CN106789927A - A kind of on-line bid method and system - Google Patents

A kind of on-line bid method and system Download PDF

Info

Publication number
CN106789927A
CN106789927A CN201611064317.7A CN201611064317A CN106789927A CN 106789927 A CN106789927 A CN 106789927A CN 201611064317 A CN201611064317 A CN 201611064317A CN 106789927 A CN106789927 A CN 106789927A
Authority
CN
China
Prior art keywords
bid
tender documents
project
tender
documents
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611064317.7A
Other languages
Chinese (zh)
Inventor
贾楠
魏然
倪晓静
张明辉
周峰
周宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huadi Computer Group Co Ltd
Original Assignee
Huadi Computer Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huadi Computer Group Co Ltd filed Critical Huadi Computer Group Co Ltd
Priority to CN201611064317.7A priority Critical patent/CN106789927A/en
Publication of CN106789927A publication Critical patent/CN106789927A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0611Request for offers or quotes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of on-line bid method, including:Bid server by utilizing rivest, shamir, adelman generates at least two pairs unsymmetrical key, and respectively sends to bid client public key information;Bid client makes tender documents, is digitally signed and utilizes received public key information to be encrypted to the tender documents by digital signature using digital certificate;Bid client will be sent to bid server by the tender documents of encryption;Bid server receives the tender documents by encryption, and using being decrypted, to generate the tender documents of digital signature and digital signature verified;In digital signature by the way that after checking, bid server extracts the project budget, project quality grade and project duration from tender documents;Weights of the bid server according to shared by project quality grade, the project budget and project duration score each tender documents respectively;And bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.

