CN109871678A - Procurement business data ciphering method, device, equipment and storage medium - Google Patents
Procurement business data ciphering method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN109871678A CN109871678A CN201910088290.2A CN201910088290A CN109871678A CN 109871678 A CN109871678 A CN 109871678A CN 201910088290 A CN201910088290 A CN 201910088290A CN 109871678 A CN109871678 A CN 109871678A
- Authority
- CN
- China
- Prior art keywords
- business data
- procurement business
- procurement
- ciphertext
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 29
- 238000005516 engineering process Methods 0.000 claims abstract description 9
- 238000004590 computer program Methods 0.000 claims description 16
- 230000000694 effects Effects 0.000 abstract description 3
- 230000003014 reinforcing effect Effects 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to the technical fields of computer technology, more particularly, to a kind of procurement business data ciphering method, device, equipment and storage medium, the procurement business data ciphering method includes: S10: obtaining procurement business data packet, and according to the Data Identification for obtaining the procurement business data packet;S20: using Encryption Algorithm to be encrypted for the procurement business data packet, obtains procurement business data ciphertext;S30: the procurement business data ciphertext is stored to database;S40: if the data for getting user's triggering check message, the digital certificate of the user is verified;S50: if the digital certificate authentication passes through, check that message transfers the corresponding procurement business data ciphertext according to the data, and send decruption key corresponding with the procurement business data ciphertext for the user.The present invention has the effect of reinforcing the safety of the data of bid and purchase project.
Description
Technical field
The present invention relates to the technical fields of computer technology, more particularly, to a kind of procurement business data ciphering method, dress
It sets, equipment and storage medium.
Background technique
Currently, can be purchased according to content in the file of bid in project for bidding, the content of buying includes material
Material, engineering or service etc..
In for project for bidding, a large amount of data can be generated, these usual data can be according to each single item project for bidding
The data of each project for bidding are stored in a data packet, store by the data packet into database by unit.Due to
There are the trade secrets of company or enterprise for the data generated in project for bidding, therefore especially heavy to the safety of these data
It wants.
Summary of the invention
The object of the present invention is to provide a kind of procurement business data of the safety of data for reinforcing bid and purchase project to add
Decryption method, device, equipment and storage medium.
Foregoing invention purpose one of the invention has the technical scheme that
A kind of procurement business data ciphering method, the procurement business data ciphering method include:
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining the procurement business data packet;
S20: using Encryption Algorithm to be encrypted for the procurement business data packet, obtains procurement business data ciphertext;
S30: the procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of the user is verified;
S50: if the digital certificate authentication passes through, check that message transfers the corresponding procurement business number according to the data
Decruption key corresponding with the procurement business data ciphertext is sent according to ciphertext, and for the user.
By using above-mentioned technical proposal, procurement business data packet is being sent and is being stored to before database, to buying
Business datum is encrypted, and after obtaining procurement business data ciphertext after encryption, then simultaneously by the transmission of procurement business data ciphertext
It stores into database, can guarantee the safety of data when transmitting data;Meanwhile in the data for getting user's triggering
When checking message, the digital certificate of user is verified, to verify the permission that user calls procurement business data ciphertext, then to verifying
Corresponding decruption key is sent by the user of verifying, can further guarantee the safety of procurement business data packet.
The present invention is further arranged to: the step S20 includes:
S21: the Encryption Algorithm is rivest, shamir, adelman, using the private key in the rivest, shamir, adelman to the buying
Business data packet is encrypted, and the procurement business data ciphertext is obtained;
S22: digital certificate corresponding with each credit user is sent to credit user by CA technology.
By using above-mentioned technical proposal, procurement business data packet is encrypted using rivest, shamir, adelman, is made pair
The encryption of procurement business data packet is different from the key of decryption, even if being stolen in the key encrypted to procurement business data packet, steals
Taker can not also obtain the decryption second, to improve the safety of procurement business data packet.
The present invention is further arranged to: the step S30 includes:
S31: the index of the procurement business data ciphertext is calculated;
S32: obtaining the storage location of the procurement business data ciphertext according to the index, will be described according to the storage location
Procurement business data ciphertext is stored into the database.
