CN111861473A - Electronic bidding system and method - Google Patents

Electronic bidding system and method Download PDF

Info

Publication number
CN111861473A
CN111861473A CN202010762908.1A CN202010762908A CN111861473A CN 111861473 A CN111861473 A CN 111861473A CN 202010762908 A CN202010762908 A CN 202010762908A CN 111861473 A CN111861473 A CN 111861473A
Authority
CN
China
Prior art keywords
bidding
private key
server
information
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010762908.1A
Other languages
Chinese (zh)
Inventor
石健昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Light Technology Co ltd
Original Assignee
Guizhou Light Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Light Technology Co ltd filed Critical Guizhou Light Technology Co ltd
Priority to CN202010762908.1A priority Critical patent/CN111861473A/en
Publication of CN111861473A publication Critical patent/CN111861473A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of digital information security transmission, in particular to an electronic bidding system and a method, wherein the system comprises a server, the server is used for acquiring bidding information, the server is also used for generating a public and private key pair according to the bidding information, encrypting a private key certificate in the public and private key pair based on a Shamir threshold to obtain a plurality of private key ciphertexts, and generating a bidding tool according to a public key certificate in the public and private key pair; the server is also used for updating the bidding tool according to any private key ciphertext during bidding, and the updated bidding tool corresponds to the private key ciphertext one to one; the bidding tool is used for acquiring bidding information, encrypting the bidding information to acquire a bidding ciphertext and uploading the bidding ciphertext and the private key ciphertext to the server; and the server is also used for generating a private key certificate according to the plurality of private key ciphertexts based on a Shamir threshold when opening the bid, and decrypting the bid ciphertexts according to the private key certificate. By adopting the scheme, the security of the private key certificate can be effectively ensured.

