CN109871678A - Procurement business data ciphering method, device, equipment and storage medium - Google Patents

Procurement business data ciphering method, device, equipment and storage medium Download PDF

Info

Publication number
CN109871678A
CN109871678A CN201910088290.2A CN201910088290A CN109871678A CN 109871678 A CN109871678 A CN 109871678A CN 201910088290 A CN201910088290 A CN 201910088290A CN 109871678 A CN109871678 A CN 109871678A
Authority
CN
China
Prior art keywords
business data
procurement business
procurement
ciphertext
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910088290.2A
Other languages
Chinese (zh)
Inventor
袁南生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Warren Tendering Co Ltd
Original Assignee
Guangdong Warren Tendering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Warren Tendering Co Ltd filed Critical Guangdong Warren Tendering Co Ltd
Priority to CN201910088290.2A priority Critical patent/CN109871678A/en
Publication of CN109871678A publication Critical patent/CN109871678A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the technical fields of computer technology, more particularly, to a kind of procurement business data ciphering method, device, equipment and storage medium, the procurement business data ciphering method includes: S10: obtaining procurement business data packet, and according to the Data Identification for obtaining the procurement business data packet;S20: using Encryption Algorithm to be encrypted for the procurement business data packet, obtains procurement business data ciphertext;S30: the procurement business data ciphertext is stored to database;S40: if the data for getting user's triggering check message, the digital certificate of the user is verified;S50: if the digital certificate authentication passes through, check that message transfers the corresponding procurement business data ciphertext according to the data, and send decruption key corresponding with the procurement business data ciphertext for the user.The present invention has the effect of reinforcing the safety of the data of bid and purchase project.

Description

Procurement business data ciphering method, device, equipment and storage medium
Technical field
The present invention relates to the technical fields of computer technology, more particularly, to a kind of procurement business data ciphering method, dress It sets, equipment and storage medium.
Background technique
Currently, can be purchased according to content in the file of bid in project for bidding, the content of buying includes material Material, engineering or service etc..
In for project for bidding, a large amount of data can be generated, these usual data can be according to each single item project for bidding The data of each project for bidding are stored in a data packet, store by the data packet into database by unit.Due to There are the trade secrets of company or enterprise for the data generated in project for bidding, therefore especially heavy to the safety of these data It wants.
Summary of the invention
The object of the present invention is to provide a kind of procurement business data of the safety of data for reinforcing bid and purchase project to add Decryption method, device, equipment and storage medium.
Foregoing invention purpose one of the invention has the technical scheme that
A kind of procurement business data ciphering method, the procurement business data ciphering method include:
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining the procurement business data packet;
S20: using Encryption Algorithm to be encrypted for the procurement business data packet, obtains procurement business data ciphertext;
S30: the procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of the user is verified;
S50: if the digital certificate authentication passes through, check that message transfers the corresponding procurement business number according to the data Decruption key corresponding with the procurement business data ciphertext is sent according to ciphertext, and for the user.
By using above-mentioned technical proposal, procurement business data packet is being sent and is being stored to before database, to buying Business datum is encrypted, and after obtaining procurement business data ciphertext after encryption, then simultaneously by the transmission of procurement business data ciphertext It stores into database, can guarantee the safety of data when transmitting data;Meanwhile in the data for getting user's triggering When checking message, the digital certificate of user is verified, to verify the permission that user calls procurement business data ciphertext, then to verifying Corresponding decruption key is sent by the user of verifying, can further guarantee the safety of procurement business data packet.
The present invention is further arranged to: the step S20 includes:
S21: the Encryption Algorithm is rivest, shamir, adelman, using the private key in the rivest, shamir, adelman to the buying Business data packet is encrypted, and the procurement business data ciphertext is obtained;
S22: digital certificate corresponding with each credit user is sent to credit user by CA technology.
By using above-mentioned technical proposal, procurement business data packet is encrypted using rivest, shamir, adelman, is made pair The encryption of procurement business data packet is different from the key of decryption, even if being stolen in the key encrypted to procurement business data packet, steals Taker can not also obtain the decryption second, to improve the safety of procurement business data packet.