By using above-mentioned technical proposal, it is close to obtain procurement business data to calculate the index of procurement business data ciphertext
The mode of the position of text in the database, procurement business data ciphertext is stored in the database, to optimize database
Storage organization is calling procurement business data ciphertext convenient for user.
The present invention is further arranged to: after the step S32, the procurement business data ciphering method further include:
S321: time when each procurement business data ciphertext is stored to the database is obtained;
S322: the cryptographic Hash of each procurement business data ciphertext is calculated by hash algorithm;
S323: according to the sequence of the time, being ranked up the procurement business data ciphertext, and according to ranking results, from
Second part of procurement business data ciphertext starts, the cryptographic Hash of a procurement business data ciphertext in addition, will
Block chain structure is formed between every part of procurement business data ciphertext.
By using technical solution, the characteristic that can not be distorted of block chain technology is utilized, has been stored on block chain
Whole procurement business data ciphertext, further improves the safety of procurement business data ciphertext;Meanwhile it being utilized in block chain
The characteristic of distributed storage can make the procurement business data ciphertext storage organization more reasonable, convenient to the procurement business number
According to transferring for ciphertext, the process of procurement business data ciphertext management is simplified.
The present invention is further arranged to: the step S50 includes:
S51: the data check that message includes the Data Identification, are obtained from the database according to the Data Identification pair
The procurement business data ciphertext answered;
S52: public key corresponding with the procurement business data ciphertext is sent for the user, to the procurement business data ciphertext
Into decryption, the procurement business data packet is obtained.
It is checked from data after user's trigger data checks message by using above-mentioned technical proposal and obtains number in message
According to mark, corresponding procurement business data ciphertext and corresponding public key are being obtained from database by Data Identification, protected
The safety for demonstrate,proving procurement business data ciphertext simultaneously, reads data convenient for database.
Foregoing invention purpose two of the invention has the technical scheme that
A kind of procurement business data encryption device, the procurement business data encryption device include:
Data acquisition module, for obtaining procurement business data packet, and according to the data mark for obtaining the procurement business data packet
Know;
It is close to obtain procurement business data for using Encryption Algorithm to be encrypted for the procurement business data packet for encrypting module
Text;
Memory module, for storing the procurement business data ciphertext to database;
Subscriber authentication module verifies the digital certificate of the user if the data for getting user's triggering check message;
It is corresponding described to check that message is transferred according to the data if passing through for the digital certificate authentication for read module
Procurement business data ciphertext, and decruption key corresponding with the procurement business data ciphertext is sent for the user.
By using above-mentioned technical proposal, procurement business data packet is being sent and is being stored to before database, to buying
Business datum is encrypted, and after obtaining procurement business data ciphertext after encryption, then simultaneously by the transmission of procurement business data ciphertext
It stores into database, can guarantee the safety of data when transmitting data;Meanwhile in the data for getting user's triggering
When checking message, the digital certificate of user is verified, to verify the permission that user calls procurement business data ciphertext, then to verifying
Corresponding decruption key is sent by the user of verifying, can further guarantee the safety of procurement business data packet.
Foregoing invention purpose three of the invention has the technical scheme that
A kind of computer equipment, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, the processor realize above-mentioned procurement business data ciphering method when executing the computer program
Step.
Foregoing invention purpose four of the invention has the technical scheme that
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the computer
The step of above-mentioned procurement business data ciphering method is realized when program is executed by processor.
In conclusion advantageous effects of the invention are as follows:
Procurement business data packet is being sent and is being stored to before database, procurement business data are being encrypted, and is encrypting
After obtain procurement business data ciphertext after, then procurement business data ciphertext is transmitted and is stored into database, can transmitted
When data, guarantee the safety of data;Meanwhile when the data for getting user's triggering check message, the number of user is verified
Certificate to verify the permission that user calls procurement business data ciphertext, then sends the user for being verified verifying corresponding
Decruption key can further guarantee the safety of procurement business data packet.
