- bid
- tender documents
- project
- tender
- documents
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0611—Request for offers or quotes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of on-line bid method, including:Bid server by utilizing rivest, shamir, adelman generates at least two pairs unsymmetrical key, and respectively sends to bid client public key information;Bid client makes tender documents, is digitally signed and utilizes received public key information to be encrypted to the tender documents by digital signature using digital certificate;Bid client will be sent to bid server by the tender documents of encryption;Bid server receives the tender documents by encryption, and using being decrypted, to generate the tender documents of digital signature and digital signature verified;In digital signature by the way that after checking, bid server extracts the project budget, project quality grade and project duration from tender documents;Weights of the bid server according to shared by project quality grade, the project budget and project duration score each tender documents respectively;And bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
Description
Technical field
The present invention relates to on-line bid field, and more particularly, to a kind of on-line bid method and system.
Background technology
Bid is the concept corresponding with bid, and it refers to bidder at bid inviter is specific or not specifically invitation, according to
The requirement that bidding document specifies, actively tender documents are submitted and for the purpose of acceptance of the bid in the when and where of regulation to bid inviter
Behavior.The Basic practice of bid:Bidder obtains bidding document first, after earnest analytical study, works out tender document.Tender document reality
It is a quotation untill the regulation bid opening date in matter, content must be signed very clearly after acceptance of the bid with bid inviter
The contract important content to be included should be listed in all, and must not be recalled bidding documents before the deadline, be changed bidding documents quotation or to mark
Book content makees substantial modifications.To prevent bidder from being withdrawn the tender after bid or refusing after acceptance of the bid signing contract, bid inviter is usual
Require that bidder provides the tender bond of certain proportion or the amount of money.After bid inviter determines highest bidder, not middle target bidder
Paid-up guarantee fund is to give returning.
At present, with the maturation of Internet technology, various network application services are rapidly developed.It is online to throw
Mark system, consults the call for tender, purchase e-bidding file, makes bidding document, upload bid text by the specified network media
Part, online opening of bid etc..
There is certain defect in existing on-line bid system, be mainly manifested in the Information Security to electronic bidding file
Pay attention to inadequate, normally only tender documents are encrypted or are digitally signed, safety measure is not ideal enough, security performance is present
The possibility that tender documents are tampered, causes great potential safety hazard;On the other hand, existing on-line bid system can not be from numerous
Qualified tender documents are selected in tender documents, it is therefore necessary to introduce a kind of data safety performance more preferably and can select
The technical scheme of acceptance of the bid file.
The content of the invention
In order to solve the above problems, according to an aspect of the invention, there is provided a kind of on-line bid method, methods described
Including:
Bid server by utilizing rivest, shamir, adelman generates at least two pairs unsymmetrical key, and respectively sends out public key information
Deliver to bid client;
Bid client makes tender documents, and received public key information is digitally signed and utilized using digital certificate
Tender documents by digital signature are encrypted;
Bid client will be sent to bid server by the tender documents of encryption;
Bid server receives the tender documents by encryption, and using corresponding private key to the throwing by encryption
Mark file is decrypted, to generate the tender documents of digital signature and digital signature verified;
In digital signature by the way that after checking, bid server extracts the project budget, project quality grade from tender documents
And project duration;
Weights of the bid server according to shared by project quality grade, the project budget and project duration are submitted a tender to each respectively
File is scored;And
Bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, wherein the bid client will be online before being sent to bid server by the tender documents of encryption
Submit tender bond.
Preferably, wherein the weights sum shared by the project quality grade, the project budget and project duration is 1.
Preferably, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid text
Part.