Description

Electronic bidding system and method
Technical Field
The invention relates to the technical field of digital information safety transmission, in particular to an electronic bidding system and an electronic bidding method.
Background
As internet technology matures, various web-based application services, such as electronic bidding, have been rapidly developed. The electronic bidding is to electronize bidding documents on the basis of the traditional bidding, and to transmit and release the bidding documents by means of a computer and a network, thereby completing bidding activities. In the electronic bidding process, the electronic bidding documents are supervised through operations such as information encryption, authority management, access control and the like, so that the situations of electronic bidding document leakage and the like caused by human factors are reduced. Therefore, the safety of the electronic bidding document is especially important to realize the real electronic bidding management.
The existing electronic bidding is the same as the traditional bidding and is divided into public bidding and invitation bidding, wherein the invitation bidding refers to that a tenderer invites a specific bidder to bid in a bidding invitation mode, and generally tenderers decide the invited bidder according to specific business relationships and information of the tenderer, so that the invited bidders almost bid during bidding.
The electronic bidding document is mainly encrypted to ensure the security, the initial encryption mode is a symmetric encryption algorithm, the bidding party and the bidding party use the same symmetric key for encryption and decryption, but the symmetric keys for encryption and decryption are the same, so that the electronic bidding document encrypted by the bidding party can be decrypted by using the symmetric key after being obtained, the electronic bidding document of the bidding party is leaked, and the security of the electronic bidding document is not high. Therefore, improvement is subsequently carried out on the basis, an asymmetric encryption algorithm is adopted, the electronic bidding platform randomly generates a public and private key pair, a public key certificate is issued to a bidder, the private key certificate is stored, the bidder encrypts the electronic bidding document by using the public key certificate, and the electronic bidding platform decrypts the electronic bidding document by using the stored private key certificate when the bidding is started, so that bid evaluation is carried out. By adopting the encryption mode, even if the encrypted electronic bidding document and the encrypted public key certificate are obtained, decryption cannot be performed, so that the security of the electronic bidding document is improved, but the private key certificate is not safe due to the fact that no security guarantee measure is adopted, the private key certificate is easy to leak, and once the private key certificate is leaked, the security of the electronic bidding document cannot be guaranteed. And the condition of accidental public and private key pairs can occur due to the randomly generated public and private key pairs, so that the electronic bidding document is misunderstood and the electronic bidding document is leaked.
Therefore, in order to avoid the situation that the private key certificate is leaked, part of the electronic bidding platforms require that the electronic bidding documents are encrypted and uploaded by the bidders, the electronic bidding platforms only store the encrypted electronic bidding documents, the bidders upload the private key certificates when the electronic bidding platforms are opened, and the electronic bidding platforms decrypt the private key certificates to obtain the electronic bidding documents. The private key certificate is stored by the bidder, so that the condition that the electronic bidding document is leaked due to the fact that the private key certificate is leaked when the electronic bidding platform is attacked is avoided. However, in this way, when the bidder bids the bid, the bidder needs to acquire the encryption and decryption tool with high security and encrypt the electronic bidding document by using the encryption and decryption tool. Meanwhile, because the encryption key (or private key certificate) and the encryption and decryption tool of each bidder are different, during the bid opening period, the bidder needs to upload the corresponding encryption key (or private key certificate) and encryption and decryption tool, which results in an increase in bid opening workload of the bidder. Meanwhile, the electronic bidding platform needs to receive various private key certificates and encryption and decryption tools to complete decryption of the electronic bidding document, so that the workload of the electronic bidding platform is increased during bid opening, and the bid opening period is prolonged.
Disclosure of Invention
One of the objectives of the present invention is to provide an electronic bidding system to solve the technical problem of low security of the encrypted bidding documents in the prior art.
The invention provides a basic scheme I: the server is also used for generating a public and private key pair according to the bidding information, encrypting a private key certificate in the public and private key pair based on a Shamir threshold to obtain a plurality of private key ciphertexts and generating a bidding tool according to a public key certificate in the public and private key pair; the server is also used for updating the bidding tool according to any private key ciphertext during bidding, and the updated bidding tool corresponds to the private key ciphertext one to one; the bidding tool is used for acquiring bidding information, encrypting the bidding information to acquire a bidding ciphertext and uploading the bidding ciphertext and the private key ciphertext to the server; and the server is also used for generating a private key certificate according to the plurality of private key ciphertexts based on a Shamir threshold when opening the bid, and decrypting the bid ciphertexts according to the private key certificate.
Description of the nouns: the bidding information is a qualification pre-review file, a bidding file and the like uploaded by the bidding party; the private key certificate is a private key in a public and private key pair generated by adopting an asymmetric encryption technology; the public key certificate is a public key in a public and private key pair generated by adopting an asymmetric encryption technology; the bidding information is the qualification prequalification application document, the tender book and the like uploaded by the bidder.
The beneficial effects of the first basic scheme are as follows: public and private key pairs are generated according to the bidding information, and each public and private key pair corresponds to the bidding information one to one, so that the uniqueness of the public and private key pairs is ensured.
The method comprises the steps of encrypting the private key certificate based on a Shamir threshold to obtain a plurality of private key ciphertexts, and encrypting and segmenting the private key certificate, so that the safety of the private key certificate is guaranteed. During decryption, if a private key certificate is needed to be obtained, the private key certificate can be obtained only by obtaining the private key ciphertexts with the number larger than the specified number, so that the safety of the private key certificate is further ensured.
The bidding tool is used by the bidding party, when the bidding party bids, the bidding tool needs to be downloaded, any private key ciphertext is distributed to the bidding tool at the moment, the bidding tool is updated, and each bidding tool carries one private key ciphertext. The private key ciphertext is distributed to the bidder for storage, the private key certificate can be obtained only by obtaining multiple private key ciphertexts, the obtaining difficulty and the cracking difficulty of the private key certificate are increased, the risk of leakage of the private key certificate is reduced, and the safety of the private key certificate is further ensured.
