CN110866210A - Log control method, device and equipment for browser user - Google Patents

Log control method, device and equipment for browser user Download PDF

Info

Publication number
CN110866210A
CN110866210A CN201911013305.5A CN201911013305A CN110866210A CN 110866210 A CN110866210 A CN 110866210A CN 201911013305 A CN201911013305 A CN 201911013305A CN 110866210 A CN110866210 A CN 110866210A
Authority
CN
China
Prior art keywords
browser
target user
information
behavior
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911013305.5A
Other languages
Chinese (zh)
Inventor
陈本峰
冀托
朱二强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunshen Interconnection (beijing) Technology Co Ltd
Original Assignee
Yunshen Interconnection (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunshen Interconnection (beijing) Technology Co Ltd filed Critical Yunshen Interconnection (beijing) Technology Co Ltd
Priority to CN201911013305.5A priority Critical patent/CN110866210A/en
Publication of CN110866210A publication Critical patent/CN110866210A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Abstract

The embodiment of the invention discloses a method, a device and equipment for managing and controlling logs of a browser user, and relates to the technical field of browsers, wherein the log management and control method comprises the following steps: acquiring a browser log generated by a target user by using a target browser; judging whether abnormal login behaviors exist or not according to the browser logs; and if the abnormal login behavior is judged to exist, alarming to a preset terminal. The invention can know the behavior of the employee on the browser, and can judge whether the abnormal login behavior, the unauthorized access behavior and the unauthorized download behavior exist according to the browser log, thereby alarming or generating alarm prompt information so as to carry out corresponding processing.