Detailed description of the invention
Fig. 1 is a flow chart of procurement business data ciphering method in one embodiment of the invention;
Fig. 2 is the implementation flow chart of step S20 in procurement business data ciphering method in one embodiment of the invention;
Fig. 3 is the implementation flow chart of step S30 in procurement business data ciphering method in one embodiment of the invention;
Fig. 4 is another implementation flow chart in one embodiment of the invention in procurement business data ciphering method;
Fig. 5 is the implementation flow chart of step S50 in procurement business data ciphering method in one embodiment of the invention;
Fig. 6 is a functional block diagram of procurement business data encryption device in one embodiment of the invention;
Fig. 7 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
Embodiment one:
In one embodiment, as shown in Figure 1, being specifically included as follows the invention discloses a kind of procurement business data ciphering method
Step:
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining procurement business data packet.
In the present embodiment, procurement business data packet refers in project for bidding, needs according to specific in project for bidding
Content is purchased, thus the data acquisition system generated.Data Identification refers to the label for distinguishing each procurement business data packet.
Specifically, after project for bidding registration, by the exclusive number of system automatically generated, and using the number as the number
According to mark.
S20: using Encryption Algorithm to be encrypted for procurement business data packet, obtains procurement business data ciphertext.
Specifically, the data in procurement business data packet are input in Encryption Algorithm, use the key pair of Encryption Algorithm
This procurement business data are encrypted, and procurement business data ciphertext is obtained.
S30: procurement business data ciphertext is stored to database.
Specifically, it by way of calculating the position that procurement business data ciphertext stores in the database, is adopted getting
After purchasing the position of business datum ciphertext in the database, procurement business data ciphertext is stored into database according to the position.
S40: if the data for getting user's triggering check message, the digital certificate of user is verified.
In the present embodiment, digital certificate be one through certificate authority digital signature comprising public-key cryptography owner
The file of information and public-key cryptography, effect are that legal to possess disclosing of listing in certificate close by the user that lists in certification
Key.Data check that message refers to and are triggered by user that the message of procurement business data is checked in request.
Specifically, it after the data for getting user's triggering check message, obtains and triggers the user that the data check message
User identifier, check corresponding data according to whether the digital certificate that the user identifier verifies the user has permission.
S50: if digital certificate authentication passes through, checking that message transfers corresponding procurement business data ciphertext according to data,
And decruption key corresponding with procurement business data ciphertext is sent for user.
Specifically, after the data certificate of user is verified, i.e., the user is credit user, then is checked and disappeared according to data
Credit user is obtained in breath and requests the procurement business data checked, it is close that corresponding procurement business data are transferred from database
Text, and decruption key corresponding with procurement business data ciphertext is sent for credit user.
It, can be in order to further ensure the safety of data preferably due to the digital certificate of user is uniquely corresponding with user
Solution decruption key is corresponding with the digital certificate of user, acquiring each credit user to same a procurement data ciphertext
Key is different.For example, have simultaneously credit user A and credit user B request procurement data ciphertext A is checked, then for
The decruption key that credit user A and credit user B are sent can be according to the digital certificate A of credit user A and credit user B and
Digital certificate B, the decruption key A and decruption key B being calculated, and decruption key A and decruption key B can be to buying industry
Business data ciphertext is decrypted.
By using above-mentioned technical proposal, procurement business data packet is being sent and is being stored to before database, to buying
Business datum is encrypted, and after obtaining procurement business data ciphertext after encryption, then simultaneously by the transmission of procurement business data ciphertext
It stores into database, can guarantee the safety of data when transmitting data;Meanwhile in the data for getting user's triggering
When checking message, the digital certificate of user is verified, to verify the permission that user calls procurement business data ciphertext, then to verifying
Corresponding decruption key is sent by the user of verifying, can further guarantee the safety of procurement business data packet.
In one embodiment, as shown in Fig. 2, in step S20, that is, use Encryption Algorithm for the progress of procurement business data packet
Encryption, obtains procurement business data ciphertext, specifically comprises the following steps:
S21: Encryption Algorithm is rivest, shamir, adelman, using the private key in rivest, shamir, adelman to procurement business data packet into
Row encryption, obtains procurement business data ciphertext.
In the present embodiment, rivest, shamir, adelman is a kind of pair of file or the algorithm that data are encrypted, including
To the private key that file or data are encrypted, and to the public key that encrypted file or data are decrypted, which is public
Key a pair, and because encryption and decryption use two different keys, this algorithm is called asymmetric encryption calculation
Method.
Specifically, using the private key in rivest, shamir, adelman, procurement business data packet is encrypted, obtains buying industry
Business data ciphertext.
