CN112738058A - Encryption method and device for remote off-site evaluation data transmission - Google Patents

Encryption method and device for remote off-site evaluation data transmission Download PDF

Info

Publication number
CN112738058A
CN112738058A CN202011554712.XA CN202011554712A CN112738058A CN 112738058 A CN112738058 A CN 112738058A CN 202011554712 A CN202011554712 A CN 202011554712A CN 112738058 A CN112738058 A CN 112738058A
Authority
CN
China
Prior art keywords
identifier
review
information table
evaluation
expert
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011554712.XA
Other languages
Chinese (zh)
Other versions
CN112738058B (en
Inventor
柏明昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Luban Beijing Electronic Commerce Technology Co ltd
Original Assignee
Luban Beijing Electronic Commerce Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luban Beijing Electronic Commerce Technology Co ltd filed Critical Luban Beijing Electronic Commerce Technology Co ltd
Priority to CN202011554712.XA priority Critical patent/CN112738058B/en
Publication of CN112738058A publication Critical patent/CN112738058A/en
Application granted granted Critical
Publication of CN112738058B publication Critical patent/CN112738058B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an encryption method and device for remote off-site evaluation data transmission, and belongs to the field of data processing. The method comprises the following steps: acquiring an evaluation project identifier corresponding to evaluation project information, a supplier identifier corresponding to supplier identity information, an evaluation expert identifier corresponding to evaluation expert identity information and an evaluation result identifier corresponding to an evaluation result; obtaining bid evaluation data of a plurality of review experts, wherein the bid evaluation data comprises supplier identity information, corresponding review project information and corresponding review results; and generating an evaluation data message according to the evaluation project identifier, the supplier identifier, the evaluation expert identifier and the evaluation result identifier. By adopting the invention, the safety of data transmission can be improved.