Description

Log control method, device and equipment for browser user
Technical Field
The embodiment of the invention relates to the technical field of browsers, in particular to a method, a device and equipment for managing and controlling logs of a browser user.
Background
At present, some enterprises use the browser to handle official business based on the intranet, are provided with the mode that gets into different application on the intranet, for example through certain link of staff through clicking to can get into corresponding application and handle official business, this kind of mode can promote staff's work efficiency.
But the enterprise can not know what actions the employee performs in the browser, and the actions can not influence the work of the employee or cause enterprise security problems.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a device and equipment for managing and controlling logs of a browser user, which are used for solving the problem that the existing enterprise cannot know which behaviors are performed by employees in a browser, and the behaviors cannot influence the work of the employees or cause the safety problem of the enterprise.
In order to achieve the above object, the embodiments of the present invention mainly provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a log management and control method for a browser user, including: acquiring a browser log generated by a target user by using a target browser; judging whether abnormal login behaviors exist or not according to the browser logs; and if the abnormal login behavior is judged to exist, alarming to a preset terminal.
Further, after obtaining the browser log, the method further includes: obtaining access information of the target user according to the browser log; judging whether the target user has an unauthorized access behavior according to the authority of the target user and the access information; and if the target user is judged to have the unauthorized access behavior, generating first alarm prompt information.
Further, after determining that the abnormal login behavior exists, the method further includes: sending security verification information to the target user; and if the correct verification feedback information is not received within the preset time after the safety verification information is sent, controlling the target browser of the target user to lock the screen.
Further, the first alarm prompt message comprises identity information, unauthorized access content and unauthorized access time of the target user.
Further, after obtaining the browser log, the method further includes: obtaining the downloading information of the target user according to the browser log; whether the target user has an unauthorized downloading behavior or not is judged according to the authority of the target user and the downloading information; and if the target user is judged to have the unauthorized downloading behavior, generating second alarm prompt information.
In a second aspect, an embodiment of the present invention further provides a log management and control apparatus for a browser user, including: the acquisition module is used for acquiring a browser log generated by a target user by using a target browser; an alarm module; and the control processing module is used for judging whether an abnormal login behavior exists according to the browser log, and if the abnormal login behavior exists, alarming to a preset terminal through the alarm module.
Further, the control processing module is further configured to obtain access information of the target user according to the browser log, further determine whether the target user has an unauthorized access behavior according to the authority of the target user and the access information, and generate first alarm prompt information if it is determined that the target user has the unauthorized access behavior.
Further, the log managing and controlling device of the browser user further comprises: the security authentication module is used for sending security verification information to the terminal of the target user after the control processing module judges that the abnormal login behavior exists, and judging that the security authentication fails if correct verification feedback information is not received within preset time after the security verification information is sent; the control processing module is further used for controlling the screen locking of the target browser of the target user when the security authentication module judges that the security authentication fails.
Further, the first alarm prompt message comprises identity information, unauthorized access content and unauthorized access time of the target user.
Further, the control processing module is further configured to obtain download information of the target user according to the browser log, further determine whether the target user has an unauthorized download behavior according to the authority of the target user and the download information, and generate second alarm prompt information if it is determined that the target user has the unauthorized download behavior.
In a third aspect, an embodiment of the present invention further provides an electronic device, including: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to execute the method for managing and controlling the log of the browser user according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium containing one or more program instructions, where the one or more program instructions are configured to execute the method for managing and managing logs of a browser user according to the first aspect.
The technical scheme provided by the embodiment of the invention at least has the following advantages:
according to the log control method, device and equipment for the browser user, provided by the embodiment of the invention, the behavior of the employee on the browser can be known by acquiring the browser log of the employee and analyzing the log, and whether an abnormal login behavior, an unauthorized access behavior and an unauthorized download behavior exist can be judged according to the browser log, so that an alarm can be given or alarm prompt information can be generated so as to carry out corresponding processing.
Drawings
Fig. 1 is a flowchart of a method for managing and controlling a log of a browser user according to an embodiment of the present invention;
fig. 2 is a block diagram of a log management and control apparatus for a browser user according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In the description of the present invention, it is to be understood that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Fig. 1 is a flowchart of a method for managing and controlling a log of a browser user according to an embodiment of the present invention. As shown in fig. 1, a method for managing and controlling a log of a browser user according to an embodiment of the present invention includes:
s1: and acquiring a browser log generated by a target user by using a target browser.
Specifically, the background server stores a browser log generated by a target user using a browser. The target user may be one user or a plurality of users. When the target user is a user, the browser log of the user can be analyzed to obtain the browser using behavior of the user. The behavior of the browser includes login behavior, access behavior, download behavior and the like. When the target user is multiple users (e.g., the target user is all employees within an enterprise), the target user may be monitored for specified browser behavior when multiple users are using the target browser.
S2: and judging whether abnormal login behaviors exist or not according to the browser logs.
Specifically, the background server presets a determination condition for setting an abnormal login behavior, for example, the background server determines that a frequent login behavior occurs when a certain browser account is used within a certain time, or a behavior that the same terminal frequently logs in multiple browser accounts within a certain time is considered as an abnormal login behavior.
In an example of the present invention, the backend server finds that the login behavior of a user using the browser account X reaches 6 times within 3 minutes, and considers that there is an abnormal login behavior regardless of whether the login is successful or not.
In another example of the present invention, the backend server finds that the login behavior of multiple users using the browser account Y reaches 6 times within 10 minutes, wherein the browser account Y is a non-public account, and whether the login is successful or not, the abnormal login behavior is considered to exist.
S3: and if the abnormal login behavior is judged to exist, alarming to a preset terminal. The preset terminal can be a terminal of an administrator of the background server, and can also be a terminal of a manager or a security monitoring department.
In an embodiment of the present invention, after step S1, the method further includes: obtaining access information of a target user according to the browser log; judging whether the target user has an unauthorized access behavior according to the authority and the access information of the target user; and if the target user is judged to have the unauthorized access behavior, generating first alarm prompt information.
Specifically, the browser log of the target user stores the access information thereof. The background server stores the authority information of the target user, for example, the background server stores the authority level of user a as P1, wherein the authority level P1 can range the web pages with corresponding access authority. If user A attempts to access a target web page with a permission level of P2, where the permission level of P2 is higher than P1. The background server records the unauthorized access information of the time, and then first alarm information is generated. The background server can send the first alarm information to a preset terminal, or the background server can only record the first alarm information so as to pursue responsibility.
In one embodiment of the invention, the first alarm prompt message includes the identity information, the unauthorized access content and the unauthorized access time of the target user, for example, the first alarm prompt message includes the account number logged in by the user a, the time when the unauthorized access occurs and the unauthorized access content.
In one embodiment of the present invention, after determining that the abnormal login behavior exists, the method further includes: sending security verification information to a terminal (such as a mobile terminal like a mobile phone) of a target user; and controlling the target browser of the target user to lock the screen if the correct authentication feedback information is not received within a preset time (for example, 60 seconds) after the security authentication information is transmitted.
In an embodiment of the present invention, after step S1, the method further includes: obtaining downloading information of a target user according to the browser log; according to the authority of the target user and whether the target user has an unauthorized downloading behavior or not; and if the target user is judged to have the unauthorized downloading behavior, generating second alarm prompt information.
Specifically, the browser log of the target user stores the historical download information thereof. The background server stores the authority information of the target user, for example, the background server stores the authority level of user B as P3. If the user B uses the plug-in software to download the file with the authority level of P4, wherein the authority level of P4 is higher than that of P3. The background server can record the unauthorized downloading information of the time, and further generate second alarm information. The background server can send the second alarm information to the preset terminal, and the background server can also record the second alarm information only so as to pursue responsibility.
According to the log control method for the browser user, provided by the embodiment of the invention, the behavior of the employee on the browser can be known by acquiring the browser log of the employee and analyzing the log, and whether an abnormal login behavior, an unauthorized access behavior and an unauthorized download behavior exist can be judged according to the browser log, so that an alarm can be given or alarm prompt information can be generated so as to carry out corresponding processing.
Fig. 2 is a block diagram of a log management and control apparatus for a browser user according to an embodiment of the present invention. As shown in fig. 2, the log managing and controlling apparatus for a browser user according to an embodiment of the present invention includes: an acquisition module 100, an alarm module 200 and a control processing module 300.
The obtaining module 100 is configured to obtain a browser log generated by a target user using a target browser. The control processing module 300 is configured to determine whether an abnormal login behavior exists according to the browser log, and if it is determined that the abnormal login behavior exists, alarm the preset terminal through the alarm module 200.
In an embodiment of the present invention, the control processing module 300 is further configured to obtain access information of the target user according to the browser log, further determine whether the target user has an unauthorized access behavior according to the authority and the access information of the target user, and generate first alarm prompt information if it is determined that the target user has the unauthorized access behavior.
In an embodiment of the present invention, the log management and control apparatus for the browser user further includes a security authentication module, where the security authentication module is configured to send security verification information to the terminal of the target user after the control processing module 300 determines that the abnormal login behavior exists, and if correct verification feedback information is not received within a preset time after the security verification information is sent, it is determined that the security authentication fails. The control processing module 300 is further configured to control the target browser of the target user to lock the screen when the security authentication module determines that the security authentication fails.
In one embodiment of the invention, the first alert prompt includes identity information of the target user, unauthorized access content, and unauthorized access time.
In an embodiment of the present invention, the control processing module 300 is further configured to obtain the download information of the target user according to the browser log, further generate a second alarm prompt message according to the authority of the target user and whether the target user has an unauthorized download behavior according to the download information, and if it is determined that the target user has the unauthorized download behavior.
It should be noted that, a specific implementation manner of the log management and control apparatus for the browser user in the embodiment of the present invention is similar to a specific implementation manner of the log management and control method for the browser user in the embodiment of the present invention, and specific reference is specifically made to the description of the log management and control method portion of the browser user, and details are not repeated in order to reduce redundancy.
An embodiment of the present invention discloses an electronic device, including: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to run one or more program instructions to execute the method for managing and controlling the log of the browser user.
The embodiment of the invention discloses a computer-readable storage medium, wherein computer program instructions are stored in the computer-readable storage medium, and when the computer program instructions are run on a computer, the computer is enabled to execute the above-mentioned log management and control method for a browser user.
In an embodiment of the invention, the processor may be an integrated circuit chip having signal processing capability. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous DRAM (DDRSDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (10)