According to another aspect of the present invention, there is provided a kind of on-line bid system, the system includes:
Key is generated and transmitting element, and bid server by utilizing rivest, shamir, adelman generation at least two pairs is asymmetric close
Key, and respectively send to bid client public key information;
Tender documents ciphering unit, bid client makes tender documents, is digitally signed using digital certificate and profit
The tender documents by digital signature are encrypted with the public key information for being received;
The tender documents transmitting element of encryption, bid client will be sent to bid service by the tender documents of encryption
Device;
Decryption unit, bid server receives the tender documents by encryption, and using corresponding private key to warp
The tender documents for crossing encryption are decrypted, to generate the tender documents of digital signature and digital signature verified;
Extraction unit, in digital signature by the way that after checking, bid server extracts the project budget, project from tender documents
Credit rating and project duration;
Scoring unit, weights difference of the bid server according to shared by project quality grade, the project budget and project duration
Each tender documents is scored;And
Acceptance of the bid file chooses unit, and bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, wherein the bid client will be online before being sent to bid server by the tender documents of encryption
Submit tender bond.
Preferably, wherein the weights sum shared by the project quality grade, the project budget and project duration is 1.
Preferably, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid text
Part.
The beneficial effects of the present invention are:
1. the present invention carries out signature using digital certificate and rivest, shamir, adelman is encrypted, and is effectively improved bid
The Information Security of file, prevents tender documents to be tampered, and eliminates the potential safety hazard of bidding system presence.
2. weight of the present invention according to shared by project quality grade, the project budget and project duration is commented tender documents
Point, it is not related to subjective factor, it is fair and just.
Brief description of the drawings
By reference to the following drawings, illustrative embodiments of the invention can be more fully understood by:
Fig. 1 is the flow chart of the Bidding system 100 according to embodiment of the present invention;And
Fig. 2 is the structural representation of the bidding system 200 according to embodiment of the present invention.
Specific embodiment
With reference now to accompanying drawing, illustrative embodiments of the invention are introduced, however, the present invention can use many different shapes
Formula is implemented, and is not limited to embodiment described herein, there is provided these embodiments are to disclose at large and fully
The present invention, and fully pass on the scope of the present invention to person of ordinary skill in the field.For showing for being illustrated in the accompanying drawings
Term in example property implementation method is not limitation of the invention.In the accompanying drawings, identical cells/elements are attached using identical
Icon is remembered.
Unless otherwise indicated, term (including scientific and technical terminology) used herein has to person of ordinary skill in the field
It is common to understand implication.Further it will be understood that the term limited with usually used dictionary, is appreciated that and it
The linguistic context of association area has consistent implication, and is not construed as Utopian or excessively formal meaning.
Fig. 1 is the flow chart of the Bidding system 100 according to embodiment of the present invention.The Bidding system 100 as shown in Figure 1
Since step 101 place, at least two pairs unsymmetrical key are generated in step 101 bid server by utilizing rivest, shamir, adelman,
And respectively send to bid client public key information.Rivest, shamir, adelman is a kind of time slot scrambling of key.It is asymmetric to add
Close algorithm needs two keys:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography is close with privately owned
Key is a pair, if be encrypted to data with public-key cryptography, could only be decrypted with corresponding private cipher key;If with privately owned
Data key is encrypted, then could only be decrypted with corresponding public-key cryptography.Rivest, shamir, adelman realizes secret letter
Ceasing the basic process for exchanging is:Party A generates a pair of secret keys and using therein one open to other sides as Public key;
To the Public key Party B confidential information is encrypted using the key after be then forwarded to Party A;Party A is preserved with oneself again
Another private key is decrypted to the information after encryption.On the other hand, Party A can be using the public key of Party B to secret
Information is then forwarded to Party B after being signed;Party B carries out sign test with the private spoon of oneself to data again.The present invention is exactly clothes of submitting a tender
Business device generates key pair using rivest, shamir, adelman, and public-key cryptography is sent to client, and client utilizes public-key cryptography
Tender documents are encrypted, finally the bid text after the private cipher key pair encryption corresponding to bid server by utilizing public-key cryptography
Part is decrypted.Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, tender documents are made in step 102 bid client, is digitally signed using digital certificate and utilized
The public key information for being received is encrypted to the tender documents by digital signature.Digital signature is that a kind of being similar to is write on paper
Common physical signature, but it is the use of the technology realization in public key encryption field, the method for differentiating digital information.One tricks
Word signature generally defines two kinds of computings of complementation, and one is used to sign, and another is used to verify.Digital signature, is exactly only to believe
Others the hop count word string that cannot forge that the sender of breath could produce, this hop count word string is also simultaneously the sender to information
Send a valid certificates of information authenticity.