When the bidding is started, the bidding party needs to upload the bidding ciphertext for bidding, the private key ciphertext is uploaded while the bidding ciphertext is uploaded, so that the server can acquire the private key ciphertext stored by the bidding party, the bidding party has requirements on the number of the bidding party, the number of the bidding party is multiple, the number of the corresponding private key ciphertexts is multiple, and the private key certificate can be generated only after the private key ciphertexts are acquired, so that the bidding ciphertext is decrypted to acquire bidding information, the normal operation of bidding is realized, and meanwhile, the safety of the private key certificate is also ensured.
The server further comprises an encryption rule generating module and a tool generating module, wherein the encryption rule generating module is used for generating an encryption rule according to a public key certificate in a public and private key pair, and the tool generating module is used for generating a bidding tool according to the encryption rule; the bidding information comprises bidding plaintext, and the encryption rule comprises the steps of obtaining the bidding plaintext and encrypting the bidding plaintext according to the public key certificate to obtain a bidding ciphertext.
Description of the nouns: the bidding plaintext is the original bidding document in the bidding information.
Has the advantages that: the setting of the encryption rule generation module realizes the generation of the encryption rule, and the setting of the tool generation module realizes the generation of the bidding tool. Through the setting of the bidding tool, the bidding information is conveniently uploaded by the bidding party, the encryption mode and the secret key of the bidding party are unified, the bidding party is not required to upload respective private key certificate and encryption and decryption tools, and the data volume and the workload of the electronic bidding platform during bidding are reduced.
Further, the encryption rule further comprises the steps of splitting the bidding plaintext into a business file, a technical file and a price file, encrypting the technical file and the price file according to the public key certificate to generate a key file, encrypting the business file according to the public key certificate to generate a secondary file, and encrypting the key file and the secondary file according to the public key certificate to obtain the bidding ciphertext.
Description of the nouns: the business documents are the documents of commercial credit worthiness and validity of the bidders, such as bidding insurance letters, the authorization and certification documents of the bidders, the united agreement provided by the united bidder, the credit worthiness certification of the company represented by the bidders, and the like; the technical document is an introductory document used for evaluating the technical strength and experience of the bidder; the price file is a file such as a bid price prepared according to the specifications of the bidding information.
Has the advantages that: the bidding plaintext is firstly split into different files to be encrypted, the files which are encrypted once are combined and then encrypted again, and the difficulty of cracking the bidding ciphertext is increased through multiple times of encryption, so that the safety of the bidding plaintext is ensured.
Further, a Shamir threshold parameter is preset in the server, the Shamir threshold parameter comprises a bid amount N, the server comprises a private key encryption module, and the private key encryption module is used for dividing the private key certificate into N sub-private keys according to the bid amount and generating a private key ciphertext according to the sub-private keys.
Has the advantages that: the bid amount N is set by the electronic bid platform or by the bidder, and determines the number of copies of the private key certificate and the upper limit of the number of bidders. The private key encryption module is arranged to realize the division and encryption of the private key certificate, so that the safety of the private key certificate is ensured.
Further, the Shamir threshold parameter further includes an opening amount T, and the server further includes a private key recovery module, where the private key recovery module is configured to obtain sub-private keys according to the private key ciphertexts when the number of the private key ciphertexts is greater than the opening amount, and combine the sub-private keys into a private key certificate according to the sub-private keys.
Has the advantages that: the bid opening quantity T is set by the electronic bid and tender platform or by the bid inviting party, the minimum value of the bid opening quantity T is 3, and when the bid opening quantity T is 3, the bid opening quantity T determines whether the current bid inviting is successful. And the private key recovery module is arranged to obtain the sub-private keys through the private key ciphertext meeting the bid opening quantity T so as to obtain the private key certificate, thereby realizing the smooth bid opening.
Further, the server comprises an information extraction module and a public and private key generation module, wherein the information extraction module is used for extracting key information from the bid information, and the public and private key generation module is used for generating a public and private key pair according to the key information.
Description of the nouns: the key information is extracted according to preset rules in the system, and can be the names of enterprises or departments such as a bid inviting party, a bid inviting organization, a trading center, a bid inviting supervision department and the like in the bid inviting information, and can also be the information of the line of the page number in the bid inviting document.
Has the advantages that: the bidding information of each bidding party is different, and the uniqueness of the public and private key pair corresponding to each bidding project is ensured by representing the difference of each bidding information through key information, so that the risk of leakage of the public and private key pair is reduced.
Further, the server is also used for decrypting the bid cryptograph according to the private key certificate to obtain a key file and a secondary file when opening the bid, and decrypting the secondary file according to the private key certificate to obtain a business file; the server is also used for generating an initial evaluation result according to the bid inviting information and the business documents, the initial evaluation result comprises an initial evaluation qualified result and an initial evaluation rejected result, and the server is also used for issuing the initial evaluation rejected result.
Has the advantages that: the business documents are business credit worthiness and validity documents of the bidders without influencing the bidding results, initial evaluation results are generated according to the bidding information and the business documents, when the initial evaluation results are qualified, the bidders are considered to meet the requirements of the bidders, and when the initial evaluation results are rejected, the bidders are considered to not meet the requirements of the bidders. When the initial evaluation result is the initial evaluation elimination, firstly, bidders can be directly eliminated, the subsequent bid evaluation time is shortened by reducing the number of bidders, the time cost of the bidders and the tenderer is saved, secondly, the bidders who are eliminated by the initial evaluation are published, the bidders can conveniently prepare for other purposes, the time cost is saved, meanwhile, the reason of bid failure can be known, experience is accumulated for next bid, thirdly, the bidders who are eliminated by the initial evaluation are published, the bidders are given the opportunity of correcting, business files can be modified, accordingly, the benefit of the bidders is prevented from being damaged due to small errors, meanwhile, the files which are supplemented and modified are only limited to the business files, namely, the bidders can only modify files which prove credit, and the bidding fairness is not influenced.
Further, the server is used for starting timing when issuing the initial evaluation result, generating an evaluation signal when the timing reaches a preset time length, and decrypting the key file according to a pre-stored private key certificate to obtain a technical file and a price file.