1. A log control method for a browser user is characterized by comprising the following steps:
acquiring a browser log generated by a target user by using a target browser;
judging whether abnormal login behaviors exist or not according to the browser logs;
and if the abnormal login behavior is judged to exist, alarming to a preset terminal.
2. The method according to claim 1, further comprising, after acquiring the browser log:
obtaining access information of the target user according to the browser log;
judging whether the target user has an unauthorized access behavior according to the authority of the target user and the access information;
and if the target user is judged to have the unauthorized access behavior, generating first alarm prompt information.
3. The method according to claim 1, further comprising, after determining that the abnormal login behavior exists, the step of:
sending security verification information to the terminal of the target user;
and if the correct verification feedback information is not received within the preset time after the safety verification information is sent, controlling the target browser of the target user to lock the screen.
4. The method according to claim 1, further comprising, after acquiring the browser log:
obtaining the downloading information of the target user according to the browser log;
whether the target user has an unauthorized downloading behavior or not is judged according to the authority of the target user and the downloading information;
and if the target user is judged to have the unauthorized downloading behavior, generating second alarm prompt information.
5. A log management and control device for a browser user, comprising:
the acquisition module is used for acquiring a browser log generated by a target user by using a target browser;
an alarm module;
and the control processing module is used for judging whether an abnormal login behavior exists according to the browser log, and if the abnormal login behavior exists, alarming to a preset terminal through the alarm module.
6. The log management and control device of the browser user according to claim 5, wherein the control processing module is further configured to obtain access information of the target user according to the browser log, further determine whether the target user has an unauthorized access behavior according to the authority of the target user and the access information, and generate first alarm prompt information if it is determined that the target user has the unauthorized access behavior.
7. The apparatus according to claim 5, further comprising:
the security authentication module is used for sending security verification information to the terminal of the target user after the control processing module judges that the abnormal login behavior exists, and judging that the security authentication fails if correct verification feedback information is not received within preset time after the security verification information is sent;
the control processing module is further used for controlling the screen locking of the target browser of the target user when the security authentication module judges that the security authentication fails.
8. The log management and control device of the browser user according to claim 5, wherein the control processing module is further configured to obtain the download information of the target user according to the browser log, further determine whether the target user has an unauthorized download behavior according to the authority of the target user and the download information, and generate second alarm prompt information if it is determined that the target user has the unauthorized download behavior.
9. An electronic device, characterized in that the electronic device comprises: at least one processor and at least one memory;
the memory is to store one or more program instructions;
the processor, configured to execute one or more program instructions to perform the method of managing logs of a browser user according to any one of claims 1 to 4.
10. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of managing logs of a browser user according to any one of claims 1 to 4.
CN201911013305.5A 2019-10-23 2019-10-23 Log control method, device and equipment for browser user Pending CN110866210A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911013305.5A CN110866210A (en) 2019-10-23 2019-10-23 Log control method, device and equipment for browser user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911013305.5A CN110866210A (en) 2019-10-23 2019-10-23 Log control method, device and equipment for browser user