Description

A kind of on-line bid method and system
Technical field
The present invention relates to on-line bid field, and more particularly, to a kind of on-line bid method and system.
Background technology
Bid is the concept corresponding with bid, and it refers to bidder at bid inviter is specific or not specifically invitation, according to The requirement that bidding document specifies, actively tender documents are submitted and for the purpose of acceptance of the bid in the when and where of regulation to bid inviter Behavior.The Basic practice of bid:Bidder obtains bidding document first, after earnest analytical study, works out tender document.Tender document reality It is a quotation untill the regulation bid opening date in matter, content must be signed very clearly after acceptance of the bid with bid inviter The contract important content to be included should be listed in all, and must not be recalled bidding documents before the deadline, be changed bidding documents quotation or to mark Book content makees substantial modifications.To prevent bidder from being withdrawn the tender after bid or refusing after acceptance of the bid signing contract, bid inviter is usual Require that bidder provides the tender bond of certain proportion or the amount of money.After bid inviter determines highest bidder, not middle target bidder Paid-up guarantee fund is to give returning.
At present, with the maturation of Internet technology, various network application services are rapidly developed.It is online to throw Mark system, consults the call for tender, purchase e-bidding file, makes bidding document, upload bid text by the specified network media Part, online opening of bid etc..
There is certain defect in existing on-line bid system, be mainly manifested in the Information Security to electronic bidding file Pay attention to inadequate, normally only tender documents are encrypted or are digitally signed, safety measure is not ideal enough, security performance is present The possibility that tender documents are tampered, causes great potential safety hazard;On the other hand, existing on-line bid system can not be from numerous Qualified tender documents are selected in tender documents, it is therefore necessary to introduce a kind of data safety performance more preferably and can select The technical scheme of acceptance of the bid file.
The content of the invention
In order to solve the above problems, according to an aspect of the invention, there is provided a kind of on-line bid method, methods described Including:
Bid server by utilizing rivest, shamir, adelman generates at least two pairs unsymmetrical key, and respectively sends out public key information Deliver to bid client;
Bid client makes tender documents, and received public key information is digitally signed and utilized using digital certificate Tender documents by digital signature are encrypted;
Bid client will be sent to bid server by the tender documents of encryption;
Bid server receives the tender documents by encryption, and using corresponding private key to the throwing by encryption Mark file is decrypted, to generate the tender documents of digital signature and digital signature verified;
In digital signature by the way that after checking, bid server extracts the project budget, project quality grade from tender documents And project duration;
Weights of the bid server according to shared by project quality grade, the project budget and project duration are submitted a tender to each respectively File is scored;And
Bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, wherein the bid client will be online before being sent to bid server by the tender documents of encryption Submit tender bond.
Preferably, wherein the weights sum shared by the project quality grade, the project budget and project duration is 1.
Preferably, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid text Part.
According to another aspect of the present invention, there is provided a kind of on-line bid system, the system includes:
Key is generated and transmitting element, and bid server by utilizing rivest, shamir, adelman generation at least two pairs is asymmetric close Key, and respectively send to bid client public key information;
Tender documents ciphering unit, bid client makes tender documents, is digitally signed using digital certificate and profit The tender documents by digital signature are encrypted with the public key information for being received;
The tender documents transmitting element of encryption, bid client will be sent to bid service by the tender documents of encryption Device;
Decryption unit, bid server receives the tender documents by encryption, and using corresponding private key to warp The tender documents for crossing encryption are decrypted, to generate the tender documents of digital signature and digital signature verified;
Extraction unit, in digital signature by the way that after checking, bid server extracts the project budget, project from tender documents Credit rating and project duration;
Scoring unit, weights difference of the bid server according to shared by project quality grade, the project budget and project duration Each tender documents is scored;And
Acceptance of the bid file chooses unit, and bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, wherein the bid client will be online before being sent to bid server by the tender documents of encryption Submit tender bond.
Preferably, wherein the weights sum shared by the project quality grade, the project budget and project duration is 1.
Preferably, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid text Part.
The beneficial effects of the present invention are:
1. the present invention carries out signature using digital certificate and rivest, shamir, adelman is encrypted, and is effectively improved bid The Information Security of file, prevents tender documents to be tampered, and eliminates the potential safety hazard of bidding system presence.
2. weight of the present invention according to shared by project quality grade, the project budget and project duration is commented tender documents Point, it is not related to subjective factor, it is fair and just.
Brief description of the drawings
By reference to the following drawings, illustrative embodiments of the invention can be more fully understood by:
Fig. 1 is the flow chart of the Bidding system 100 according to embodiment of the present invention;And
Fig. 2 is the structural representation of the bidding system 200 according to embodiment of the present invention.
Specific embodiment
With reference now to accompanying drawing, illustrative embodiments of the invention are introduced, however, the present invention can use many different shapes Formula is implemented, and is not limited to embodiment described herein, there is provided these embodiments are to disclose at large and fully The present invention, and fully pass on the scope of the present invention to person of ordinary skill in the field.For showing for being illustrated in the accompanying drawings Term in example property implementation method is not limitation of the invention.In the accompanying drawings, identical cells/elements are attached using identical Icon is remembered.
Unless otherwise indicated, term (including scientific and technical terminology) used herein has to person of ordinary skill in the field It is common to understand implication.Further it will be understood that the term limited with usually used dictionary, is appreciated that and it The linguistic context of association area has consistent implication, and is not construed as Utopian or excessively formal meaning.