Has the advantages that: in the bidding process, an enterprise invited by the bidder is existed, and the enterprise invited by the bidder generally meets the bidding requirement of the bidder, and if the initial evaluation result is that the initial evaluation is eliminated, the enterprise is possibly caused by wrong data filling when the bidder makes the original bidding document, or the bidder uploads the original bidding document, the wrong version is uploaded, and if the bidder is directly eliminated, the enterprise is actually relatively great loss to the bidder and the bidder. Therefore, under the condition, the bidder is given a chance of supplementary modification, the bidder can carry out supplementary modification on the business file within a preset time length, the damage to benefits of the bidder and the bidder caused by some minor errors is avoided, and meanwhile, the supplementary modified file is limited to the business file, namely, the bidder can only modify the file which proves the credit worthiness, and the bidding fairness is not influenced. The setting of the preset time length represents that the bidder cannot wait indefinitely to correct the business document, and after the preset time length is reached, the key document is decrypted to obtain the technical document and the price document, so that the successful bid evaluation is ensured.
The server further comprises an initial evaluation module, wherein the initial evaluation module is used for respectively extracting credit data from the bidding information and the business documents, comparing the corresponding credit data one by one, and generating an initial evaluation result eliminated by initial evaluation when any credit data in the business documents does not meet the corresponding credit data in the bidding information.
Has the advantages that: the initial evaluation module is arranged to realize initial evaluation on the bidder, for example, if credit data is the enterprise operation age, and when the tenderer requires the enterprise operation age to be more than 20 years and the enterprise operation age of the bidder is 18 years, the tenderer does not meet the requirements of the tenderer, and an initial evaluation result with eliminated initial evaluation is generated; and if the enterprise operation age of the bidder is 22 years, the bidder meets the requirements of the tenderer, the next credit data is judged, and if all the credit data meet the requirements, an initial evaluation result with qualified initial evaluation is generated.
The second objective of the present invention is to provide an electronic bidding method.
The invention provides a second basic scheme: the electronic bidding method uses the electronic bidding system.
The second basic scheme has the beneficial effects that: by using the electronic bidding system, a plurality of private key ciphertexts are obtained according to the private key certificate based on the Shamir threshold, and the private key ciphertexts are distributed to the bidders, so that the safety of the private key certificate is guaranteed.
Drawings
FIG. 1 is a logic block diagram of an embodiment of the electronic bidding system of the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
examples
The electronic bidding system, as shown in fig. 1, includes a server and a client, where the client is used by a bidder or a tenderer, and the client and the server communicate through an SSL protocol, thereby ensuring the security and integrity of transmitted data. For the sake of distinction, a client used by a bidder is defined as a bidding client, and a client used by a tenderer is defined as a bidding client.
In this embodiment, invitation bidding is taken as an example for explanation, when a bidding requirement is generated by a bidding party, the bidding party compiles bidding information such as a pre-qualification document and a bidding document, and the bidding client is configured to obtain the bidding information and upload the bidding information to the server. The bidding information is a prequalification file, a bidding file and the like uploaded by the bidding party, and in this embodiment, the bidding information includes the bidding file and an invitation file, the invitation file is the total number of the invited bidding party and the name of the enterprise, and the bidding file includes the bidding opening time.
The server comprises an information extraction module, a public and private key generation module, an encryption rule generation module, a tool generation module, a private key encryption module, an invitation module, a private key distribution module, an opening module, a private key recovery module, a decryption module, an initial evaluation module and a publishing module.
The information extraction module is used for receiving the bid inviting information and extracting a plurality of items of key information from the bid inviting information, the number of the key information is M, and the value of M can be set according to requirements. The key information is extracted according to preset rules in the system, and can be the names of enterprises or departments such as a bid inviting party, a bid inviting organization, a trading center, a bid inviting supervision department and the like in the bid inviting information, and can also be the information of the line of the page number in the bid inviting document. Specifically, the information extraction module is preset with an extraction rule, in this embodiment, the extraction rule is to obtain the total number of pages M of the bid document, the formula information extraction module is configured to receive the bid information, and extract a plurality of items of key information from the bid information, the number of the key information is N, and the value of N can be set according to the number of layers to be encrypted. The key information is extracted according to preset rules in the system, and can be the names of enterprises or departments such as a bid inviting party, a bid inviting organization, a trading center, a bid inviting supervision department and the like in the bid inviting information, and can also be the information of the line of the page number in the bid inviting document. Specifically, the information extraction module is preset with an extraction rule, in this embodiment, the extraction rule is to obtain a total number of pages M of the bid document, obtain a page number X and a line number Y according to a formula M ÷ N ═ X … … Y, extract information of an X-th page Y-th line, a 2X-th page Y-th line, a NX-th page Y-th line as key information when a value of Y is not zero, and extract information of an X-th page Y + 1-th line, a 2X-th page Y + 1-th line. In other embodiments, the extraction rule is to extract the names of the tenderer, tendering organization, trading center, and tendering supervision department in the tendering document as key information, for example, the name of the extracted tenderer is a certain department of a certain enterprise.
The public and private key generation module is used for generating a public and private key pair according to the plurality of items of key information, the plurality of items of key information corresponding to the bidding project correspond to the public and private key pair, and the public and private key pair comprises a public key certificate and a private key certificate.
The encryption rule generation module is used for generating an encryption rule according to a public key certificate in the public and private key pair, specifically, the bid information comprises a bid plaintext, the bid plaintext is a bid file of a bidder, the encryption rule is used for obtaining the bid plaintext, the bid plaintext is divided into a business file, a technical file and a price file, the technical file and the price file are encrypted according to the public key certificate to generate a key file, the business file is encrypted according to the public key certificate to generate a secondary file, and the key file and the secondary file are encrypted according to the public key certificate to obtain a bid ciphertext.
The tool generation module is used for generating the bidding tool according to the encryption rule, and specifically, the encryption rule is packaged and packaged to form the bidding tool.