Description

Encryption method and device for remote off-site evaluation data transmission
Technical Field
The invention relates to the field of data processing, in particular to an encryption method and device for remote off-site evaluation data transmission.
Background
With the development of informatization, particularly the popularization and application of electronic bidding and evaluation, remote off-site bid evaluation is gradually accepted and implemented as a new bid evaluation mode in the field of electronic bidding and evaluation. The remote off-site bid evaluation method has the advantages that due to the particularity of work, high requirements are provided for the safety of the bid data of a supplier, the safety of the bid evaluation identity of an expert and the safety of the bid evaluation data, and high requirements are provided for the data transmission efficiency under the condition of the remote off-site bid evaluation internet network.
In the existing bid evaluation tool, a traditional communication mode in a local area network is adopted, and the problems of large data transmission quantity, unencrypted data and the like exist. By building the external network server, the original local area network application tool is applied to the Internet, and due to the original technical defects, a program is blocked in the remote off-site bid evaluation process, the data security is poor, and leakage of supplier quoted price data, expert information and expert bid evaluation data is easily caused.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide an encryption method and apparatus for remotely transmitting bid evaluation data. The technical scheme is as follows:
in a first aspect, an encryption method for remote bidding data transmission is provided, the method comprising:
when a preset statistical period is reached, determining an index value of a graph database according to the total data of the graph database, and updating the recorded index value based on the currently determined index value;
in each statistical period, acquiring incremental data of the graph database in a preset time length every time the preset time length passes, determining a current index value of the graph database according to the incremental data and the currently recorded index value, and updating the recorded index value based on the currently determined index value;
when an index value acquisition request sent by target equipment is received, the index value acquisition request is fed back based on the currently recorded index value.
Optionally, the index value includes one or more of a total node number, a total edge number, super node information, network density, maximum out-degree node information, maximum in-degree node information, degree distribution, a number of connected graphs, and a node number of a maximum connected graph, where the super node information is information of a node whose edge number exceeds a preset threshold.
Optionally, the determining a current index value of the graph database according to the incremental data and the currently recorded index value includes:
according to the incremental data, determining an index value increment corresponding to the incremental data;
and determining the current index value of the graph database according to the index value increment and the currently recorded index value.
Optionally, the method further comprises:
receiving a service statistical function sent by the target equipment, and detecting the legality of the service statistical function;
if the business statistical function is legal, determining an extended index value corresponding to the business statistical function according to the business statistical function and the total data in the graph database;
and sending the extended index value to the target equipment.
Optionally, the feeding back the index value obtaining request based on the currently recorded index value includes:
and sending the currently recorded index value to the target equipment.
Optionally, the feeding back the index value obtaining request based on the currently recorded index value includes:
determining a first time point for receiving the index value acquisition request;
determining the current index value of the graph database according to incremental data of the graph database in a time period between the first time point and the time point of updating the index value last time and the currently recorded index value;
and sending the currently determined index value to the target equipment.
In a second aspect, an encryption apparatus for remote off-site bidding data transmission is provided, the apparatus comprising:
the updating module is used for determining the index value of the graph database according to the total data of the graph database when a preset statistical period is reached, and updating the recorded index value based on the currently determined index value;
the updating module is further configured to, in each statistical period, acquire incremental data of the graph database in a preset time length every time the preset time length passes, determine a current index value of the graph database according to the incremental data and a currently recorded index value, and update the recorded index value based on the currently determined index value;
and the feedback module is used for feeding back the index value acquisition request based on the currently recorded index value when the index value acquisition request sent by the target equipment is received.
Optionally, the index value includes one or more of a total node number, a total edge number, super node information, network density, maximum out-degree node information, maximum in-degree node information, degree distribution, a number of connected graphs, and a node number of a maximum connected graph, where the super node information is information of a node whose edge number exceeds a preset threshold.
Optionally, the update module is configured to:
according to the incremental data, determining an index value increment corresponding to the incremental data;
and determining the current index value of the graph database according to the index value increment and the currently recorded index value.
Optionally, the apparatus further comprises:
the detection module is used for receiving the service statistical function sent by the target equipment and detecting the legality of the service statistical function;
a determining module, configured to determine, if the service statistics function is legal, an extended index value corresponding to the service statistics function according to the service statistics function and the full data in the graph database;
the feedback module is further configured to send the extended index value to the target device.
Optionally, the feedback module is configured to:
and sending the currently recorded index value to the target equipment.
Optionally, the feedback module is configured to:
when an index value acquisition request sent by target equipment is received, determining a first time point for receiving the index value acquisition request;
determining the current index value of the graph database according to incremental data of the graph database in a time period between the first time point and the time point of updating the index value last time and the currently recorded index value;
and sending the currently determined index value to the target equipment.
In a third aspect, there is provided a server comprising a processor and a memory, wherein the memory stores at least one instruction, and the at least one instruction is loaded and executed by the processor to implement the encryption method for remote benchmarking data transmission according to the first aspect.
In a fourth aspect, there is provided a computer-readable storage medium having stored therein at least one instruction, which is loaded and executed by the processor, to implement the encryption method for remote benchmarking data transmission according to the first aspect.
The technical scheme provided by the embodiment of the invention has the beneficial effects that at least:
in the embodiment of the invention, the identifier is used for replacing the specific meaning to generate the data message for transmission, and the data identifier is used for transferring the real meaning, so that the formed message has encryption property, and the security of data transmission is further improved. Moreover, the message is generated through the identifier, so that the data transmission quantity can be reduced, and the transmission efficiency can be improved. In addition, the method has certain universality, and the method can still be applicable when similar services are processed. In addition, the method is not technically related, can be applied to the blind programming language of the blind platform, and realizes the convenient integration of the heterogeneous system.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an encryption method for remotely transmitting bid evaluation data according to an embodiment of the present invention;
fig. 2 is a flowchart of an encryption method for remotely transmitting bid evaluation data according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an encryption apparatus for remotely transmitting bid evaluation data according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides an encryption method for remote benchmarking data transmission, as shown in fig. 1, the processing flow of the method can include the following steps:
in step 101, a first comparison information table of the review item information and the review item identifier, a second comparison information table of the supplier identity information and the supplier identifier, a third comparison information table of the review expert identity information and the review expert identifier, and a fourth comparison information table of the review result and the review result identifier are obtained.