The present invention is further arranged to: the step S30 includes:
S31: the index of the procurement business data ciphertext is calculated;
S32: obtaining the storage location of the procurement business data ciphertext according to the index, will be described according to the storage location Procurement business data ciphertext is stored into the database.
By using above-mentioned technical proposal, it is close to obtain procurement business data to calculate the index of procurement business data ciphertext The mode of the position of text in the database, procurement business data ciphertext is stored in the database, to optimize database Storage organization is calling procurement business data ciphertext convenient for user.
The present invention is further arranged to: after the step S32, the procurement business data ciphering method further include:
S321: time when each procurement business data ciphertext is stored to the database is obtained;
S322: the cryptographic Hash of each procurement business data ciphertext is calculated by hash algorithm;
S323: according to the sequence of the time, being ranked up the procurement business data ciphertext, and according to ranking results, from Second part of procurement business data ciphertext starts, the cryptographic Hash of a procurement business data ciphertext in addition, will Block chain structure is formed between every part of procurement business data ciphertext.
By using technical solution, the characteristic that can not be distorted of block chain technology is utilized, has been stored on block chain Whole procurement business data ciphertext, further improves the safety of procurement business data ciphertext;Meanwhile it being utilized in block chain The characteristic of distributed storage can make the procurement business data ciphertext storage organization more reasonable, convenient to the procurement business number According to transferring for ciphertext, the process of procurement business data ciphertext management is simplified.
The present invention is further arranged to: the step S50 includes:
S51: the data check that message includes the Data Identification, are obtained from the database according to the Data Identification pair The procurement business data ciphertext answered;
S52: public key corresponding with the procurement business data ciphertext is sent for the user, to the procurement business data ciphertext Into decryption, the procurement business data packet is obtained.
It is checked from data after user's trigger data checks message by using above-mentioned technical proposal and obtains number in message According to mark, corresponding procurement business data ciphertext and corresponding public key are being obtained from database by Data Identification, protected The safety for demonstrate,proving procurement business data ciphertext simultaneously, reads data convenient for database.
Foregoing invention purpose two of the invention has the technical scheme that
A kind of procurement business data encryption device, the procurement business data encryption device include:
Data acquisition module, for obtaining procurement business data packet, and according to the data mark for obtaining the procurement business data packet Know;
It is close to obtain procurement business data for using Encryption Algorithm to be encrypted for the procurement business data packet for encrypting module Text;
Memory module, for storing the procurement business data ciphertext to database;
Subscriber authentication module verifies the digital certificate of the user if the data for getting user's triggering check message;
It is corresponding described to check that message is transferred according to the data if passing through for the digital certificate authentication for read module Procurement business data ciphertext, and decruption key corresponding with the procurement business data ciphertext is sent for the user.
By using above-mentioned technical proposal, procurement business data packet is being sent and is being stored to before database, to buying Business datum is encrypted, and after obtaining procurement business data ciphertext after encryption, then simultaneously by the transmission of procurement business data ciphertext It stores into database, can guarantee the safety of data when transmitting data;Meanwhile in the data for getting user's triggering When checking message, the digital certificate of user is verified, to verify the permission that user calls procurement business data ciphertext, then to verifying Corresponding decruption key is sent by the user of verifying, can further guarantee the safety of procurement business data packet.
Foregoing invention purpose three of the invention has the technical scheme that
A kind of computer equipment, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, the processor realize above-mentioned procurement business data ciphering method when executing the computer program Step.
Foregoing invention purpose four of the invention has the technical scheme that
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the computer The step of above-mentioned procurement business data ciphering method is realized when program is executed by processor.
In conclusion advantageous effects of the invention are as follows:
Procurement business data packet is being sent and is being stored to before database, procurement business data are being encrypted, and is encrypting After obtain procurement business data ciphertext after, then procurement business data ciphertext is transmitted and is stored into database, can transmitted When data, guarantee the safety of data;Meanwhile when the data for getting user's triggering check message, the number of user is verified Certificate to verify the permission that user calls procurement business data ciphertext, then sends the user for being verified verifying corresponding Decruption key can further guarantee the safety of procurement business data packet.