S22: digital certificate corresponding with each credit user is sent to credit user by CA technology.
Specifically, to guarantee between user in the transmitting safety of information on the net, authenticity, reliability, integrality and not
The property denied not only needs to verify the identity reality of user, it is also desirable to have one to have authority, fairness, only
The mechanism of one property is responsible for issuing and managing to each main body of e-commerce meeting domestic, world security electronic transaction protocol mark
Quasi- safe Certificate in E-Commerce, CA system are answered wine and are given birth to.CA mechanism, also known as certificate award card (Certificate
Authority) center is the authoritative institution of a responsible distribution & management digital certificate, it is as trusted third
Side undertakes the responsibility that the legitimacy of public key in Public Key Infrastructure is examined.The center CA is that each user using public-key cryptography provides
One digital certificate, to realize the distribution of public key and prove its legitimacy.The digital signature of CA mechanism prevents attacker from puppet
Make and distort certificate.It is responsible for generating, distribute and managing the required digital certificate of all individuals for participating in communication, therefore is safety
Core link.
In one embodiment, as shown in figure 3, in step s 30, i.e., storing procurement business data ciphertext to database,
Specifically comprise the following steps:
S31: the index of procurement business data ciphertext is calculated.
In the present embodiment, in relational database, index be it is a kind of individually, physics to a column in database table or
A kind of storage organization that the value of multiple row is ranked up, it is set and the corresponding Compass of a column or several train values in some table
The logical pointer inventory of the data page of middle these values of physical label.The catalogue for functioning as books of index, can be according to mesh
The page number in record is quickly found out required content.
Specifically, the index of procurement business data ciphertext is calculated.
S32: obtaining the storage location of procurement business data ciphertext according to index, according to storage location by procurement business data
Ciphertext is stored into database.
Specifically, by calculate Data Identification index, obtain the position of the index in the database, due to the index with
Encrypted packet is associated by way of mapping, therefore gets the position of the encrypted packet in the database, and according to
The position stores encrypted packet into database.
In one embodiment, as shown in figure 4, in step S32, procurement business data ciphering method further include:
S321: time when each procurement business data ciphertext is stored to database is obtained.
In the present embodiment, which refers to when storing every a procurement business data ciphertext into database, at that time
The specific time, for example, certain year is in such a month, and on such a day some, database gets procurement business data ciphertext, then by certain moon in year
One day, several points were as the time.
S322: the cryptographic Hash of each procurement business data ciphertext is calculated by hash algorithm.
In the present embodiment, hash algorithm is exactly that the input (be called and be preliminary mapping pre-image) of random length is passed through
Hashing algorithm is transformed into the output of regular length, which is exactly cryptographic Hash.
Specifically, each procurement business data ciphertext is sequentially input into hash algorithm, is calculated by hash algorithm
The cryptographic Hash of every portion procurement business data ciphertext.
S323: according to the sequence of time, procurement business data ciphertext is ranked up, and according to ranking results, from second
Part procurement business data ciphertext starts, the cryptographic Hash of a procurement business data ciphertext in addition, by every part of procurement business data
Block chain structure is formed between ciphertext.
In the present embodiment, block chain refers to Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm etc.
The new application mode of computer technology.
Specifically, using the irreversibility of time in block chain, according to the sequence of time, to procurement business data ciphertext into
Row sequence, and according to ranking results, since second part of procurement business data ciphertext, a procurement business data ciphertext in addition
Cryptographic Hash, will between every part of procurement business data ciphertext formed block chain structure.
In one embodiment, it as shown in figure 5, in step s 50, even digital certificate authentication passes through, is then looked into according to data
See that message transfers corresponding procurement business data ciphertext, and close for user's transmission decryption corresponding with procurement business data ciphertext
Key specifically comprises the following steps:
S51: data check that message includes Data Identification, obtain corresponding procurement business data from database according to Data Identification
Ciphertext.
Specifically, when getting data and checking message, the buying industry that obtains user check is checked in message in the data
The Data Identification for data of being engaged in, and the position of corresponding procurement business data ciphertext in the database is obtained according to the Data Identification,
To obtain procurement business data ciphertext in this position.
S52: sending corresponding with procurement business data ciphertext public key for user, to procurement business data ciphertext into decryption,
Obtain procurement business data packet.