In step 102, bid evaluation data of a plurality of review experts is obtained, and the bid evaluation data includes supplier identity information, corresponding review item information and corresponding review results.
In step 103, a review item identifier corresponding to the review item information is determined according to the review item information and the first comparison information table.
In step 104, a provider identifier corresponding to the provider identity information is determined according to the provider identity information and the second comparison information table.
In step 105, the identifiers of the review experts corresponding to the review experts are determined according to the identity information corresponding to the review experts and the third comparison information table.
In step 106, a review result identifier corresponding to the review result is determined according to the review result and the fourth comparison information table.
In step 107, a review data message is generated based on the review item identifier, the supplier identifier, the review expert identifier, and the review result identifier.
Optionally, generating a review data message according to the review item identifier, the supplier identifier, the review expert identifier, and the review result identifier, including:
and acquiring a preset initial identifier, a preset separation identifier and a preset message ending identifier of the message.
And generating an evaluation data message according to a preset message generation rule and according to the starting identifier, the separation identifier, the ending identifier, the evaluation project identifier, the supplier identifier, the evaluation expert identifier and the evaluation result identifier.
Optionally, according to a preset message generation rule, the method includes:
the separation identifier, the scoring data identifier, the separation identifier … …, and the end of message identifier are arranged in this order.
Wherein the set of review data identifiers includes, in order, an expert identifier, a vendor identifier, a review item identifier, and a review result identifier.
Optionally, the obtaining a first comparison information table of the review item information and the review item identifier, a second comparison information table of the provider identity information and the provider identifier, and a third comparison information table of the review expert identity information and the review expert identifier includes:
and generating a review project identifier corresponding to each review project information according to a preset first comparison information table generation algorithm, and correspondingly storing each review project information and the corresponding review project identifier.
And generating a supplier identifier corresponding to the supplier identity information according to a preset second comparison information table generation algorithm, and correspondingly storing the supplier identity information and the corresponding supplier identifier.
And generating an evaluation expert identifier corresponding to the evaluation expert identity information according to a preset third comparison information table generating algorithm, and correspondingly storing the evaluation expert identity information and the corresponding evaluation expert identifier.
Optionally, generating a review item identifier corresponding to each review item information according to a preset first comparison information table generation algorithm, where the method includes:
and calculating to obtain a plurality of numerical value pairs according to the initial value and the number of the evaluation project information and a preset first numerical value operation method.
And obtaining a preset comparison table of numerical values and letters, and determining letter pairs respectively corresponding to the numerical value pairs obtained through calculation according to the numerical value pairs obtained through calculation and the comparison table of the numerical values and the letters.
And determining the obtained plurality of letter pairs as the review item identifiers corresponding to the review item information according to the generation sequence.
Optionally, generating a provider identifier corresponding to the provider identity information according to a preset second comparison information table generating algorithm, including:
and calculating to obtain a plurality of numerical values according to the initial value and the number of suppliers and a preset second numerical value operation method.
And obtaining a preset comparison table of numerical values and character strings, and determining the character strings respectively corresponding to the numerical values obtained by calculation according to the numerical values obtained by calculation and the comparison table of the numerical values and the letters.
The obtained plurality of character strings are determined as provider identifiers corresponding to the provider identification information in the order of generation.
Optionally, generating an expert review identifier corresponding to the identity information of the expert review according to a preset third comparison information table generating algorithm, where the generating algorithm includes:
and calculating to obtain a plurality of numerical values according to the initial value and the number of the evaluation experts and a third preset numerical operation method.
And determining the plurality of calculated numerical values as the evaluation expert identifiers corresponding to the identity information of the evaluation experts according to the obtained sequence.
Optionally, after generating the bid evaluation data packet, the method further includes:
and decrypting the evaluation data message.
The decryption method comprises the following steps:
and acquiring a first comparison information table of the review project information and the review project identifier, a second comparison information table of the supplier identity information and the supplier identifier, a third comparison information table of the review expert identity information and the review expert identifier and a fourth comparison information table of the review result and the review result identifier.
And obtaining the bid evaluation data of the plurality of review experts corresponding to the bid evaluation data message according to the bid evaluation data message, the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table.
Optionally, obtaining the bid evaluation data of the multiple review experts corresponding to the bid evaluation data message according to the bid evaluation data message, the first comparison information table, the second comparison information table, the third comparison information table, and the fourth comparison information table, includes:
and determining a corresponding starting identifier, a separation identifier, an ending identifier, a review project identifier, a supplier identifier, a review expert identifier and a review result identifier in the review data message according to a preset message generation rule.
And determining the review item information corresponding to the review item identifier according to the review item identifier and the first comparison information table.
And determining the provider identity information corresponding to the provider identifier according to the provider identifier and the second comparison information table.
And determining the identity information corresponding to the evaluation expert identifier according to the evaluation expert identifier and the third comparison information table.
And determining the evaluation result corresponding to the evaluation result identifier according to the evaluation result identifier and the fourth comparison information table.
In the embodiment of the invention, the identifier is used for replacing the specific meaning to generate the data message for transmission, and the data identifier is used for transferring the real meaning, so that the formed message has encryption property, and the security of data transmission is further improved. Moreover, the message is generated through the identifier, so that the data transmission quantity can be reduced, and the transmission efficiency can be improved. In addition, the method has certain universality, and the method can still be applicable when similar services are processed. In addition, the method is not technically related, can be applied to the blind programming language of the blind platform, and realizes the convenient integration of the heterogeneous system.
The invention provides an encryption method for remote off-site evaluation data transmission, which can be realized by electronic equipment, wherein the electronic equipment can be a terminal or a server, the electronic equipment which encrypts evaluation data by using the encryption method to generate a message can be called an encryption end, and the electronic equipment which receives the encrypted message and decrypts the message can be called a decryption end. As shown in fig. 2, the processing flow of the method may include the following steps:
in step 201, a first comparison information table of the review item information and the review item identifier, a second comparison information table of the supplier identity information and the supplier identifier, a third comparison information table of the review expert identity information and the review expert identifier, and a fourth comparison information table of the review result and the review result identifier are obtained.