Detailed description of the invention
Fig. 1 is a flow chart of procurement business data ciphering method in one embodiment of the invention;
Fig. 2 is the implementation flow chart of step S20 in procurement business data ciphering method in one embodiment of the invention;
Fig. 3 is the implementation flow chart of step S30 in procurement business data ciphering method in one embodiment of the invention;
Fig. 4 is another implementation flow chart in one embodiment of the invention in procurement business data ciphering method;
Fig. 5 is the implementation flow chart of step S50 in procurement business data ciphering method in one embodiment of the invention;
Fig. 6 is a functional block diagram of procurement business data encryption device in one embodiment of the invention;
Fig. 7 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
Embodiment one:
In one embodiment, as shown in Figure 1, being specifically included as follows the invention discloses a kind of procurement business data ciphering method Step:
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining procurement business data packet.
In the present embodiment, procurement business data packet refers in project for bidding, needs according to specific in project for bidding Content is purchased, thus the data acquisition system generated.Data Identification refers to the label for distinguishing each procurement business data packet.
Specifically, after project for bidding registration, by the exclusive number of system automatically generated, and using the number as the number According to mark.
S20: using Encryption Algorithm to be encrypted for procurement business data packet, obtains procurement business data ciphertext.
Specifically, the data in procurement business data packet are input in Encryption Algorithm, use the key pair of Encryption Algorithm This procurement business data are encrypted, and procurement business data ciphertext is obtained.
S30: procurement business data ciphertext is stored to database.
Specifically, it by way of calculating the position that procurement business data ciphertext stores in the database, is adopted getting After purchasing the position of business datum ciphertext in the database, procurement business data ciphertext is stored into database according to the position.
S40: if the data for getting user's triggering check message, the digital certificate of user is verified.
In the present embodiment, digital certificate be one through certificate authority digital signature comprising public-key cryptography owner The file of information and public-key cryptography, effect are that legal to possess disclosing of listing in certificate close by the user that lists in certification Key.Data check that message refers to and are triggered by user that the message of procurement business data is checked in request.
Specifically, it after the data for getting user's triggering check message, obtains and triggers the user that the data check message User identifier, check corresponding data according to whether the digital certificate that the user identifier verifies the user has permission.
S50: if digital certificate authentication passes through, checking that message transfers corresponding procurement business data ciphertext according to data, And decruption key corresponding with procurement business data ciphertext is sent for user.
Specifically, after the data certificate of user is verified, i.e., the user is credit user, then is checked and disappeared according to data Credit user is obtained in breath and requests the procurement business data checked, it is close that corresponding procurement business data are transferred from database Text, and decruption key corresponding with procurement business data ciphertext is sent for credit user.
It, can be in order to further ensure the safety of data preferably due to the digital certificate of user is uniquely corresponding with user Solution decruption key is corresponding with the digital certificate of user, acquiring each credit user to same a procurement data ciphertext Key is different.For example, have simultaneously credit user A and credit user B request procurement data ciphertext A is checked, then for The decruption key that credit user A and credit user B are sent can be according to the digital certificate A of credit user A and credit user B and Digital certificate B, the decruption key A and decruption key B being calculated, and decruption key A and decruption key B can be to buying industry Business data ciphertext is decrypted.
By using above-mentioned technical proposal, procurement business data packet is being sent and is being stored to before database, to buying Business datum is encrypted, and after obtaining procurement business data ciphertext after encryption, then simultaneously by the transmission of procurement business data ciphertext It stores into database, can guarantee the safety of data when transmitting data;Meanwhile in the data for getting user's triggering When checking message, the digital certificate of user is verified, to verify the permission that user calls procurement business data ciphertext, then to verifying Corresponding decruption key is sent by the user of verifying, can further guarantee the safety of procurement business data packet.
In one embodiment, as shown in Fig. 2, in step S20, that is, use Encryption Algorithm for the progress of procurement business data packet Encryption, obtains procurement business data ciphertext, specifically comprises the following steps:
S21: Encryption Algorithm is rivest, shamir, adelman, using the private key in rivest, shamir, adelman to procurement business data packet into Row encryption, obtains procurement business data ciphertext.