A Shamir threshold parameter is preset in the server and comprises a bid quantity N and an opening quantity T, the bid quantity N is equal to the total number of the invited bidders, and the opening quantity T is not less than one third of the bid quantity N, not more than two thirds of the bid quantity N and not less than 3.
The private key encryption module is used for dividing the private key certificate into N sub-private keys according to the bid amount N based on a Shamir threshold, and generating private key ciphertexts according to the sub-private keys, wherein the private key ciphertexts correspond to the sub-private keys one to one.
And the invitation module is used for issuing invitation information to a bidding client of the invitation party according to the enterprise name of the invitation file in the invitation information, and the bidding client is used for displaying the invitation information. When a bidder is interested in bidding information published by the bidder and wants to bid, the bidder compiles bidding information such as a pre-qualification application file, a tender book and the like.
The bidding client is used for sending the tool downloading signal to the server, and the private key distribution module is used for obtaining any private key ciphertext when receiving the tool downloading signal, updating the bidding tool according to the private key ciphertext and sending the updated bidding tool to the bidding client. The used private key ciphertext is not used, so the updated bidding tool corresponds to the private key ciphertext one to one.
The bidding client is further used for downloading the bidding tool, obtaining the bidding document and importing the bidding document into the bidding tool, the bidding tool is used for inputting the bidding document, the bidding document is the bidding plaintext, outputting the bidding ciphertext according to the bidding plaintext, and uploading the bidding ciphertext and the private key ciphertext corresponding to the bidding tool to the server. In other embodiments, the bid information further includes a prequalification application file, and the bid client is further configured to upload the bid ciphertext, the prequalification application file, and the private key ciphertext to the server in a packaged manner.
And the server is used for receiving the bid ciphertext and the private key ciphertext and respectively storing the bid ciphertext and the private key ciphertext.
And the bid opening module is used for generating an initial evaluation signal and sending the initial evaluation signal to the private key recovery module when the bid opening time is up, and simultaneously issuing the initial evaluation signal to the bid inviting client corresponding to the current bid inviting party and the bidding client of the bidding party participating in the current bid inviting.
The private key recovery module is used for calling the stored private key ciphertexts when receiving the initial evaluation signal, obtaining a private key certificate according to the private key ciphertexts based on a Shamir threshold algorithm, and sending the private key certificate to the decryption module. And when the number of the stored private key ciphertexts is less than the bid opening number T, the private key certificate cannot be obtained, and the bid re-bidding is required when the bid invitation is failed.
The decryption module is used for calling the stored bidding ciphertexts when receiving the private key certificate, decrypting the bidding ciphertexts according to the private key certificate to obtain the key file and the secondary file, decrypting the secondary file according to the private key certificate to obtain the business file, and sending the business file to the preliminary evaluation module.
The initial evaluation module is used for receiving the business documents, obtaining bidding information corresponding to the bidding items of the bidders, judging whether the bidders meet the requirements of the bidders according to the bidding information and the business documents, and generating initial evaluation results according to the judgment results, wherein the initial evaluation results comprise qualified initial evaluation and rejected initial evaluation. Specifically, corresponding credit worthiness data, such as the enterprise operation age, the number of high-level engineers in an enterprise, the number of medium-level engineers in the enterprise, whether the enterprise has certain qualifications or not, are respectively extracted from the bidding information and the business document, whether a bidder meets the requirements of the bidding party or not is judged by comparing the extracted credit worthiness data one by one, and when any credit worthiness data in the business document does not meet the corresponding credit worthiness data in the bidding information, an initial evaluation result which is eliminated initially is generated, and otherwise, an initial evaluation result which is qualified initially is generated. For example, when the tenderer requires that the enterprise operation year is more than 20 years and the enterprise operation year of the bidder is 18 years, the tenderer does not meet the requirements of the tenderer and generates an initial evaluation result with eliminated initial evaluation; and if the enterprise operation age of the bidder is 22 years, the bidder meets the requirements of the tenderer, the next credit data is judged, and if all the credit data meet the requirements, an initial evaluation result with qualified initial evaluation is generated.
And the publishing module is used for publishing the rejected initial evaluation results when the initial evaluation of all the bidders is completed. The bidding opening module stores preset duration, and the preset duration can be set according to requirements, and the preset duration is 24 hours in the embodiment. The bid opening module is also used for starting timing when issuing an initial evaluation result, and generating a bid evaluation signal and sending the bid evaluation signal to the decryption module when the timing reaches a preset time length.
And informing the bidders not meeting the requirements of the tenderers by issuing the initial evaluation results, and giving the tenderers a chance of supplementary modification, wherein the tenderers can carry out supplementary modification on the business files within a preset time length. The bidding client is also used for acquiring the supplementary modification file and sending the supplementary modification file to the server.
The decryption module is further used for decrypting the key file according to the private key certificate to obtain a technical file and a price file when the bid evaluation signal is received. And when evaluating the bidding, if the bidder uploads the supplementary modification file within the preset time length, evaluating the bidding according to the supplementary modification file, the technical file and the price file, and if the bidder does not upload the supplementary modification file within the preset time length, evaluating the bidding according to the business file, the technical file and the price file.
An electronic bidding system using the above electronic bidding system.
Whether the bidder in the invitation bidding or the bidder in the public bidding determines whether the bidding information meets the requirement or not, particularly, the bidder in the invitation bidding generally investigates and knows the bidding information in advance, so that the bidder generally meets the requirement of the tenderer, and the situation that the benefit of the bidder and the tenderer is damaged due to unqualified credit worthiness of the bidder caused by small human factors is avoided by giving the bidder the opportunity of supplementing and modifying the business documents. Meanwhile, the files which are supplemented and modified are only limited to business files, namely, the bidding party can only modify the files which prove credit worthiness, and the bidding fairness is not influenced.
Example two