In one possible embodiment, the first comparison information table is used to convert the review item information into an identifier for covering the literal meaning, the second comparison information table is used to convert the supplier identity information into an identifier for covering the literal meaning, the third comparison information table is used to convert the review expert identity information into an identifier for covering the literal meaning, and the fourth comparison information table is used to convert the review result into an identifier for covering the literal meaning. Therefore, the evaluation related information is converted into the ciphertext to be sent, so that the evaluation related information is prevented from being acquired when a message is intercepted in the data transmission process by other people, and the encryption protection effect on the evaluation related information is realized.
The first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table may be pre-stored in the encryption-side electronic device and the decryption-side electronic device by the user, may be fixed, or may be temporarily generated according to a preset algorithm when in use.
The step of temporarily generating according to the preset algorithm may comprise the following steps 2011-2013:
and 2011, generating an evaluation project identifier corresponding to each evaluation project information according to a preset first comparison information table generation algorithm, and correspondingly storing each evaluation project information and the corresponding evaluation project identifier.
In a possible implementation manner, a start value is determined first, and the start value needs to be acquired by both the encryption-side electronic device and the decryption-side electronic device, and the method for acquiring the start value is not limited in this respect.
Then, the number of the review item information is determined, which is the number of the review items, for example, if the review item includes four items of form review, qualification review, responsiveness review, and price review, the number of the review item information is 4. The number of the review project information may be a numerical value temporarily input by a worker or a preset numerical value, which is not limited by the invention.
Then, according to the initial value and the number of the evaluation project information, a plurality of numerical value pairs are obtained through calculation according to a preset first numerical value operation method, the first numerical value operation method can be that two numerical values are obtained through preset operation according to the initial value, the two numerical values form one numerical value pair, the operation is repeated for N times, the number of the N is equal to the number of the evaluation project information, the specific operation method can be set by a worker according to the situation, and the method is not limited by the invention.
After determining the plurality of value pairs, obtaining a preset comparison table of values and letters, determining letter pairs corresponding to the plurality of value pairs obtained by calculation according to the plurality of value pairs obtained by calculation and the comparison table of values and letters, wherein the comparison table of values and letters is preset and stored, and determining the plurality of obtained letter pairs as review project identifiers corresponding to the review project information according to a generation sequence, for example, the correspondence between the review project information and the review project identifiers may be as shown in table 1 below.
TABLE 1
Serial number Reviewing project information Reviewing project information identifiers
1 Formal review RF
2 Qualification ED
3 Responsive review UI
4 Price review HS
Step 2012, generating a provider identifier corresponding to the provider identity information according to a preset second contrast information table generating algorithm, and storing the provider identity information in correspondence with the corresponding provider identifier.
In a possible embodiment, a plurality of values are calculated according to a preset second numerical operation method according to the initial value and the number of suppliers. The initial value may be the same as the initial value in step 2011, and the second numerical operation method may refer to the first numerical operation method in step 2011, which is not described herein again.
And then, acquiring a preset comparison table of numerical values and character strings, and determining the character strings respectively corresponding to the numerical values obtained by calculation according to the numerical values obtained by calculation and the comparison table of the numerical values and the letters. Finally, the obtained plurality of character strings are determined as the vendor identifiers corresponding to the vendor identification information in the order of generation, and the correspondence relationship between the vendors and the obtained vendor identifiers may be, for example, as shown in table 2 below.
TABLE 2
Serial number Suppliers of goods Supplier identifier
1 Supplier one 8475
2 Supplier two 7365
3 Supplier three 9776
And 2013, generating an evaluation expert identifier corresponding to the evaluation expert identity information according to a preset third comparison information table generating algorithm, and correspondingly storing the evaluation expert identity information and the corresponding evaluation expert identifier.
In a possible embodiment, a plurality of values are calculated according to a third preset numerical operation method according to the starting value and the number of review experts, where the starting value in this step may be the same as the starting value in step 2011 and the starting value in step 2012, and the third numerical operation method may refer to the first numerical operation method in step 2011, which is not described herein again.
Then, the calculated values are determined as the identifiers of the review experts corresponding to the identity information of each review expert according to the obtaining sequence, for example, the identity information of the review expert and the generated identifiers of the review experts can be as shown in table 3 below.
TABLE 3
Serial number Evaluating expert identity information Review expert identifier
1 Expert 1 57
2 Expert 2 45
3 Expert 3 87
It should be noted that the method for generating the fourth comparison information table may refer to the method in step 2011-2013, which is not described herein again.
It should be noted that, in the above step 2011-2013, a method for temporarily generating the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table according to a preset algorithm is described, but of course, the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table may also be pre-stored and fixed, for example, the comparison relationship between the review item information and the review item information identifier in the first comparison information table may be as shown in the following table 4.
TABLE 4
Serial number Reviewing project information Reviewing project information identifiers
1 Formal review XS
2 Qualification ZG
3 Responsive review XY
4 Price review JG
The correlation between the vendor and vendor identifiers in the second comparison information table is shown in table 5 below.
TABLE 5
Serial number Suppliers of goods Supplier identifier
1 Supplier one 0001
2 Supplier two 0002
3 Supplier three 0003
The comparison relationship between the identity information of the review expert and the identifier of the review expert in the third comparison information table is shown in the following table 6.
TABLE 6
Serial number Evaluating expert identity information Review expert identifier
1 Expert 1 01
2 Expert 2 02
3 Expert 3 03
The comparison relationship between the review result and the review result identifier in the third comparison information table is shown in table 7 below.
TABLE 7
Serial number Result of evaluation Review result identifier
1 By passing 1
2 Do not pass through 0
In step 202, bid evaluation data of a plurality of review experts is obtained, and the bid evaluation data includes supplier identity information, corresponding review item information, and corresponding review results.
In a possible embodiment, the bid evaluation data includes a review result of each review expert reviewing each review item of each provider, and one review item information of one provider identity information corresponding to one review expert and a corresponding review result may be stored as one set of bid evaluation data, that is, the bid evaluation data includes a plurality of sets of such bid evaluation data, and the following describes the generated data message as one set of bid evaluation data.
In step 203, a review item identifier corresponding to the review item information is determined according to the review item information and the first comparison information table.
In one possible embodiment, the review item information of a group of the bid evaluation data in the bid evaluation data is queried in the first comparison information table, and then the review item identifier corresponding to the review item information is determined.
In step 204, a provider identifier corresponding to the provider identity information is determined according to the provider identity information and the second comparison information table.
In one possible embodiment, the supplier identification information of a group of evaluation data in the evaluation data is queried in the second control information table, so as to determine the supplier identifier corresponding to the supplier identification information.
In step 205, the identifier of the review expert corresponding to the review expert is determined according to the identity information corresponding to the review expert and the third comparison information table.