In the present embodiment, rivest, shamir, adelman is a kind of pair of file or the algorithm that data are encrypted, including To the private key that file or data are encrypted, and to the public key that encrypted file or data are decrypted, which is public Key a pair, and because encryption and decryption use two different keys, this algorithm is called asymmetric encryption calculation Method.
Specifically, using the private key in rivest, shamir, adelman, procurement business data packet is encrypted, obtains buying industry Business data ciphertext.
S22: digital certificate corresponding with each credit user is sent to credit user by CA technology.
Specifically, to guarantee between user in the transmitting safety of information on the net, authenticity, reliability, integrality and not The property denied not only needs to verify the identity reality of user, it is also desirable to have one to have authority, fairness, only The mechanism of one property is responsible for issuing and managing to each main body of e-commerce meeting domestic, world security electronic transaction protocol mark Quasi- safe Certificate in E-Commerce, CA system are answered wine and are given birth to.CA mechanism, also known as certificate award card (Certificate Authority) center is the authoritative institution of a responsible distribution & management digital certificate, it is as trusted third Side undertakes the responsibility that the legitimacy of public key in Public Key Infrastructure is examined.The center CA is that each user using public-key cryptography provides One digital certificate, to realize the distribution of public key and prove its legitimacy.The digital signature of CA mechanism prevents attacker from puppet Make and distort certificate.It is responsible for generating, distribute and managing the required digital certificate of all individuals for participating in communication, therefore is safety Core link.
In one embodiment, as shown in figure 3, in step s 30, i.e., storing procurement business data ciphertext to database, Specifically comprise the following steps:
S31: the index of procurement business data ciphertext is calculated.
In the present embodiment, in relational database, index be it is a kind of individually, physics to a column in database table or A kind of storage organization that the value of multiple row is ranked up, it is set and the corresponding Compass of a column or several train values in some table The logical pointer inventory of the data page of middle these values of physical label.The catalogue for functioning as books of index, can be according to mesh The page number in record is quickly found out required content.
Specifically, the index of procurement business data ciphertext is calculated.
S32: obtaining the storage location of procurement business data ciphertext according to index, according to storage location by procurement business data Ciphertext is stored into database.
Specifically, by calculate Data Identification index, obtain the position of the index in the database, due to the index with Encrypted packet is associated by way of mapping, therefore gets the position of the encrypted packet in the database, and according to The position stores encrypted packet into database.
In one embodiment, as shown in figure 4, in step S32, procurement business data ciphering method further include:
S321: time when each procurement business data ciphertext is stored to database is obtained.
In the present embodiment, which refers to when storing every a procurement business data ciphertext into database, at that time The specific time, for example, certain year is in such a month, and on such a day some, database gets procurement business data ciphertext, then by certain moon in year One day, several points were as the time.
S322: the cryptographic Hash of each procurement business data ciphertext is calculated by hash algorithm.
In the present embodiment, hash algorithm is exactly that the input (be called and be preliminary mapping pre-image) of random length is passed through Hashing algorithm is transformed into the output of regular length, which is exactly cryptographic Hash.
Specifically, each procurement business data ciphertext is sequentially input into hash algorithm, is calculated by hash algorithm The cryptographic Hash of every portion procurement business data ciphertext.
S323: according to the sequence of time, procurement business data ciphertext is ranked up, and according to ranking results, from second Part procurement business data ciphertext starts, the cryptographic Hash of a procurement business data ciphertext in addition, by every part of procurement business data Block chain structure is formed between ciphertext.
In the present embodiment, block chain refers to Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm etc. The new application mode of computer technology.
Specifically, using the irreversibility of time in block chain, according to the sequence of time, to procurement business data ciphertext into Row sequence, and according to ranking results, since second part of procurement business data ciphertext, a procurement business data ciphertext in addition Cryptographic Hash, will between every part of procurement business data ciphertext formed block chain structure.
In one embodiment, it as shown in figure 5, in step s 50, even digital certificate authentication passes through, is then looked into according to data See that message transfers corresponding procurement business data ciphertext, and close for user's transmission decryption corresponding with procurement business data ciphertext Key specifically comprises the following steps:
S51: data check that message includes Data Identification, obtain corresponding procurement business data from database according to Data Identification Ciphertext.