Specifically, according to the digital certificate of the user, public key corresponding with the user is sent.Wherein it is possible to be to use to add
Close algorithm calculates the digital certificate, obtains public key corresponding with the user.
Further, using the public key to, into decryption, obtaining procurement business data packet to procurement business data ciphertext.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Embodiment two:
In one embodiment, a kind of procurement business data encryption device is provided, the procurement business data encryption device and above-mentioned reality
Procurement business data ciphering method in example is applied to correspond.As shown in fig. 6, the procurement business data encryption device includes that data obtain
Modulus block 10, encrypting module 20, memory module 30, subscriber authentication module 40 and read module 50.Each functional module is described in detail
It is as follows:
Data acquisition module 10, for obtaining procurement business data packet, and according to the Data Identification for obtaining procurement business data packet;
Encrypting module 20 obtains procurement business data ciphertext for using Encryption Algorithm to be encrypted for procurement business data packet;
Memory module 30, for storing procurement business data ciphertext to database;
Subscriber authentication module 40 verifies the digital certificate of user if the data for getting user's triggering check message;
Read module 50 checks that message transfers corresponding procurement business number according to data if passing through for digital certificate authentication
Decruption key corresponding with procurement business data ciphertext is sent according to ciphertext, and for user.
Preferably, encrypting module 20 includes:
Submodule 21 is encrypted, is rivest, shamir, adelman for Encryption Algorithm, using the private key in rivest, shamir, adelman to adopting
Purchase business data packet is encrypted, and procurement business data ciphertext is obtained;
Digital certificate generates submodule 22, for sending number corresponding with each credit user to credit user by CA technology
Certificate.
Preferably, memory module 30 includes:
Computational submodule 31 is indexed, for calculating the index of procurement business data ciphertext;
Sub-module stored 32 will be adopted for obtaining the storage location of procurement business data ciphertext according to index according to storage location
Purchase business datum ciphertext is stored into database.
Preferably, procurement business data encryption device further include:
Time-obtaining module 321, for obtaining time when each procurement business data ciphertext is stored to database;
Hash calculation module 322, for calculating the cryptographic Hash of each procurement business data ciphertext by hash algorithm;
Block chain builds module 323, for the sequence according to the time, is ranked up to procurement business data ciphertext, and according to row
Sequence is as a result, since second part of procurement business data ciphertext, the cryptographic Hash of a procurement business data ciphertext in addition, by every part
Block chain structure is formed between procurement business data ciphertext.
Preferably, read module 50 includes:
Ciphertext acquisition submodule 51 is checked that message includes Data Identification for data, is obtained from database according to Data Identification
Corresponding procurement business data ciphertext;
Submodule 52 is decrypted, it is close to procurement business data for sending public key corresponding with procurement business data ciphertext for user
Text obtains procurement business data packet into decryption.
Specific restriction about procurement business data encryption device may refer to above for procurement business data encryption
The restriction of method, details are not described herein.Modules in above-mentioned procurement business data encryption device can be fully or partially through
Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment
It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more
The corresponding operation of modules.
Embodiment three:
In one embodiment, a kind of computer equipment is provided, which can be server, internal structure chart
It can be as shown in Figure 7.The computer equipment includes processor, memory, network interface and the data connected by system bus
Library.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-
Volatile storage medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and database.
The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The computer is set
Standby database is for storing procurement business data ciphertext.The network interface of the computer equipment is used to pass through with external terminal
Network connection communication.To realize a kind of procurement business data ciphering method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining procurement business data packet;
S20: using Encryption Algorithm to be encrypted for procurement business data packet, obtains procurement business data ciphertext;
S30: procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of user is verified;
S50: if digital certificate authentication passes through, check that message transfers corresponding procurement business data ciphertext according to data, and be
User sends decruption key corresponding with procurement business data ciphertext.