In one possible embodiment, the identity information corresponding to the review experts in a group of review data in the review data is queried in the third comparison information table to determine the review expert identifiers corresponding to the review experts.
In step 206, a review result identifier corresponding to the review result is determined according to the review result and the fourth comparison information table.
In one possible embodiment, the review result of a group of the bid evaluation data in the bid evaluation data is queried in the fourth comparison information table, and the review result identifier corresponding to the review result is determined.
In step 207, a preset start identifier, a partition identifier, and a message end identifier of the message are obtained.
In one possible implementation manner, the start identifier is used to identify a start position of a packet corresponding to the bid evaluation data, the separation identifier is used to identify a separation position of a packet corresponding to a group of bid evaluation data in the bid evaluation data, and the packet end identifier is used to identify an end position of a packet corresponding to the bid evaluation data.
In step 208, according to the preset message generation rule, a comment data message is generated according to the start identifier, the partition identifier, the end identifier, the comment project identifier, the supplier identifier, the comment expert identifier, and the comment result identifier.
In a possible embodiment, after the start identifier, the partition identifier, the end identifier, the review project identifier, the supplier identifier, the review expert identifier and the review result identifier are obtained through the above steps, the identifiers are combined into a message according to a preset message generation rule. There are many kinds of preset message generating rules, and the present invention provides one of the optional message generating rules: the separation identifier, the scoring data identifier, the separation identifier … …, and the end of message identifier are arranged in this order. Wherein the set of review data identifiers includes, in order, an expert identifier, a vendor identifier, a review item identifier, and a review result identifier.
For example, assume a starting identifier of RsThe separation identifier is GsEnd identifier is EotIf the first comparison information table is shown in table 4, the second comparison information table is shown in table 5, the third comparison information table is shown in table 6, and the fourth comparison information table is shown in table 7, the first segment of the message may be:
Rs Gs 01 0001XS 1Gs 01 0001ZG 0Gs Rs Eot
the primary messages are separated by spaces, wherein RsIdentifying the beginning and end of a segment of a message, EotAnd marking the end bit of one-time transmission of the message. One segment of the message is always RsAt first, RsAnd (6) ending. One transmission with EotAnd (6) ending. The corresponding meanings of the above message are as follows: expert 1 concluded a pass on the supplier one form and concluded a fail on the qualification section.
It should be noted that the start identifier, the separation identifier, and the end identifier need to use special identification symbols to distinguish plain texts, and preferably, ASCII codes corresponding to the start identifier, the separation identifier, and the end identifier may be as shown in table 8 below.
TABLE 8
Serial number Means of Identifier ASCII code
1 Start identifier Rs 30
2 Separation identifier Gs 29
3 Ending identifier Eot 4
In step 209, the evaluation data packet is decrypted.
In a feasible implementation manner, after the encryption end generates the bid evaluation data message, the encryption end sends the message to the decryption end, and the decryption end needs to decrypt the received bid evaluation data message, where the decryption method includes the following steps 2091 and 2092:
step 2091, obtain a first comparison information table of the review item information and the review item identifier, a second comparison information table of the provider identity information and the provider identifier, a third comparison information table of the review expert identity information and the review expert identifier, and a fourth comparison information table of the review result and the review result identifier.
It should be noted that the first comparison information table, the second comparison information table, the third comparison information table, and the fourth comparison information table acquired by the encryption end and the decryption end need to be ensured to be identical, so that the meaning of the data obtained after the message is decrypted is completely correct. The first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table obtained by the decryption end may be pre-stored, fixed or temporarily generated according to a preset algorithm, the step 2011 and 2013 are referred to according to a method for temporarily generating a preset algorithm, and it is necessary to ensure that the initial values of the encryption end and the decryption end are completely the same, the first comparison information table generation algorithm, the second comparison information table generation algorithm, the third comparison information table generation algorithm and the fourth comparison information table generation algorithm of the encryption end and the decryption end are completely the same, and a specific operation method is not described herein.
Step 2092, obtaining the bid evaluation data of the plurality of evaluation experts corresponding to the bid evaluation data message according to the bid evaluation data message, the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table.
Optionally, the decryption end may first determine, according to a preset message generation rule, a start identifier, a partition identifier, an end identifier, a review item identifier, a supplier identifier, a review expert identifier, and a review result identifier corresponding to the review data message. Then, according to the evaluation project identifier and the first reference information table, determining evaluation project information corresponding to the evaluation project identifier; determining provider identity information corresponding to the provider identifier according to the provider identifier and the second comparison information table; according to the evaluation expert identifier and the third comparison information table, determining identity information corresponding to the evaluation expert identifier; and determining the evaluation result corresponding to the evaluation result identifier according to the evaluation result identifier and the fourth comparison information table. Then, combining the review item information, the supplier identity information, the review experts and the review result, a set of review data can be obtained, that is, the review result of a review item of a supplier reviewed by a review expert can be obtained. And after the multiple sections of messages are decrypted, the bid evaluation data of a plurality of evaluation experts corresponding to the bid evaluation data message can be obtained.
In the embodiment of the invention, the identifier is used for replacing the specific meaning to generate the data message for transmission, and the data identifier is used for transferring the real meaning, so that the formed message has encryption property, and the security of data transmission is further improved. Moreover, the message is generated through the identifier, so that the data transmission quantity can be reduced, and the transmission efficiency can be improved. In addition, the method has certain universality, and the method can still be applicable when similar services are processed. In addition, the method is not technically related, can be applied to the blind programming language of the blind platform, and realizes the convenient integration of the heterogeneous system.
Based on the same technical concept, an embodiment of the present invention further provides an encryption apparatus for remotely transmitting bid evaluation data, where the apparatus may be an electronic device in the foregoing embodiment, and the electronic device may be a terminal or a server, as shown in fig. 3, and the apparatus includes: an acquisition unit 310, a determination unit 320, and a generation unit 330.
An obtaining unit 310, configured to obtain a first comparison information table of review item information and a review item identifier, a second comparison information table of provider identity information and a provider identifier, a third comparison information table of review expert identity information and a review expert identifier, and a fourth comparison information table of review result and a review result identifier;
the obtaining unit 310 is configured to obtain bid evaluation data of a plurality of review experts, where the bid evaluation data includes provider identity information, corresponding review item information, and corresponding review results;
a determining unit 320, configured to determine, according to the review item information and the first comparison information table, a review item identifier corresponding to the review item information;
the determining unit 320 is configured to determine, according to the provider identity information and the second comparison information table, a provider identifier corresponding to the provider identity information;
the determining unit 320 is configured to determine, according to the identity information corresponding to the review experts and the third comparison information table, review expert identifiers corresponding to the review experts respectively;
the determining unit 320 is configured to determine, according to the review result and the fourth comparison information table, a review result identifier corresponding to the review result;