Specifically, when getting data and checking message, the buying industry that obtains user check is checked in message in the data The Data Identification for data of being engaged in, and the position of corresponding procurement business data ciphertext in the database is obtained according to the Data Identification, To obtain procurement business data ciphertext in this position.
S52: sending corresponding with procurement business data ciphertext public key for user, to procurement business data ciphertext into decryption, Obtain procurement business data packet.
Specifically, according to the digital certificate of the user, public key corresponding with the user is sent.Wherein it is possible to be to use to add Close algorithm calculates the digital certificate, obtains public key corresponding with the user.
Further, using the public key to, into decryption, obtaining procurement business data packet to procurement business data ciphertext.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment two:
In one embodiment, a kind of procurement business data encryption device is provided, the procurement business data encryption device and above-mentioned reality Procurement business data ciphering method in example is applied to correspond.As shown in fig. 6, the procurement business data encryption device includes that data obtain Modulus block 10, encrypting module 20, memory module 30, subscriber authentication module 40 and read module 50.Each functional module is described in detail It is as follows:
Data acquisition module 10, for obtaining procurement business data packet, and according to the Data Identification for obtaining procurement business data packet;
Encrypting module 20 obtains procurement business data ciphertext for using Encryption Algorithm to be encrypted for procurement business data packet;
Memory module 30, for storing procurement business data ciphertext to database;
Subscriber authentication module 40 verifies the digital certificate of user if the data for getting user's triggering check message;
Read module 50 checks that message transfers corresponding procurement business number according to data if passing through for digital certificate authentication Decruption key corresponding with procurement business data ciphertext is sent according to ciphertext, and for user.
Preferably, encrypting module 20 includes:
Submodule 21 is encrypted, is rivest, shamir, adelman for Encryption Algorithm, using the private key in rivest, shamir, adelman to adopting Purchase business data packet is encrypted, and procurement business data ciphertext is obtained;
Digital certificate generates submodule 22, for sending number corresponding with each credit user to credit user by CA technology Certificate.
Preferably, memory module 30 includes:
Computational submodule 31 is indexed, for calculating the index of procurement business data ciphertext;
Sub-module stored 32 will be adopted for obtaining the storage location of procurement business data ciphertext according to index according to storage location Purchase business datum ciphertext is stored into database.
Preferably, procurement business data encryption device further include:
Time-obtaining module 321, for obtaining time when each procurement business data ciphertext is stored to database;
Hash calculation module 322, for calculating the cryptographic Hash of each procurement business data ciphertext by hash algorithm;
Block chain builds module 323, for the sequence according to the time, is ranked up to procurement business data ciphertext, and according to row Sequence is as a result, since second part of procurement business data ciphertext, the cryptographic Hash of a procurement business data ciphertext in addition, by every part Block chain structure is formed between procurement business data ciphertext.
Preferably, read module 50 includes:
Ciphertext acquisition submodule 51 is checked that message includes Data Identification for data, is obtained from database according to Data Identification Corresponding procurement business data ciphertext;
Submodule 52 is decrypted, it is close to procurement business data for sending public key corresponding with procurement business data ciphertext for user Text obtains procurement business data packet into decryption.
Specific restriction about procurement business data encryption device may refer to above for procurement business data encryption The restriction of method, details are not described herein.Modules in above-mentioned procurement business data encryption device can be fully or partially through Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more The corresponding operation of modules.
Embodiment three:
In one embodiment, a kind of computer equipment is provided, which can be server, internal structure chart It can be as shown in Figure 7.The computer equipment includes processor, memory, network interface and the data connected by system bus Library.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non- Volatile storage medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and database. The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The computer is set Standby database is for storing procurement business data ciphertext.The network interface of the computer equipment is used to pass through with external terminal Network connection communication.To realize a kind of procurement business data ciphering method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor perform the steps of when executing computer program
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining procurement business data packet;
S20: using Encryption Algorithm to be encrypted for procurement business data packet, obtains procurement business data ciphertext;
S30: procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of user is verified;
S50: if digital certificate authentication passes through, check that message transfers corresponding procurement business data ciphertext according to data, and be User sends decruption key corresponding with procurement business data ciphertext.