Fig. 1 is the flow chart of the Bidding system 100 according to embodiment of the present invention.The Bidding system 100 as shown in Figure 1 Since step 101 place, at least two pairs unsymmetrical key are generated in step 101 bid server by utilizing rivest, shamir, adelman, And respectively send to bid client public key information.Rivest, shamir, adelman is a kind of time slot scrambling of key.It is asymmetric to add Close algorithm needs two keys:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography is close with privately owned Key is a pair, if be encrypted to data with public-key cryptography, could only be decrypted with corresponding private cipher key;If with privately owned Data key is encrypted, then could only be decrypted with corresponding public-key cryptography.Rivest, shamir, adelman realizes secret letter Ceasing the basic process for exchanging is:Party A generates a pair of secret keys and using therein one open to other sides as Public key; To the Public key Party B confidential information is encrypted using the key after be then forwarded to Party A;Party A is preserved with oneself again Another private key is decrypted to the information after encryption.On the other hand, Party A can be using the public key of Party B to secret Information is then forwarded to Party B after being signed;Party B carries out sign test with the private spoon of oneself to data again.The present invention is exactly clothes of submitting a tender Business device generates key pair using rivest, shamir, adelman, and public-key cryptography is sent to client, and client utilizes public-key cryptography Tender documents are encrypted, finally the bid text after the private cipher key pair encryption corresponding to bid server by utilizing public-key cryptography Part is decrypted.Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, tender documents are made in step 102 bid client, is digitally signed using digital certificate and utilized The public key information for being received is encrypted to the tender documents by digital signature.Digital signature is that a kind of being similar to is write on paper Common physical signature, but it is the use of the technology realization in public key encryption field, the method for differentiating digital information.One tricks Word signature generally defines two kinds of computings of complementation, and one is used to sign, and another is used to verify.Digital signature, is exactly only to believe Others the hop count word string that cannot forge that the sender of breath could produce, this hop count word string is also simultaneously the sender to information Send a valid certificates of information authenticity.
Preferably, bid server will be sent to by the tender documents of encryption in step 103 bid client.It is preferred that Ground, wherein the bid client ensures bid is submitted before being sent to bid server by the tender documents of encryption online Gold.
Preferably, the tender documents by encryption are received in step 104 bid server, and using corresponding private Key is decrypted to the tender documents by encryption, to generate the tender documents of digital signature and digital signature tested Card.
Preferably, step 105 digital signature by checking after, it is pre- that bid server extracts project from tender documents Calculation, project quality grade and project duration.
Preferably, the power in step 106 bid server according to shared by project quality grade, the project budget and project duration Value scores each tender documents respectively.Preferably, wherein the project quality grade, the project budget and project duration institute The weights sum for accounting for is 1.For example, it is 10 points to set scoring, 1 point is a grade, and the weight shared by project quality grade is 0.5, weight shared by the project budget is 0.3, and the weight shared by project duration is 0.2, then the score value of each tender documents= The score value * 0.2 of the score value * 0.3+ project durations of the score value * 0.5+ project budgets of project quality grade.
Preferably, the corresponding tender documents of highest scoring are chosen as acceptance of the bid file in step 107 bid server.It is excellent Selection of land, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid file.
Fig. 2 is the structural representation of the bidding system 200 according to embodiment of the present invention.As shown in Fig. 2 the system that submits a tender System 200 includes:Key is generated and transmitting element 201, tender documents ciphering unit 202, the tender documents transmitting element of encryption 203rd, decryption unit 204, extraction unit 205, scoring unit 206 and acceptance of the bid file choose unit 207.Preferably, given birth in key Into and the bid server by utilizing rivest, shamir, adelman of transmitting element 201 generate at least two pairs unsymmetrical key, and respectively by public affairs Key information is sent to bid client.Preferably, a pair of unsymmetrical key of one of bid client correspondence.
Preferably, tender documents are made in the bid client of tender documents ciphering unit 202, line number is entered using digital certificate Word is signed and utilizes received public key information to be encrypted the tender documents by digital signature.
Preferably, will be sent by the tender documents of encryption in the bid client of tender documents transmitting element 203 of encryption Give bid server.Preferably, wherein the bid client will by encryption tender documents be sent to bid server it It is preceding to submit tender bond online.
Preferably, the tender documents by encryption are received in the bid server of decryption unit 204, and using corresponding Private key the tender documents by encryption are decrypted, to generate the tender documents of digital signature and digital signature carried out Checking.
Preferably, extraction unit 205 digital signature by checking after, bid server extracts item from tender documents Mesh budget, project quality grade and project duration.
Preferably, in the scoring bid server of unit 206 according to shared by project quality grade, the project budget and project duration Weights each tender documents is scored respectively.Preferably, wherein the project quality grade, the project budget and project work Weights sum shared by phase is 1.
Preferably, the corresponding tender documents of the bid server of unit 207 selection highest scoring are chosen in acceptance of the bid file to make It is acceptance of the bid file.Preferably, wherein for scoring identical tender documents, choosing credit rating tender documents high as acceptance of the bid File.
The present invention is described by reference to a small amount of implementation method.However, it is known in those skilled in the art, as What subsidiary Patent right requirement was limited, except the present invention other embodiments disclosed above equally fall of the invention In the range of.
Normally, all terms for using in the claims are all solved according to them in the usual implication of technical field Release, unless clearly defined in addition wherein.It is all of to be all opened ground with reference to " one/described/be somebody's turn to do [device, component etc.] " At least one of described device, component etc. example is construed to, unless otherwise expressly specified.Any method disclosed herein Step need not all be run with disclosed accurate order, unless explicitly stated otherwise.