the generating unit 330 is configured to generate a comment data packet according to the comment item identifier, the supplier identifier, the comment expert identifier, and the comment result identifier.
Optionally, the generating unit 330 is configured to:
acquiring a starting identifier, a separation identifier and a message ending identifier of a preset message;
and generating an evaluation data message according to a preset message generation rule and the starting identifier, the separation identifier, the ending identifier, the evaluation project identifier, the supplier identifier, the evaluation expert identifier and the evaluation result identifier.
Optionally, the generating unit 330 is configured to:
the separation identifier, the scoring data identifier, the scoring data identifier, the separation identifier … …, and the end of message identifier;
wherein the set of review data identifiers includes, in order, an expert identifier, a vendor identifier, a review item identifier, and a review result identifier.
Optionally, the obtaining unit 310:
generating a review project identifier corresponding to each review project information according to a preset first comparison information table generation algorithm, and correspondingly storing each review project information and the corresponding review project identifier;
generating a supplier identifier corresponding to the supplier identity information according to a preset second contrast information table generating algorithm, and correspondingly storing the supplier identity information and the corresponding supplier identifier;
and generating an evaluation expert identifier corresponding to the evaluation expert identity information according to a preset third comparison information table generating algorithm, and correspondingly storing the evaluation expert identity information and the corresponding evaluation expert identifier.
Optionally, the obtaining unit 310:
calculating to obtain a plurality of numerical value pairs according to the initial value and the number of the evaluation project information and a preset first numerical value operation method;
acquiring a preset comparison table of numerical values and letters, and determining letter pairs respectively corresponding to the numerical value pairs obtained through calculation according to the numerical value pairs obtained through calculation and the comparison table of the numerical values and the letters;
and determining the obtained plurality of letter pairs as the review item identifiers corresponding to the review item information according to the generation sequence.
Optionally, the obtaining unit 310:
calculating to obtain a plurality of numerical values according to the initial value and the number of suppliers and a preset second numerical value operation method;
acquiring a comparison table of preset numerical values and character strings, and determining the character strings respectively corresponding to the calculated numerical values according to the calculated numerical values and the comparison table of the numerical values and the letters;
the obtained plurality of character strings are determined as provider identifiers corresponding to the provider identification information in the order of generation.
Optionally, the obtaining unit 310:
calculating to obtain a plurality of numerical values according to the initial value and the number of the evaluation experts and a third preset numerical operation method;
and determining the plurality of calculated numerical values as the evaluation expert identifiers corresponding to the identity information of the evaluation experts according to the obtained sequence.
Optionally, the apparatus further comprises a decryption unit 340, the decryption unit 340 being configured to:
after the bid evaluation data message is generated, decrypting the bid evaluation data message;
acquiring a first comparison information table of review project information and a review project identifier, a second comparison information table of provider identity information and a provider identifier, a third comparison information table of review expert identity information and a review expert identifier and a fourth comparison information table of a review result and a review result identifier;
and obtaining the evaluation data of the plurality of evaluation experts corresponding to the evaluation data message according to the evaluation data message, the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table.
Optionally, the decryption unit 340 is configured to:
determining a starting identifier, a separation identifier, an ending identifier, a review project identifier, a supplier identifier, a review expert identifier and a review result identifier corresponding to the review data message according to a preset message generation rule;
determining review project information corresponding to the review project identifier according to the review project identifier and the first comparison information table;
determining provider identity information corresponding to the provider identifier according to the provider identifier and the second comparison information table;
according to the evaluation expert identifier and the third comparison information table, determining identity information corresponding to the evaluation expert identifier;
and determining a review result corresponding to the review result identifier according to the review result identifier and the fourth comparison information table.
In the embodiment of the invention, the identifier is used for replacing the specific meaning to generate the data message for transmission, and the data identifier is used for transferring the real meaning, so that the formed message has encryption property, and the security of data transmission is further improved. Moreover, the message is generated through the identifier, so that the data transmission quantity can be reduced, and the transmission efficiency can be improved. In addition, the method has certain universality, and the method can still be applicable when similar services are processed. In addition, the method is not technically related, can be applied to the blind programming language of the blind platform, and realizes the convenient integration of the heterogeneous system.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
It should be noted that: the encryption device for remote benchmarking data transmission provided in the above embodiment is only illustrated by the division of the above functional modules when feeding back information, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the encryption device for remote benchmarking data transmission provided by the above embodiment and the encryption method for remote benchmarking data transmission belong to the same concept, and the specific implementation process is described in the method embodiment and is not described herein again.
Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention, where the computer device may be a server in the foregoing embodiment. The computer device 400 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 401 and one or more memories 402, where the memory 402 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 401 to implement the encryption method for the remote benchmarking data transmission.
In an exemplary embodiment, there is also provided a computer-readable storage medium having at least one instruction stored therein, the at least one instruction being loaded and executed by a processor to implement the encryption method for remote benchmarking data transmission in the above-described embodiments. For example, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In the embodiment of the invention, when a preset statistical period is reached, the index value of the graph database is determined according to the total data of the graph database, and the recorded index value is updated based on the currently determined index value; in each statistical period, acquiring incremental data of the graph database in a preset time length every time the preset time length passes, determining a current index value of the graph database according to the incremental data and the currently recorded index value, and updating the recorded index value based on the currently determined index value; when an index value acquisition request sent by target equipment is received, the index value acquisition request is fed back based on the currently recorded index value. In this way, the server can calculate the index value in advance, and the index value does not need to be temporarily calculated when requested by the user, so that the feedback efficiency to the user is high. And the index value does not need to be determined according to the full data every time, the data amount processed by calculating the index value according to the incremental data is small, the calculation time is short, and the calculation efficiency is high.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. An encryption method for remote benchmarking data transmission, which is characterized in that the method comprises:
acquiring a first comparison information table of review project information and a review project identifier, a second comparison information table of provider identity information and a provider identifier, a third comparison information table of review expert identity information and a review expert identifier and a fourth comparison information table of a review result and a review result identifier;
obtaining bid evaluation data of a plurality of review experts, wherein the bid evaluation data comprises supplier identity information, corresponding review project information and corresponding review results;
determining a review project identifier corresponding to the review project information according to the review project information and the first comparison information table;