Publications (1)

Publication Number Publication Date
CN110866210A true CN110866210A (en) 2020-03-06

Family

ID=69652943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911013305.5A Pending CN110866210A (en) 2019-10-23 2019-10-23 Log control method, device and equipment for browser user

Country Status (1)

Country Link
CN (1) CN110866210A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910905A (en) * 2021-02-07 2021-06-04 中国工商银行股份有限公司 Security verification method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325062A (en) * 2011-09-20 2012-01-18 北京神州绿盟信息安全科技股份有限公司 Abnormal login detecting method and device
US20130166918A1 (en) * 2011-12-27 2013-06-27 Majid Shahbazi Methods for Single Signon (SSO) Using Decentralized Password and Credential Management
US20150277681A1 (en) * 2014-03-31 2015-10-01 Monticello Enterprises LLC System and method for providing a single input field having multiple processing possibilities
CN108092975A (en) * 2017-12-07 2018-05-29 上海携程商务有限公司 Recognition methods, system, storage medium and the electronic equipment of abnormal login
CN108920946A (en) * 2018-07-30 2018-11-30 美通云动(北京)科技有限公司 Data security control method and device based on browser

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325062A (en) * 2011-09-20 2012-01-18 北京神州绿盟信息安全科技股份有限公司 Abnormal login detecting method and device
US20130166918A1 (en) * 2011-12-27 2013-06-27 Majid Shahbazi Methods for Single Signon (SSO) Using Decentralized Password and Credential Management
US20150277681A1 (en) * 2014-03-31 2015-10-01 Monticello Enterprises LLC System and method for providing a single input field having multiple processing possibilities
CN108092975A (en) * 2017-12-07 2018-05-29 上海携程商务有限公司 Recognition methods, system, storage medium and the electronic equipment of abnormal login
CN108920946A (en) * 2018-07-30 2018-11-30 美通云动(北京)科技有限公司 Data security control method and device based on browser

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910905A (en) * 2021-02-07 2021-06-04 中国工商银行股份有限公司 Security verification method and device

Similar Documents

Publication Publication Date Title
CN108989355B (en) Vulnerability detection method and device
CN110784450A (en) Single sign-on method and device based on browser
CN108256322B (en) Security testing method and device, computer equipment and storage medium
CN111431753A (en) Asset information updating method, device, equipment and storage medium
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
CN109684863B (en) Data leakage prevention method, device, equipment and storage medium
CN108366132B (en) Method and device for managing service between servers, computer equipment and storage medium
CN111835737A (en) WEB attack protection method based on automatic learning and related equipment thereof
CN110855639A (en) Method, device and equipment for controlling login of intranet and extranet of browser
US20200389454A1 (en) Monitoring security configurations of cloud-based services
CN110232270B (en) Security authentication method, equipment, device and storage medium
CN110866210A (en) Log control method, device and equipment for browser user
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN116015683A (en) Authentication method, device, equipment and storage medium based on random key
CN112583606B (en) Security verification method, server, terminal and storage medium
CN111212028A (en) Early warning method, device, equipment and storage medium
CN113886802A (en) Security authentication method, device, electronic equipment and storage medium
CN111199046A (en) Content protection method and device based on enterprise browser
CN113342594A (en) Industrial control host and dynamic health degree evaluation method thereof
CN113468217A (en) Data query management method and device, computer equipment and readable storage medium
CN113627208B (en) Code scanning login early warning method and device, computer equipment and storage medium
CN110806893A (en) Method, device and equipment for controlling browser parameter configuration
CN110806886A (en) Browser updating method, device and equipment
CN115408673B (en) Software validity period access control management system and method
CN117272406B (en) Method, device, system and storage medium for verifying encrypted bidding document

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200306

RJ01 Rejection of invention patent application after publication