Example IV:
In one embodiment, a kind of computer readable storage medium is provided, computer program, computer journey are stored thereon with It is performed the steps of when sequence is executed by processor
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining procurement business data packet;
S20: using Encryption Algorithm to be encrypted for procurement business data packet, obtains procurement business data ciphertext;
S30: procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of user is verified;
S50: if digital certificate authentication passes through, check that message transfers corresponding procurement business data ciphertext according to data, and be User sends decruption key corresponding with procurement business data ciphertext.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM(EPROM), electrically erasable ROM(EEPROM) or flash memory.Volatile memory may include Random-access memory (ram) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM(ESDRAM), synchronization link (Synchlink) DRAM(SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of procurement business data ciphering method, which is characterized in that the procurement business data ciphering method includes:
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining the procurement business data packet;
S20: using Encryption Algorithm to be encrypted for the procurement business data packet, obtains procurement business data ciphertext;
S30: the procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of the user is verified;
S50: if the digital certificate authentication passes through, check that message transfers the corresponding procurement business number according to the data Decruption key corresponding with the procurement business data ciphertext is sent according to ciphertext, and for the user.
2. procurement business data ciphering method as described in claim 1, which is characterized in that the step S20 includes:
S21: the Encryption Algorithm is rivest, shamir, adelman, using the private key in the rivest, shamir, adelman to the buying Business data packet is encrypted, and the procurement business data ciphertext is obtained;
S22: digital certificate corresponding with each credit user is sent to credit user by CA technology.
3. procurement business data ciphering method as described in claim 1, which is characterized in that the step S30 includes:
S31: the index of the procurement business data ciphertext is calculated;
S32: obtaining the storage location of the procurement business data ciphertext according to the index, will be described according to the storage location Procurement business data ciphertext is stored into the database.
4. procurement business data ciphering method as described in claim 1, which is characterized in that described after the step S32 Procurement business data ciphering method further include:
S321: time when each procurement business data ciphertext is stored to the database is obtained;
S322: the cryptographic Hash of each procurement business data ciphertext is calculated by hash algorithm;
S323: according to the sequence of the time, being ranked up the procurement business data ciphertext, and according to ranking results, from Second part of procurement business data ciphertext starts, the cryptographic Hash of a procurement business data ciphertext in addition, will Block chain structure is formed between every part of procurement business data ciphertext.
5. procurement business data ciphering method as described in claim 1, which is characterized in that the step S50 includes:
S51: the data check that message includes the Data Identification, are obtained from the database according to the Data Identification pair The procurement business data ciphertext answered;
S52: public key corresponding with the procurement business data ciphertext is sent for the user, to the procurement business data ciphertext Into decryption, the procurement business data packet is obtained.
6. a kind of procurement business data encryption device, which is characterized in that the procurement business data encryption device includes:
Data acquisition module, for obtaining procurement business data packet, and according to the data mark for obtaining the procurement business data packet Know;
It is close to obtain procurement business data for using Encryption Algorithm to be encrypted for the procurement business data packet for encrypting module Text;
Memory module, for storing the procurement business data ciphertext to database;
Subscriber authentication module verifies the digital certificate of the user if the data for getting user's triggering check message;
It is corresponding described to check that message is transferred according to the data if passing through for the digital certificate authentication for read module Procurement business data ciphertext, and decruption key corresponding with the procurement business data ciphertext is sent for the user.
7. procurement business data encryption device as claimed in claim 6, which is characterized in that the encrypting module includes:
Submodule is encrypted, is rivest, shamir, adelman for the Encryption Algorithm, using the private in the rivest, shamir, adelman Key encrypts the procurement business data packet, obtains the procurement business data ciphertext;
Digital certificate generates submodule, demonstrate,proves for sending number corresponding with each credit user to credit user by CA technology Book.