Claims (10)

1. a kind of on-line bid method, it is characterised in that methods described includes:
Bid server by utilizing rivest, shamir, adelman generate at least two pairs unsymmetrical key, and respectively by public key information send to Bid client;
Bid client makes tender documents, and received public key information is digitally signed and utilized using digital certificate to warp The tender documents for crossing digital signature are encrypted;
Bid client will be sent to bid server by the tender documents of encryption;
Bid server receives the tender documents by encryption, and using corresponding private key to the bid text by encryption Part is decrypted, to generate the tender documents of digital signature and digital signature verified;
In digital signature by the way that after checking, bid server extracts the project budget, project quality grade and item from tender documents The mesh duration;
Weights of the bid server according to shared by project quality grade, the project budget and project duration are respectively to each tender documents Scored;And
Bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
2. method according to claim 1, it is characterised in that bid client a pair of unsymmetrical key of correspondence.
3. method according to claim 1, it is characterised in that bid client will be sent to by the tender documents of encryption Tender bond is submitted before bid server online.
4. method according to claim 1, it is characterised in that the project quality grade, the project budget and project duration Shared weights sum is 1.
5. method according to claim 1, it is characterised in that for scoring identical tender documents, choose credit rating Tender documents high are used as acceptance of the bid file.
6. a kind of on-line bid system, it is characterised in that the system includes:
Key is generated and transmitting element, and bid server by utilizing rivest, shamir, adelman generates at least two pairs unsymmetrical key, and Public key information is sent to bid client respectively;
Tender documents ciphering unit, bid client makes tender documents, and institute is digitally signed and utilized using digital certificate The public key information of reception is encrypted to the tender documents by digital signature;
The tender documents transmitting element of encryption, bid client will be sent to bid server by the tender documents of encryption;
Decryption unit, bid server receives the tender documents for passing through encryption, and using corresponding private key to by adding Close tender documents are decrypted, to generate the tender documents of digital signature and digital signature verified;
Extraction unit, in digital signature by the way that after checking, bid server extracts the project budget, project quality from tender documents Grade and project duration;
Scoring unit, weights of the bid server according to shared by project quality grade, the project budget and project duration are respectively to every Individual tender documents are scored;And
Acceptance of the bid file chooses unit, and bid server chooses the corresponding tender documents of highest scoring as acceptance of the bid file.
7. system according to claim 6, it is characterised in that bid client a pair of unsymmetrical key of correspondence.
8. system according to claim 6, it is characterised in that bid client will be sent to by the tender documents of encryption Tender bond is submitted before bid server online.
9. system according to claim 6, it is characterised in that the project quality grade, the project budget and project duration Shared weights sum is 1.
10. system according to claim 6, it is characterised in that for scoring identical tender documents, choose credit rating Tender documents high are used as acceptance of the bid file.
CN201611064317.7A 2016-11-28 2016-11-28 A kind of on-line bid method and system Pending CN106789927A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611064317.7A CN106789927A (en) 2016-11-28 2016-11-28 A kind of on-line bid method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611064317.7A CN106789927A (en) 2016-11-28 2016-11-28 A kind of on-line bid method and system

Publications (1)

Publication Number Publication Date
CN106789927A true CN106789927A (en) 2017-05-31

Family

ID=58901898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611064317.7A Pending CN106789927A (en) 2016-11-28 2016-11-28 A kind of on-line bid method and system

Country Status (1)

Country Link
CN (1) CN106789927A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107256481A (en) * 2017-06-09 2017-10-17 深圳市斯维尔科技股份有限公司 Receive Withdrawing method, device, terminal and computer-readable recording medium
CN108055272A (en) * 2017-12-21 2018-05-18 广州科瑞工程信息咨询有限公司 Tender documents screening technique and system based on remote authorization
CN109245896A (en) * 2018-08-06 2019-01-18 上海汇招信息技术有限公司 A kind of e-bidding method realizing CA and interconnecting
CN109711191A (en) * 2018-12-20 2019-05-03 佛山市建宇工程招标代理有限公司 It invites and submit bids method and system
CN110661814A (en) * 2019-10-14 2020-01-07 江苏国泰新点软件有限公司 Bidding file encryption and decryption method, device, equipment and medium
CN111291122A (en) * 2020-02-04 2020-06-16 重庆大学 Competitive bidding method and device based on block chain
CN111311368A (en) * 2020-02-18 2020-06-19 江苏商贸职业学院 Bidding management method and system
CN111865893A (en) * 2020-05-27 2020-10-30 福建亿能达信息技术股份有限公司 Budget expenditure declaration system, equipment and medium based on public and private key encryption
CN112688989A (en) * 2020-12-08 2021-04-20 北京北信源软件股份有限公司 Document transmission method and system
CN113094725A (en) * 2021-04-01 2021-07-09 北京优易惠技术有限公司 Encryption and decryption method and system for remotely and centrally bidding documents

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020046335A1 (en) * 1998-08-24 2002-04-18 Birgit Baum-Waidner System and method for providing commitment security among users in a computer network
CN102664740A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote-authorization-based bidding document encryption and decryption method
CN102663640A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote bidding method and system
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
CN102693478A (en) * 2012-05-02 2012-09-26 四川建设网有限责任公司 Trading method of bid security during bidding procedure and system thereof
CN103136624A (en) * 2011-11-29 2013-06-05 北京建龙重工集团有限公司 On-line management method for engineering project bidding, tendering and bid evaluation
CN104794643A (en) * 2015-03-19 2015-07-22 布瑞克(苏州)农业信息科技有限公司 Remote bidding and tendering method for agricultural products