The difference between the present embodiment and the first embodiment is: the embodiment also stores and updates the identity information and the transaction information of the tenderer and the bidder through a block chain technology, establishes an electronic tendering and bidding system with real and reliable information, reduces trust cost, and has the functions of data backup and traceability, thereby effectively preventing the information from being tampered.
The server also comprises an identity authentication module, a node registration module and a behavior recording module.
For convenience of explanation, the tenderer, the bidder, the bid appraiser, and the like are collectively referred to as a user in the present embodiment.
The identity verification module is used for acquiring registration information when a user registers on the electronic bidding system, verifying the identity of the registration information, and specifically, verifying the identity through an authority, for example, an authority database of a market supervision and management bureau or a public security department. The registration information comprises identity authentication information and/or enterprise credit information of the user, when the user is a tenderer or a bidder, the registration information comprises the identity authentication information and the enterprise credit information, and when the user is a bid appraiser, the registration information comprises the identity authentication information.
The node creating module is used for creating a distribution node of the user when the identity authentication module passes the identity authentication of the user, so that the user has a unique distribution node on the block chain.
The behavior recording module is used for acquiring operation data of a user and issuing the operation data to the block chain through the distribution nodes. For example, when the bidding is started, the bid evaluation data of the bid evaluation party is issued on the block chain, and each distribution node on the block chain synchronously updates the bid evaluation data. For example, after the bidder wins the bid, the bidder and the tenderer establish the cooperation relationship of the tendering and bidding at this time, the cooperation relationship of the tendering and bidding at this time is released on the block chain, and each distribution node on the block chain synchronously updates the cooperation relationship of the tendering and bidding at this time.
The block chain technology is used for monitoring and recording trading behaviors such as bid evaluation, bid winning and the like of the bid, so that the open transparency of the bid is realized, meanwhile, due to the fact that the block chain technology cannot be tampered, the information of the electronic bid system is prevented from being tampered, and due to the traceability of the block chain, the tracing of the bid behaviors is realized.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. Electronic bid inviting and bidding system, including the server, the server is used for acquireing bid inviting information, its characterized in that: the server is also used for generating a public and private key pair according to the bidding information, encrypting a private key certificate in the public and private key pair based on a Shamir threshold to obtain a plurality of private key ciphertexts, and generating a bidding tool according to a public key certificate in the public and private key pair;
the server is also used for updating the bidding tool according to any private key ciphertext during bidding, and the updated bidding tool corresponds to the private key ciphertext one to one;
the bidding tool is used for acquiring bidding information, encrypting the bidding information to acquire a bidding ciphertext and uploading the bidding ciphertext and the private key ciphertext to the server;
and the server is also used for generating a private key certificate according to the plurality of private key ciphertexts based on a Shamir threshold when opening the bid, and decrypting the bid ciphertexts according to the private key certificate.
2. The electronic bidding system according to claim 1, wherein: the server also comprises an encryption rule generating module and a tool generating module, wherein the encryption rule generating module is used for generating an encryption rule according to a public key certificate in a public and private key pair, and the tool generating module is used for generating a bidding tool according to the encryption rule; the bidding information comprises bidding plaintext, and the encryption rule comprises the steps of obtaining the bidding plaintext and encrypting the bidding plaintext according to the public key certificate to obtain a bidding ciphertext.
3. The electronic bidding system according to claim 2, wherein: the encryption rule further comprises the steps of splitting the bidding plaintext into a business file, a technical file and a price file, encrypting the technical file and the price file according to the public key certificate to generate a key file, encrypting the business file according to the public key certificate to generate a secondary file, and encrypting the key file and the secondary file according to the public key certificate to obtain a bidding ciphertext.
4. The electronic bidding system according to claim 1, wherein: the server is preset with a Shamir threshold parameter, the Shamir threshold parameter comprises a bid amount N, the server comprises a private key encryption module, and the private key encryption module is used for dividing a private key certificate into N parts of sub-private keys according to the bid amount and generating a private key ciphertext according to the sub-private keys.
5. The electronic bidding system according to claim 4, wherein: the Shamir threshold parameter further comprises an opening amount T, the server further comprises a private key recovery module, and the private key recovery module is used for obtaining sub private keys according to the private key cryptographs and combining the sub private keys into a private key certificate when the number of the private key cryptographs is larger than the opening amount.
6. The electronic bidding system according to claim 1, wherein: the server comprises an information extraction module and a public and private key generation module, wherein the information extraction module is used for extracting key information from the bidding information, and the public and private key generation module is used for generating a public and private key pair according to the key information.
7. The electronic bidding system according to claim 6, wherein: the server is also used for decrypting the bid cryptograph according to the private key certificate to obtain a key file and a secondary file when opening the bid, and decrypting the secondary file according to the private key certificate to obtain a business file; the server is also used for generating an initial evaluation result according to the bid inviting information and the business documents, the initial evaluation result comprises an initial evaluation qualified result and an initial evaluation rejected result, and the server is also used for issuing the initial evaluation rejected result.
8. The electronic bidding system of claim 7, wherein: the server is also used for starting timing when issuing the initial evaluation result, generating an evaluation signal when the timing reaches a preset time length, and decrypting the key file according to a prestored private key certificate to obtain a technical file and a price file.
9. The electronic bidding system of claim 7, wherein: the server also comprises an initial evaluation module, wherein the initial evaluation module is used for respectively extracting the credit data from the bidding information and the business documents, comparing the corresponding credit data one by one, and generating an initial evaluation result of eliminated initial evaluation when any credit data in the business documents does not meet the corresponding credit data in the bidding information.
10. An electronic bidding method, comprising: use of the electronic bidding system of any one of claims 1-9.
CN202010762908.1A 2020-07-31 2020-07-31 Electronic bidding system and method Pending CN111861473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010762908.1A CN111861473A (en) 2020-07-31 2020-07-31 Electronic bidding system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010762908.1A CN111861473A (en) 2020-07-31 2020-07-31 Electronic bidding system and method