Example IV:
In one embodiment, a kind of computer readable storage medium is provided, computer program, computer journey are stored thereon with
It is performed the steps of when sequence is executed by processor
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining procurement business data packet;
S20: using Encryption Algorithm to be encrypted for procurement business data packet, obtains procurement business data ciphertext;
S30: procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of user is verified;
S50: if digital certificate authentication passes through, check that message transfers corresponding procurement business data ciphertext according to data, and be
User sends decruption key corresponding with procurement business data ciphertext.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM(EPROM), electrically erasable ROM(EEPROM) or flash memory.Volatile memory may include
Random-access memory (ram) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM(ESDRAM), synchronization link (Synchlink) DRAM(SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of procurement business data ciphering method, which is characterized in that the procurement business data ciphering method includes:
S10: procurement business data packet is obtained, and according to the Data Identification for obtaining the procurement business data packet;
S20: using Encryption Algorithm to be encrypted for the procurement business data packet, obtains procurement business data ciphertext;
S30: the procurement business data ciphertext is stored to database;
S40: if the data for getting user's triggering check message, the digital certificate of the user is verified;
S50: if the digital certificate authentication passes through, check that message transfers the corresponding procurement business number according to the data
Decruption key corresponding with the procurement business data ciphertext is sent according to ciphertext, and for the user.
2. procurement business data ciphering method as described in claim 1, which is characterized in that the step S20 includes:
S21: the Encryption Algorithm is rivest, shamir, adelman, using the private key in the rivest, shamir, adelman to the buying
Business data packet is encrypted, and the procurement business data ciphertext is obtained;
S22: digital certificate corresponding with each credit user is sent to credit user by CA technology.
3. procurement business data ciphering method as described in claim 1, which is characterized in that the step S30 includes:
S31: the index of the procurement business data ciphertext is calculated;
S32: obtaining the storage location of the procurement business data ciphertext according to the index, will be described according to the storage location
Procurement business data ciphertext is stored into the database.
4. procurement business data ciphering method as described in claim 1, which is characterized in that described after the step S32
Procurement business data ciphering method further include:
S321: time when each procurement business data ciphertext is stored to the database is obtained;
S322: the cryptographic Hash of each procurement business data ciphertext is calculated by hash algorithm;
S323: according to the sequence of the time, being ranked up the procurement business data ciphertext, and according to ranking results, from
Second part of procurement business data ciphertext starts, the cryptographic Hash of a procurement business data ciphertext in addition, will
Block chain structure is formed between every part of procurement business data ciphertext.
5. procurement business data ciphering method as described in claim 1, which is characterized in that the step S50 includes:
S51: the data check that message includes the Data Identification, are obtained from the database according to the Data Identification pair
The procurement business data ciphertext answered;
S52: public key corresponding with the procurement business data ciphertext is sent for the user, to the procurement business data ciphertext
Into decryption, the procurement business data packet is obtained.
6. a kind of procurement business data encryption device, which is characterized in that the procurement business data encryption device includes:
Data acquisition module, for obtaining procurement business data packet, and according to the data mark for obtaining the procurement business data packet
Know;
It is close to obtain procurement business data for using Encryption Algorithm to be encrypted for the procurement business data packet for encrypting module
Text;
Memory module, for storing the procurement business data ciphertext to database;
Subscriber authentication module verifies the digital certificate of the user if the data for getting user's triggering check message;
It is corresponding described to check that message is transferred according to the data if passing through for the digital certificate authentication for read module
Procurement business data ciphertext, and decruption key corresponding with the procurement business data ciphertext is sent for the user.
7. procurement business data encryption device as claimed in claim 6, which is characterized in that the encrypting module includes:
Submodule is encrypted, is rivest, shamir, adelman for the Encryption Algorithm, using the private in the rivest, shamir, adelman
Key encrypts the procurement business data packet, obtains the procurement business data ciphertext;
Digital certificate generates submodule, demonstrate,proves for sending number corresponding with each credit user to credit user by CA technology
Book.