Preferably, bid server will be sent to by the tender documents of encryption in step 103 bid client.It is preferred that
Ground, wherein the bid client ensures bid is submitted before being sent to bid server by the tender documents of encryption online
Gold.
Preferably, the tender documents by encryption are received in step 104 bid server, and using corresponding private
Key is decrypted to the tender documents by encryption, to generate the tender documents of digital signature and digital signature tested
Card.
Preferably, step 105 digital signature by checking after, it is pre- that bid server extracts project from tender documents
Calculation, project quality grade and project duration.
Preferably, the power in step 106 bid server according to shared by project quality grade, the project budget and project duration
Value scores each tender documents respectively.Preferably, wherein the project quality grade, the project budget and project duration institute
The weights sum for accounting for is 1.For example, it is 10 points to set scoring, 1 point is a grade, and the weight shared by project quality grade is
0.5, weight shared by the project budget is 0.3, and the weight shared by project duration is 0.2, then the score value of each tender documents=
The score value * 0.2 of the score value * 0.3+ project durations of the score value * 0.5+ project budgets of project quality grade.
Preferably, the corresponding tender documents of highest scoring are chosen as acceptance of the bid file in step 107 bid server.It is excellent
Selection of land, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid file.
Fig. 2 is the structural representation of the bidding system 200 according to embodiment of the present invention.As shown in Fig. 2 the system that submits a tender
System 200 includes:Key is generated and transmitting element 201, tender documents ciphering unit 202, the tender documents transmitting element of encryption
203rd, decryption unit 204, extraction unit 205, scoring unit 206 and acceptance of the bid file choose unit 207.Preferably, given birth in key
Into and the bid server by utilizing rivest, shamir, adelman of transmitting element 201 generate at least two pairs unsymmetrical key, and respectively by public affairs
Key information is sent to bid client.Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, tender documents are made in the bid client of tender documents ciphering unit 202, line number is entered using digital certificate
Word is signed and utilizes received public key information to be encrypted the tender documents by digital signature.
Preferably, will be sent by the tender documents of encryption in the bid client of tender documents transmitting element 203 of encryption
Give bid server.Preferably, wherein the bid client will by encryption tender documents be sent to bid server it
It is preceding to submit tender bond online.
Preferably, the tender documents by encryption are received in the bid server of decryption unit 204, and using corresponding
Private key the tender documents by encryption are decrypted, to generate the tender documents of digital signature and digital signature carried out
Checking.
Preferably, extraction unit 205 digital signature by checking after, bid server extracts item from tender documents
Mesh budget, project quality grade and project duration.
Preferably, in the scoring bid server of unit 206 according to shared by project quality grade, the project budget and project duration
Weights each tender documents is scored respectively.Preferably, wherein the project quality grade, the project budget and project work
Weights sum shared by phase is 1.
Preferably, the corresponding tender documents of the bid server of unit 207 selection highest scoring are chosen in acceptance of the bid file to make
It is acceptance of the bid file.Preferably, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid
File.
The present invention is described by reference to a small amount of implementation method.However, it is known in those skilled in the art, as
What subsidiary Patent right requirement was limited, except the present invention other embodiments disclosed above equally fall of the invention
In the range of.
Normally, all terms for using in the claims are all solved according to them in the usual implication of technical field
Release, unless clearly defined in addition wherein.It is all of to be all opened ground with reference to " one/described/be somebody's turn to do [device, component etc.] "
At least one of described device, component etc. example is construed to, unless otherwise expressly specified.Any method disclosed herein
Step need not all be run with disclosed accurate order, unless explicitly stated otherwise.