determining a supplier identifier corresponding to the supplier identity information according to the supplier identity information and the second comparison information table;
determining an identifier of the evaluation expert corresponding to the evaluation expert according to the identity information corresponding to the evaluation expert and the third comparison information table;
determining a review result identifier corresponding to the review result according to the review result and the fourth comparison information table;
and generating an evaluation data message according to the evaluation project identifier, the supplier identifier, the evaluation expert identifier and the evaluation result identifier.
2. The method of claim 1, wherein generating a review data message based on the review item identifier, the vendor identifier, the review expert identifier, and the review result identifier comprises:
acquiring a starting identifier, a separation identifier and a message ending identifier of a preset message;
and generating an evaluation data message according to a preset message generation rule and the starting identifier, the separation identifier, the ending identifier, the evaluation project identifier, the supplier identifier, the evaluation expert identifier and the evaluation result identifier.
3. The method according to claim 2, wherein the generating a rule according to a preset message comprises:
the separation identifier, the scoring data identifier, the scoring data identifier, the separation identifier … …, and the end of message identifier;
wherein the set of review data identifiers includes, in order, an expert identifier, a vendor identifier, a review item identifier, and a review result identifier.
4. The method of claim 1, wherein obtaining a first comparison information table of review item information and review item identifier, a second comparison information table of provider identity information and provider identifier, and a third comparison information table of review expert identity information and review expert identifier comprises:
generating a review project identifier corresponding to each review project information according to a preset first comparison information table generation algorithm, and correspondingly storing each review project information and the corresponding review project identifier;
generating a supplier identifier corresponding to the supplier identity information according to a preset second contrast information table generating algorithm, and correspondingly storing the supplier identity information and the corresponding supplier identifier;
and generating an evaluation expert identifier corresponding to the evaluation expert identity information according to a preset third comparison information table generating algorithm, and correspondingly storing the evaluation expert identity information and the corresponding evaluation expert identifier.
5. The method of claim 4, wherein the generating of the review item identifier corresponding to each review item information according to a preset first comparison information table generating algorithm comprises:
calculating to obtain a plurality of numerical value pairs according to the initial value and the number of the evaluation project information and a preset first numerical value operation method;
acquiring a preset comparison table of numerical values and letters, and determining letter pairs respectively corresponding to the numerical value pairs obtained through calculation according to the numerical value pairs obtained through calculation and the comparison table of the numerical values and the letters;
and determining the obtained plurality of letter pairs as the review item identifiers corresponding to the review item information according to the generation sequence.
6. The method according to claim 4, wherein the generating a provider identifier corresponding to the provider identity information according to a preset second contrast information table generating algorithm comprises:
calculating to obtain a plurality of numerical values according to the initial value and the number of suppliers and a preset second numerical value operation method;
acquiring a comparison table of preset numerical values and character strings, and determining the character strings respectively corresponding to the calculated numerical values according to the calculated numerical values and the comparison table of the numerical values and the letters;
the obtained plurality of character strings are determined as provider identifiers corresponding to the provider identification information in the order of generation.
7. The method according to claim 4, wherein the generating of the identifier of the review expert corresponding to the identity information of the review expert according to a preset third comparison information table generating algorithm comprises:
calculating to obtain a plurality of numerical values according to the initial value and the number of the evaluation experts and a third preset numerical operation method;
and determining the plurality of calculated numerical values as the evaluation expert identifiers corresponding to the identity information of the evaluation experts according to the obtained sequence.
8. The method of claim 1, wherein after generating the bid evaluation data message, the method further comprises:
decrypting the evaluation data message;
the decryption method comprises the following steps:
acquiring a first comparison information table of review project information and a review project identifier, a second comparison information table of provider identity information and a provider identifier, a third comparison information table of review expert identity information and a review expert identifier and a fourth comparison information table of a review result and a review result identifier;
and obtaining the evaluation data of the plurality of evaluation experts corresponding to the evaluation data message according to the evaluation data message, the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table.
9. The method according to claim 8, wherein obtaining the bid evaluation data of the plurality of review experts corresponding to the bid evaluation data message according to the bid evaluation data message, the first comparison information table, the second comparison information table, the third comparison information table and the fourth comparison information table comprises:
determining a starting identifier, a separation identifier, an ending identifier, a review project identifier, a supplier identifier, a review expert identifier and a review result identifier corresponding to the review data message according to a preset message generation rule;
determining review project information corresponding to the review project identifier according to the review project identifier and the first comparison information table;
determining provider identity information corresponding to the provider identifier according to the provider identifier and the second comparison information table;
according to the evaluation expert identifier and the third comparison information table, determining identity information corresponding to the evaluation expert identifier;
and determining a review result corresponding to the review result identifier according to the review result identifier and the fourth comparison information table.
10. An encryption device for remotely transmitting bid evaluation data, the device comprising:
the system comprises an acquisition unit, a comparison unit and a comparison unit, wherein the acquisition unit is used for acquiring a first comparison information table of review project information and a review project identifier, a second comparison information table of supplier identity information and a supplier identifier, a third comparison information table of review expert identity information and a review expert identifier and a fourth comparison information table of a review result and a review result identifier;
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring bid evaluation data of a plurality of review experts, and the bid evaluation data comprises supplier identity information, corresponding review project information and corresponding review results;
the determining unit is used for determining a review project identifier corresponding to the review project information according to the review project information and the first comparison information table;
the determining unit is configured to determine, according to the provider identity information and the second comparison information table, a provider identifier corresponding to the provider identity information;
the determining unit is used for determining the identifiers of the review experts respectively corresponding to the review experts according to the identity information corresponding to the review experts and the third comparison information table;
the determining unit is used for determining a review result identifier corresponding to the review result according to the review result and the fourth comparison information table;
and the generating unit is used for generating an evaluation data message according to the evaluation project identifier, the supplier identifier, the evaluation expert identifier and the evaluation result identifier.
CN202011554712.XA 2020-12-24 2020-12-24 Encryption method and device for remote off-site evaluation data transmission Active CN112738058B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011554712.XA CN112738058B (en) 2020-12-24 2020-12-24 Encryption method and device for remote off-site evaluation data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011554712.XA CN112738058B (en) 2020-12-24 2020-12-24 Encryption method and device for remote off-site evaluation data transmission