8. procurement business data encryption device as claimed in claim 6, which is characterized in that the memory module includes:
Computational submodule is indexed, for calculating the index of the procurement business data ciphertext;
Sub-module stored is deposited for obtaining the storage location of the procurement business data ciphertext according to the index according to described
Storage space, which is set, stores the procurement business data ciphertext into the database.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
The step of any one of 5 procurement business data ciphering method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In realization procurement business data encryption side as described in any one of claim 1 to 5 when the computer program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910088290.2A CN109871678A (en) | 2019-01-29 | 2019-01-29 | Procurement business data ciphering method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910088290.2A CN109871678A (en) | 2019-01-29 | 2019-01-29 | Procurement business data ciphering method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109871678A true CN109871678A (en) | 2019-06-11 |
Family
ID=66918253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910088290.2A Pending CN109871678A (en) | 2019-01-29 | 2019-01-29 | Procurement business data ciphering method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109871678A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112784303A (en) * | 2021-01-26 | 2021-05-11 | 政采云有限公司 | File encryption method, device, system and storage medium |
CN115694831A (en) * | 2022-10-12 | 2023-02-03 | 南方电网数字电网研究院有限公司 | Domain-control-based trusted computing authentication method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008166861A (en) * | 2006-12-26 | 2008-07-17 | Ntt Communications Kk | File distribution system, file distribution method, encryption device, decryption key distribution unit, and program |
CN108702287A (en) * | 2018-04-16 | 2018-10-23 | 深圳前海达闼云端智能科技有限公司 | Information publication based on block chain and acquisition methods, device and block chain node |
CN109685448A (en) * | 2018-11-27 | 2019-04-26 | 建经投资咨询有限公司 | A kind of engineering project bidding Management method and system |
-
2019
- 2019-01-29 CN CN201910088290.2A patent/CN109871678A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008166861A (en) * | 2006-12-26 | 2008-07-17 | Ntt Communications Kk | File distribution system, file distribution method, encryption device, decryption key distribution unit, and program |
CN108702287A (en) * | 2018-04-16 | 2018-10-23 | 深圳前海达闼云端智能科技有限公司 | Information publication based on block chain and acquisition methods, device and block chain node |
CN109685448A (en) * | 2018-11-27 | 2019-04-26 | 建经投资咨询有限公司 | A kind of engineering project bidding Management method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112784303A (en) * | 2021-01-26 | 2021-05-11 | 政采云有限公司 | File encryption method, device, system and storage medium |
CN112784303B (en) * | 2021-01-26 | 2022-11-22 | 政采云有限公司 | File encryption method, device, system and storage medium |
CN115694831A (en) * | 2022-10-12 | 2023-02-03 | 南方电网数字电网研究院有限公司 | Domain-control-based trusted computing authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111600908B (en) | Data processing method, system, computer device and readable storage medium | |
JP5680115B2 (en) | Transaction auditing for data security devices | |
TWI694709B (en) | Blockchain-based electronic signature method and device, and electronic equipment | |
US8964976B2 (en) | Secure storage and retrieval of confidential information | |
TW202001654A (en) | Block chain-based content verification method and device, and electronic device | |
CN110942382B (en) | Electronic contract generation method and device, computer equipment and storage medium | |
CN108322451A (en) | Data processing method, device, computer equipment and storage medium | |
CN109615386A (en) | KYC anti money washing method, apparatus, equipment and the medium of recurrent wrIting block chain | |
CN115296838B (en) | Block chain-based data sharing method, system and storage medium | |
JP2008501176A (en) | Information distribution system that protects privacy | |
JP2018534818A (en) | System and method for secure digital sharing based on exchange between systems of two-layer double encrypted digital information keys | |
WO2019082442A1 (en) | Data registration method, data decoding method, data structure, computer, and program | |
CN112215609B (en) | House property user identity authentication method and device based on super account book and electronic equipment | |
CN110135175A (en) | Information processing, acquisition methods, device, equipment and medium based on block chain | |
US12118540B2 (en) | Systems and methods for distributed data mapping | |
CN112149077B (en) | Supply chain billing method, system and computer equipment based on block chain technology | |
CN109871678A (en) | Procurement business data ciphering method, device, equipment and storage medium | |
US20220191034A1 (en) | Technologies for trust protocol with immutable chain storage and invocation tracking | |
CN109146684B (en) | Decentralized transaction verification method | |
CN116522356A (en) | Data query method and device | |
TWI766171B (en) | Account data processing method and account data processing system | |
WO2021019783A1 (en) | Proprietor identity confirmation system, terminal, and proprietor identity confirmation method | |
JP7113589B2 (en) | Information intermediation device, information provision device, and information acquisition device | |
CN116827653B (en) | Data encryption and authorization management method based on Hyperledger Fabric alliance chain | |
WO2020230831A1 (en) | Information transaction method, information user terminal, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190611 |
|
WD01 | Invention patent application deemed withdrawn after publication |