Claims (10)
1. a kind of on-line bid method, it is characterised in that methods described includes:
Bid server by utilizing rivest, shamir, adelman generate at least two pairs unsymmetrical key, and respectively by public key information send to
Bid client;
Bid client makes tender documents, and received public key information is digitally signed and utilized using digital certificate to warp
The tender documents for crossing digital signature are encrypted;
Bid client will be sent to bid server by the tender documents of encryption;
Bid server receives the tender documents by encryption, and using corresponding private key to the bid text by encryption
Part is decrypted, to generate the tender documents of digital signature and digital signature verified;
In digital signature by the way that after checking, bid server extracts the project budget, project quality grade and item from tender documents
The mesh duration;
Weights of the bid server according to shared by project quality grade, the project budget and project duration are respectively to each tender documents
Scored;And
Bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
2. method according to claim 1, it is characterised in that bid client a pair of unsymmetrical key of correspondence.
3. method according to claim 1, it is characterised in that bid client will be sent to by the tender documents of encryption
Tender bond is submitted before bid server online.
4. method according to claim 1, it is characterised in that the project quality grade, the project budget and project duration
Shared weights sum is 1.
5. method according to claim 1, it is characterised in that for scoring identical tender documents, choose credit rating
Tender documents high are used as acceptance of the bid file.
6. a kind of on-line bid system, it is characterised in that the system includes:
Key is generated and transmitting element, and bid server by utilizing rivest, shamir, adelman generates at least two pairs unsymmetrical key, and
Public key information is sent to bid client respectively;
Tender documents ciphering unit, bid client makes tender documents, and institute is digitally signed and utilized using digital certificate
The public key information of reception is encrypted to the tender documents by digital signature;
The tender documents transmitting element of encryption, bid client will be sent to bid server by the tender documents of encryption;
Decryption unit, bid server receives the tender documents for passing through encryption, and using corresponding private key to by adding
Close tender documents are decrypted, to generate the tender documents of digital signature and digital signature verified;
Extraction unit, in digital signature by the way that after checking, bid server extracts the project budget, project quality from tender documents
Grade and project duration;
Scoring unit, weights of the bid server according to shared by project quality grade, the project budget and project duration are respectively to every
Individual tender documents are scored;And
Acceptance of the bid file chooses unit, and bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
7. system according to claim 6, it is characterised in that bid client a pair of unsymmetrical key of correspondence.
8. system according to claim 6, it is characterised in that bid client will be sent to by the tender documents of encryption
Tender bond is submitted before bid server online.
9. system according to claim 6, it is characterised in that the project quality grade, the project budget and project duration
Shared weights sum is 1.
10. system according to claim 6, it is characterised in that for scoring identical tender documents, choose credit rating
Tender documents high are used as acceptance of the bid file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611064317.7A CN106789927A (en) | 2016-11-28 | 2016-11-28 | A kind of on-line bid method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611064317.7A CN106789927A (en) | 2016-11-28 | 2016-11-28 | A kind of on-line bid method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106789927A true CN106789927A (en) | 2017-05-31 |