Publications (1)

Publication Number Publication Date
CN111861473A true CN111861473A (en) 2020-10-30

Family

ID=72954235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010762908.1A Pending CN111861473A (en) 2020-07-31 2020-07-31 Electronic bidding system and method

Country Status (1)

Country Link
CN (1) CN111861473A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN112464270A (en) * 2020-12-30 2021-03-09 广汽本田汽车有限公司 Bidding file encryption and decryption method, equipment and storage medium
CN112926949A (en) * 2021-03-26 2021-06-08 武汉鸿宇未来科技有限公司 Multi-stage electronic bidding method and cloud platform
CN113254407A (en) * 2021-05-31 2021-08-13 上海万向区块链股份公司 Bid file storage method, system, medium and device based on block chain
CN113783690A (en) * 2021-09-10 2021-12-10 陕西华春网络科技股份有限公司 Tender inviting method and device based on authentication
CN113783689A (en) * 2021-09-10 2021-12-10 陕西华春网络科技股份有限公司 Method and device for processing bidding information
CN114022260A (en) * 2021-11-11 2022-02-08 陕西华春网络科技股份有限公司 Bidding method and device based on key designation, computer equipment and memory
CN116720773A (en) * 2023-06-06 2023-09-08 陕西华春网络科技股份有限公司 Bid-inviting method and device based on block bid evaluation
CN116757808A (en) * 2023-08-18 2023-09-15 江西省精彩纵横采购咨询有限公司 Automatic bidding document generation method and system based on big data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111538A (en) * 1999-10-05 2001-04-20 Dainippon Printing Co Ltd Communication system, method therefor, communication equipment and ic card
US20080235521A1 (en) * 2007-03-20 2008-09-25 Les Technologies Deltacrypt Method and encryption tool for securing electronic data storage devices
CN101655931A (en) * 2008-08-21 2010-02-24 东方钢铁电子商务有限公司 Electronic public bidding method based on digital certificate
CN103795523A (en) * 2014-01-14 2014-05-14 福州市勘测院 Multilayer electronic tender encryption and decryption system and method for electronic tendering
CN105790940A (en) * 2016-04-14 2016-07-20 广东省电子商务认证有限公司 Electronic bid-inviting and bidding system and method based on Shamir threshold
CN107682157A (en) * 2017-10-11 2018-02-09 河南理工大学 More mechanical properties base encryption methods based on LWE on a kind of new lattice
CN108512662A (en) * 2018-04-12 2018-09-07 上海海事大学 The hiding multimachine structure encryption method of support policy on a kind of lattice