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020046335A1 (en) * 1998-08-24 2002-04-18 Birgit Baum-Waidner System and method for providing commitment security among users in a computer network
CN103136624A (en) * 2011-11-29 2013-06-05 北京建龙重工集团有限公司 On-line management method for engineering project bidding, tendering and bid evaluation
CN102664740A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote-authorization-based bidding document encryption and decryption method
CN102663640A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote bidding method and system
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
CN102693478A (en) * 2012-05-02 2012-09-26 四川建设网有限责任公司 Trading method of bid security during bidding procedure and system thereof
CN104794643A (en) * 2015-03-19 2015-07-22 布瑞克(苏州)农业信息科技有限公司 Remote bidding and tendering method for agricultural products

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107256481A (en) * 2017-06-09 2017-10-17 深圳市斯维尔科技股份有限公司 Receive Withdrawing method, device, terminal and computer-readable recording medium
CN108055272B (en) * 2017-12-21 2021-05-18 广州科瑞工程信息咨询有限公司 Remote authorization-based bid document screening method and system
CN108055272A (en) * 2017-12-21 2018-05-18 广州科瑞工程信息咨询有限公司 Tender documents screening technique and system based on remote authorization
CN109245896A (en) * 2018-08-06 2019-01-18 上海汇招信息技术有限公司 A kind of e-bidding method realizing CA and interconnecting
CN109245896B (en) * 2018-08-06 2021-08-10 上海汇招信息技术有限公司 Electronic bidding method for realizing CA interconnection and intercommunication
CN109711191A (en) * 2018-12-20 2019-05-03 佛山市建宇工程招标代理有限公司 It invites and submit bids method and system
CN110661814A (en) * 2019-10-14 2020-01-07 江苏国泰新点软件有限公司 Bidding file encryption and decryption method, device, equipment and medium
CN111291122A (en) * 2020-02-04 2020-06-16 重庆大学 Competitive bidding method and device based on block chain
CN111291122B (en) * 2020-02-04 2023-09-12 重庆大学 Bidding method and device based on block chain
CN111311368A (en) * 2020-02-18 2020-06-19 江苏商贸职业学院 Bidding management method and system
CN111865893A (en) * 2020-05-27 2020-10-30 福建亿能达信息技术股份有限公司 Budget expenditure declaration system, equipment and medium based on public and private key encryption
CN111865893B (en) * 2020-05-27 2022-04-01 福建亿能达信息技术股份有限公司 Budget expenditure declaration system, equipment and medium based on public and private key encryption
CN112688989A (en) * 2020-12-08 2021-04-20 北京北信源软件股份有限公司 Document transmission method and system
CN113094725A (en) * 2021-04-01 2021-07-09 北京优易惠技术有限公司 Encryption and decryption method and system for remotely and centrally bidding documents
CN113094725B (en) * 2021-04-01 2023-09-01 北京优易惠技术有限公司 Encryption and decryption method and system for bidding documents opened remotely and intensively

Similar Documents

Publication Publication Date Title
CN106789927A (en) A kind of on-line bid method and system
Aste et al. Blockchain technologies: The foreseeable impact on society and industry
Böhme et al. Bitcoin: Economics, technology, and governance
CN109005036B (en) Block chain member management method and system based on identification cipher algorithm
US8626656B2 (en) System and method for securing payment instruments
CN109840771A (en) A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN106971302A (en) A kind of threedimensional model based on block chain technology is really weighed and method of commerce
Hwang et al. Securing on-line credit card payments without disclosing privacy information
CN101969640A (en) Computing key generating method for mobile terminal equipment
US20050076218A1 (en) Cryptographic electronic gift certificate cross-reference to related applications
JP7174977B2 (en) Payment device, method, computer program
Wu et al. New sealed-bid electronic auction with fairness, security and efficiency
Luo et al. Offline transferable E-cash mechanism
CN1845164A (en) Fair safe electronic exchange method without third party
Parkes et al. Achieving trust without disclosure: Dark pools and a role for secrecy-preserving verification
Bhaskar et al. Verito: A Practical System for Transparency and Accountability in Virtual Economies.
CN111369251B (en) Block chain transaction supervision method based on user secondary identity structure
Liao et al. A trustworthy Internet auction model with verifiable fairness
Wang et al. Bitcoin for E-Commerce: Principles and Applications
Tiwari et al. Minning of Bitcoin Technology
Thammarat et al. A secure SMS mobile payment protocol ensuring fair exchange
CN113486408B (en) Deposit receipt management system and method based on block chain
JP2003242383A (en) System and method for network auction
Kareem Hybrid public key encryption algorithms for e-commerce
Gollin Verification of the integrity and legitimacy of academic credential documents in an international setting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531