Family
ID=58901898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611064317.7A Pending CN106789927A (en) | 2016-11-28 | 2016-11-28 | A kind of on-line bid method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789927A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107256481A (en) * | 2017-06-09 | 2017-10-17 | 深圳市斯维尔科技股份有限公司 | Receive Withdrawing method, device, terminal and computer-readable recording medium |
CN108055272A (en) * | 2017-12-21 | 2018-05-18 | 广州科瑞工程信息咨询有限公司 | Tender documents screening technique and system based on remote authorization |
CN109245896A (en) * | 2018-08-06 | 2019-01-18 | 上海汇招信息技术有限公司 | A kind of e-bidding method realizing CA and interconnecting |
CN109711191A (en) * | 2018-12-20 | 2019-05-03 | 佛山市建宇工程招标代理有限公司 | It invites and submit bids method and system |
CN110661814A (en) * | 2019-10-14 | 2020-01-07 | 江苏国泰新点软件有限公司 | Bidding file encryption and decryption method, device, equipment and medium |
CN111291122A (en) * | 2020-02-04 | 2020-06-16 | 重庆大学 | Competitive bidding method and device based on block chain |
CN111311368A (en) * | 2020-02-18 | 2020-06-19 | 江苏商贸职业学院 | Bidding management method and system |
CN111865893A (en) * | 2020-05-27 | 2020-10-30 | 福建亿能达信息技术股份有限公司 | Budget expenditure declaration system, equipment and medium based on public and private key encryption |
CN112688989A (en) * | 2020-12-08 | 2021-04-20 | 北京北信源软件股份有限公司 | Document transmission method and system |
CN113094725A (en) * | 2021-04-01 | 2021-07-09 | 北京优易惠技术有限公司 | Encryption and decryption method and system for remotely and centrally bidding documents |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020046335A1 (en) * | 1998-08-24 | 2002-04-18 | Birgit Baum-Waidner | System and method for providing commitment security among users in a computer network |
CN102664740A (en) * | 2012-05-02 | 2012-09-12 | 四川建设网有限责任公司 | Remote-authorization-based bidding document encryption and decryption method |
CN102663640A (en) * | 2012-05-02 | 2012-09-12 | 四川建设网有限责任公司 | Remote bidding method and system |
CN102684879A (en) * | 2012-05-02 | 2012-09-19 | 四川建设网有限责任公司 | Method and system for remote bid opening and bid evaluation |
CN102693478A (en) * | 2012-05-02 | 2012-09-26 | 四川建设网有限责任公司 | Trading method of bid security during bidding procedure and system thereof |
CN103136624A (en) * | 2011-11-29 | 2013-06-05 | 北京建龙重工集团有限公司 | On-line management method for engineering project bidding, tendering and bid evaluation |
CN104794643A (en) * | 2015-03-19 | 2015-07-22 | 布瑞克(苏州)农业信息科技有限公司 | Remote bidding and tendering method for agricultural products |
-
2016
- 2016-11-28 CN CN201611064317.7A patent/CN106789927A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020046335A1 (en) * | 1998-08-24 | 2002-04-18 | Birgit Baum-Waidner | System and method for providing commitment security among users in a computer network |
CN103136624A (en) * | 2011-11-29 | 2013-06-05 | 北京建龙重工集团有限公司 | On-line management method for engineering project bidding, tendering and bid evaluation |
CN102664740A (en) * | 2012-05-02 | 2012-09-12 | 四川建设网有限责任公司 | Remote-authorization-based bidding document encryption and decryption method |
CN102663640A (en) * | 2012-05-02 | 2012-09-12 | 四川建设网有限责任公司 | Remote bidding method and system |
CN102684879A (en) * | 2012-05-02 | 2012-09-19 | 四川建设网有限责任公司 | Method and system for remote bid opening and bid evaluation |
CN102693478A (en) * | 2012-05-02 | 2012-09-26 | 四川建设网有限责任公司 | Trading method of bid security during bidding procedure and system thereof |
CN104794643A (en) * | 2015-03-19 | 2015-07-22 | 布瑞克(苏州)农业信息科技有限公司 | Remote bidding and tendering method for agricultural products |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107256481A (en) * | 2017-06-09 | 2017-10-17 | 深圳市斯维尔科技股份有限公司 | Receive Withdrawing method, device, terminal and computer-readable recording medium |
CN108055272B (en) * | 2017-12-21 | 2021-05-18 | 广州科瑞工程信息咨询有限公司 | Remote authorization-based bid document screening method and system |