8. procurement business data encryption device as claimed in claim 6, which is characterized in that the memory module includes:
Computational submodule is indexed, for calculating the index of the procurement business data ciphertext;
Sub-module stored is deposited for obtaining the storage location of the procurement business data ciphertext according to the index according to described Storage space, which is set, stores the procurement business data ciphertext into the database.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 5 procurement business data ciphering method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realization procurement business data encryption side as described in any one of claim 1 to 5 when the computer program is executed by processor The step of method.
CN201910088290.2A 2019-01-29 2019-01-29 Procurement business data ciphering method, device, equipment and storage medium Pending CN109871678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910088290.2A CN109871678A (en) 2019-01-29 2019-01-29 Procurement business data ciphering method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910088290.2A CN109871678A (en) 2019-01-29 2019-01-29 Procurement business data ciphering method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109871678A true CN109871678A (en) 2019-06-11

Family

ID=66918253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910088290.2A Pending CN109871678A (en) 2019-01-29 2019-01-29 Procurement business data ciphering method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109871678A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784303A (en) * 2021-01-26 2021-05-11 政采云有限公司 File encryption method, device, system and storage medium
CN115694831A (en) * 2022-10-12 2023-02-03 南方电网数字电网研究院有限公司 Domain-control-based trusted computing authentication method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008166861A (en) * 2006-12-26 2008-07-17 Ntt Communications Kk File distribution system, file distribution method, encryption device, decryption key distribution unit, and program
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN109685448A (en) * 2018-11-27 2019-04-26 建经投资咨询有限公司 A kind of engineering project bidding Management method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008166861A (en) * 2006-12-26 2008-07-17 Ntt Communications Kk File distribution system, file distribution method, encryption device, decryption key distribution unit, and program
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN109685448A (en) * 2018-11-27 2019-04-26 建经投资咨询有限公司 A kind of engineering project bidding Management method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784303A (en) * 2021-01-26 2021-05-11 政采云有限公司 File encryption method, device, system and storage medium
CN112784303B (en) * 2021-01-26 2022-11-22 政采云有限公司 File encryption method, device, system and storage medium
CN115694831A (en) * 2022-10-12 2023-02-03 南方电网数字电网研究院有限公司 Domain-control-based trusted computing authentication method

Similar Documents

Publication Publication Date Title
CN111600908B (en) Data processing method, system, computer device and readable storage medium
JP5680115B2 (en) Transaction auditing for data security devices
TWI694709B (en) Blockchain-based electronic signature method and device, and electronic equipment
US8964976B2 (en) Secure storage and retrieval of confidential information
TW202001654A (en) Block chain-based content verification method and device, and electronic device
CN110942382B (en) Electronic contract generation method and device, computer equipment and storage medium
CN108322451A (en) Data processing method, device, computer equipment and storage medium
CN109615386A (en) KYC anti money washing method, apparatus, equipment and the medium of recurrent wrIting block chain
CN115296838B (en) Block chain-based data sharing method, system and storage medium
JP2008501176A (en) Information distribution system that protects privacy
JP2018534818A (en) System and method for secure digital sharing based on exchange between systems of two-layer double encrypted digital information keys
WO2019082442A1 (en) Data registration method, data decoding method, data structure, computer, and program
CN112215609B (en) House property user identity authentication method and device based on super account book and electronic equipment
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
US12118540B2 (en) Systems and methods for distributed data mapping
CN112149077B (en) Supply chain billing method, system and computer equipment based on block chain technology
CN109871678A (en) Procurement business data ciphering method, device, equipment and storage medium
US20220191034A1 (en) Technologies for trust protocol with immutable chain storage and invocation tracking
CN109146684B (en) Decentralized transaction verification method
CN116522356A (en) Data query method and device
TWI766171B (en) Account data processing method and account data processing system
WO2021019783A1 (en) Proprietor identity confirmation system, terminal, and proprietor identity confirmation method
JP7113589B2 (en) Information intermediation device, information provision device, and information acquisition device
CN116827653B (en) Data encryption and authorization management method based on Hyperledger Fabric alliance chain
WO2020230831A1 (en) Information transaction method, information user terminal, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190611

WD01 Invention patent application deemed withdrawn after publication