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111538A (en) * 1999-10-05 2001-04-20 Dainippon Printing Co Ltd Communication system, method therefor, communication equipment and ic card
US20080235521A1 (en) * 2007-03-20 2008-09-25 Les Technologies Deltacrypt Method and encryption tool for securing electronic data storage devices
CN101655931A (en) * 2008-08-21 2010-02-24 东方钢铁电子商务有限公司 Electronic public bidding method based on digital certificate
CN103795523A (en) * 2014-01-14 2014-05-14 福州市勘测院 Multilayer electronic tender encryption and decryption system and method for electronic tendering
CN105790940A (en) * 2016-04-14 2016-07-20 广东省电子商务认证有限公司 Electronic bid-inviting and bidding system and method based on Shamir threshold
CN107682157A (en) * 2017-10-11 2018-02-09 河南理工大学 More mechanical properties base encryption methods based on LWE on a kind of new lattice
CN108512662A (en) * 2018-04-12 2018-09-07 上海海事大学 The hiding multimachine structure encryption method of support policy on a kind of lattice

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
温雅敏;涂淑琴;祖建樱;: "电子招投标系统的安全性研究", 华东交通大学学报, no. 02 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN112464270A (en) * 2020-12-30 2021-03-09 广汽本田汽车有限公司 Bidding file encryption and decryption method, equipment and storage medium
CN112926949A (en) * 2021-03-26 2021-06-08 武汉鸿宇未来科技有限公司 Multi-stage electronic bidding method and cloud platform
CN113254407A (en) * 2021-05-31 2021-08-13 上海万向区块链股份公司 Bid file storage method, system, medium and device based on block chain
CN113254407B (en) * 2021-05-31 2023-05-26 上海万向区块链股份公司 Bid and tendered file storage method, system, medium and equipment based on block chain
CN113783689B (en) * 2021-09-10 2023-12-01 陕西华春网络科技股份有限公司 Sign information processing method and device
CN113783690A (en) * 2021-09-10 2021-12-10 陕西华春网络科技股份有限公司 Tender inviting method and device based on authentication
CN113783689A (en) * 2021-09-10 2021-12-10 陕西华春网络科技股份有限公司 Method and device for processing bidding information
CN113783690B (en) * 2021-09-10 2023-12-12 陕西华春网络科技股份有限公司 Authentication-based bidding method and device
CN114022260A (en) * 2021-11-11 2022-02-08 陕西华春网络科技股份有限公司 Bidding method and device based on key designation, computer equipment and memory
CN116720773A (en) * 2023-06-06 2023-09-08 陕西华春网络科技股份有限公司 Bid-inviting method and device based on block bid evaluation
CN116720773B (en) * 2023-06-06 2024-02-13 陕西华春网络科技股份有限公司 Bid-inviting method and device based on block bid evaluation
CN116757808A (en) * 2023-08-18 2023-09-15 江西省精彩纵横采购咨询有限公司 Automatic bidding document generation method and system based on big data

Similar Documents

Publication Publication Date Title
CN111861473A (en) Electronic bidding system and method
US10917230B2 (en) Managing sensitive data elements in a blockchain network
CN110276613B (en) Block chain-based data processing apparatus, method, and computer-readable storage medium
DE69724235T2 (en) Computer system and software protection method
CN107851253B (en) Contract consensus method, consensus verification method, contract consensus system, consensus verification device, contract consensus device, computer-readable recording medium
CN111859437A (en) Electronic bidding document multi-layer encryption and decryption system for electronic bidding
EP2465246B1 (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
AU2019204712A1 (en) Managing sensitive data elements in a blockchain network
CN110458560B (en) Method and apparatus for transaction verification
EP3876473B1 (en) Managing housing scores using smart contracts in blockchain networks
US11386217B2 (en) Hybrid centralized and decentralized enterprise system
CN109547218B (en) Alliance link node key distribution and backup system for improving BIP (building information processing) protocol
US11526955B2 (en) Protocol-based system and method for establishing a multi-party contract
CN112257085A (en) Bidding processing method, system, equipment and medium based on block chain
CN109472698B (en) Public welfare supervision method and system based on block chain
US20230237437A1 (en) Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
CN112801778A (en) Federated bad asset blockchain
CN113094725A (en) Encryption and decryption method and system for remotely and centrally bidding documents
EP1878189B1 (en) Method and device for ensuring information integrity and non-repudiation over time
US11327946B2 (en) Hybrid centralized and decentralized enterprise system
CN111583041A (en) Block chain-based bond issue data storage and verification processing method and device
CN113037827A (en) Voting method based on block chain, self-organization management method and computer equipment
CN116263834A (en) Multi-issuer anonymous credentials for licensed blockchains
CN114846765B (en) Method and apparatus for providing decentralised identity verification
CN112581285B (en) Block chain-based account generation method, system and medium in stock right transaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000

Applicant after: Guangyike Data Technology Co.,Ltd.

Address before: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000

Applicant before: Guizhou Light Technology Co.,Ltd.

Country or region before: China