Publications (2)

Publication Number Publication Date
CN112738058A true CN112738058A (en) 2021-04-30
CN112738058B CN112738058B (en) 2022-11-11

Family

ID=75615633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011554712.XA Active CN112738058B (en) 2020-12-24 2020-12-24 Encryption method and device for remote off-site evaluation data transmission

Country Status (1)

Country Link
CN (1) CN112738058B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001022875A (en) * 1999-07-13 2001-01-26 Hitachi Ltd Electronic bidding system
CN103973633A (en) * 2013-01-25 2014-08-06 苏州精易会信息技术有限公司 Method for improving safety of extranet data applications
CN106060099A (en) * 2016-08-15 2016-10-26 北京奇虎科技有限公司 Data access method and system, and devices
CN110689415A (en) * 2019-10-14 2020-01-14 张家界新浪潮信息技术有限公司 Public resource transaction platform management system
CN110751544A (en) * 2019-10-18 2020-02-04 中国联合网络通信集团有限公司 Bidding information, supervision information and bid evaluation information processing method, terminal and system
CN111291122A (en) * 2020-02-04 2020-06-16 重庆大学 Competitive bidding method and device based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001022875A (en) * 1999-07-13 2001-01-26 Hitachi Ltd Electronic bidding system
CN103973633A (en) * 2013-01-25 2014-08-06 苏州精易会信息技术有限公司 Method for improving safety of extranet data applications
CN106060099A (en) * 2016-08-15 2016-10-26 北京奇虎科技有限公司 Data access method and system, and devices
CN110689415A (en) * 2019-10-14 2020-01-14 张家界新浪潮信息技术有限公司 Public resource transaction platform management system
CN110751544A (en) * 2019-10-18 2020-02-04 中国联合网络通信集团有限公司 Bidding information, supervision information and bid evaluation information processing method, terminal and system
CN111291122A (en) * 2020-02-04 2020-06-16 重庆大学 Competitive bidding method and device based on block chain

Also Published As

Publication number Publication date
CN112738058B (en) 2022-11-11

Similar Documents

Publication Publication Date Title
US20190244227A1 (en) Bulletin board information management system
CN108124480B (en) Software authorization method, system and equipment
CN111343142A (en) Data processing method and device based on block chain network and storage medium
CN110602455B (en) Video storage system, video processing method, device, equipment and storage medium
CN110134930A (en) Electronic contract management method, device, computer equipment and storage medium
CN109743161B (en) Information encryption method, electronic device and computer readable medium
CN112367164B (en) Service request processing method and device, computer equipment and storage medium
CN104301875A (en) Short message processing method and device
CN110928880A (en) Data processing method, device, terminal and medium based on block chain
JP5137046B1 (en) Series data protection method and series data protection program
CN110602085B (en) Method and device for sharing and processing data on block chain, storage medium and electronic equipment
CN101151874A (en) Network node and method for providing internet services on internet marketplaces
CN113259393B (en) Data forwarding method and device based on multi-level nodes
CN110955905A (en) Block chain based asset transfer method, device, equipment and readable storage medium
CN112801307B (en) Block chain-based federal learning method and device and computer equipment
CN112995357B (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
CN110738502A (en) bill processing method and device and storage medium device
CN114239026A (en) Information desensitization conversion processing method, device, computer equipment and storage medium
CN112738058B (en) Encryption method and device for remote off-site evaluation data transmission
CN111339547B (en) Method for generating data tag, electronic device and computer storage medium
CN114969803A (en) Data storage method, device and storage medium
CN112637231A (en) Authorization method, authorization device, storage medium and server
CN111597060A (en) Data calling method and device, computer equipment and storage medium
CN111125734B (en) Data processing method and system
CN110414963B (en) Method, device and storage medium for issuing resources sold by target channel manufacturer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Bai Mingchang

Inventor after: Hu Shurong

Inventor before: Bai Mingchang