CN108055272A (en) * | 2017-12-21 | 2018-05-18 | 广州科瑞工程信息咨询有限公司 | Tender documents screening technique and system based on remote authorization |
CN109245896A (en) * | 2018-08-06 | 2019-01-18 | 上海汇招信息技术有限公司 | A kind of e-bidding method realizing CA and interconnecting |
CN109245896B (en) * | 2018-08-06 | 2021-08-10 | 上海汇招信息技术有限公司 | Electronic bidding method for realizing CA interconnection and intercommunication |
CN109711191A (en) * | 2018-12-20 | 2019-05-03 | 佛山市建宇工程招标代理有限公司 | It invites and submit bids method and system |
CN110661814A (en) * | 2019-10-14 | 2020-01-07 | 江苏国泰新点软件有限公司 | Bidding file encryption and decryption method, device, equipment and medium |
CN111291122A (en) * | 2020-02-04 | 2020-06-16 | 重庆大学 | Competitive bidding method and device based on block chain |
CN111291122B (en) * | 2020-02-04 | 2023-09-12 | 重庆大学 | Bidding method and device based on block chain |
CN111311368A (en) * | 2020-02-18 | 2020-06-19 | 江苏商贸职业学院 | Bidding management method and system |
CN111865893A (en) * | 2020-05-27 | 2020-10-30 | 福建亿能达信息技术股份有限公司 | Budget expenditure declaration system, equipment and medium based on public and private key encryption |
CN111865893B (en) * | 2020-05-27 | 2022-04-01 | 福建亿能达信息技术股份有限公司 | Budget expenditure declaration system, equipment and medium based on public and private key encryption |
CN112688989A (en) * | 2020-12-08 | 2021-04-20 | 北京北信源软件股份有限公司 | Document transmission method and system |
CN113094725A (en) * | 2021-04-01 | 2021-07-09 | 北京优易惠技术有限公司 | Encryption and decryption method and system for remotely and centrally bidding documents |
CN113094725B (en) * | 2021-04-01 | 2023-09-01 | 北京优易惠技术有限公司 | Encryption and decryption method and system for bidding documents opened remotely and intensively |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789927A (en) | A kind of on-line bid method and system | |
Aste et al. | Blockchain technologies: The foreseeable impact on society and industry | |
Böhme et al. | Bitcoin: Economics, technology, and governance | |
CN109005036B (en) | Block chain member management method and system based on identification cipher algorithm | |
US8626656B2 (en) | System and method for securing payment instruments | |
CN109840771A (en) | A kind of block chain intimacy protection system and its method based on homomorphic cryptography | |
CN106971302A (en) | A kind of threedimensional model based on block chain technology is really weighed and method of commerce | |
Hwang et al. | Securing on-line credit card payments without disclosing privacy information | |
CN101969640A (en) | Computing key generating method for mobile terminal equipment | |
US20050076218A1 (en) | Cryptographic electronic gift certificate cross-reference to related applications | |
JP7174977B2 (en) | Payment device, method, computer program | |
Wu et al. | New sealed-bid electronic auction with fairness, security and efficiency | |
Luo et al. | Offline transferable E-cash mechanism | |
CN1845164A (en) | Fair safe electronic exchange method without third party | |
Parkes et al. | Achieving trust without disclosure: Dark pools and a role for secrecy-preserving verification | |
Bhaskar et al. | Verito: A Practical System for Transparency and Accountability in Virtual Economies. | |
CN111369251B (en) | Block chain transaction supervision method based on user secondary identity structure | |
Liao et al. | A trustworthy Internet auction model with verifiable fairness | |
Wang et al. | Bitcoin for E-Commerce: Principles and Applications | |
Tiwari et al. | Minning of Bitcoin Technology | |
Thammarat et al. | A secure SMS mobile payment protocol ensuring fair exchange | |
CN113486408B (en) | Deposit receipt management system and method based on block chain | |
JP2003242383A (en) | System and method for network auction | |
Kareem | Hybrid public key encryption algorithms for e-commerce | |
Gollin | Verification of the integrity and legitimacy of academic credential documents in an international setting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |