CN111786997A - Encryption and decryption encryption system for remote bid opening type bidding - Google Patents

Encryption and decryption encryption system for remote bid opening type bidding Download PDF

Info

Publication number
CN111786997A
CN111786997A CN202010620244.5A CN202010620244A CN111786997A CN 111786997 A CN111786997 A CN 111786997A CN 202010620244 A CN202010620244 A CN 202010620244A CN 111786997 A CN111786997 A CN 111786997A
Authority
CN
China
Prior art keywords
encryption
information
bidding
key
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010620244.5A
Other languages
Chinese (zh)
Other versions
CN111786997B (en
Inventor
石健昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangyike Data Technology Co ltd
Original Assignee
Guizhou Light Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Light Technology Co ltd filed Critical Guizhou Light Technology Co ltd
Priority to CN202010620244.5A priority Critical patent/CN111786997B/en
Publication of CN111786997A publication Critical patent/CN111786997A/en
Application granted granted Critical
Publication of CN111786997B publication Critical patent/CN111786997B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention relates to the technical field of digital information security transmission, in particular to an encryption and decryption encryption system for remote bid inviting and bidding, which comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to bid information uploaded by a user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information. By adopting the scheme, the technical problem that the bidding information is not high in safety when the bidding is remotely carried out in the prior art can be solved.

Description

Encryption and decryption encryption system for remote bid opening type bidding
Technical Field
The invention relates to the technical field of digital information security transmission, in particular to an encryption and decryption encryption system for remote bid opening type bidding.
Background
With the development of internet technology, various transactions have been changed from off-line transactions to on-line transactions, for example, an electronic bidding platform, a bidder creates qualification pre-approval documents, bidding documents and the like to upload to the electronic bidding platform, the electronic bidding platform publishes bidding announcements and performs operations such as bidding, the bidder creates qualification pre-approval application documents, bidding documents and the like to upload to the electronic bidding platform, when opening bids, key information in all bidding documents is disclosed to all bidders, and the bidders are connected through the electronic bidding platform to realize remote opening bids, thereby completing series operations of bidding.
In the bidding process, in order to avoid the situation that surrounding bidding, string bidding and the like damage the bidder or the interests of the bidder, the electronic bidding platform needs to encrypt bidding documents and the like uploaded by the bidder, and ensures that other people cannot obtain the bidding information of the bidder from the electronic bidding platform before opening the bid. The encryption and decryption modes adopted by the existing electronic bid inviting bidding platform are mainly symmetric algorithm encryption and decryption and asymmetric algorithm encryption and decryption, but the symmetric algorithm is adopted purely, the same secret key is adopted for the encryption and decryption, the encryption and decryption process is simple, the security is not high, the situation of being cracked easily occurs, the asymmetric algorithm is adopted purely, a pair of public key and private key is adopted for the encryption and decryption, the security is high, but the private key is usually stored by a bidding party, therefore, the bidding party is required to provide the private key to the site during decryption, decryption is completed, and remote bid opening cannot be realized.
Disclosure of Invention
The invention aims to provide an encryption and decryption encryption system for remote bid opening type bidding, which aims to solve the technical problem that the bidding information is not high in safety during remote bidding in the prior art.
The basic scheme provided by the invention is as follows: the encryption and decryption encryption system for remote bid inviting and bidding comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to the bid information uploaded by the user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information.
Description of the nouns: the user side is an intelligent device used by the bidder, such as a PC; the bidding information is a qualification prequalification application file, a bidding file and the like uploaded by the bidder; the encryption key is used by adopting a symmetric encryption algorithm; the public and private key pair is a pair of a public key and a private key used by adopting an asymmetric encryption algorithm.
The beneficial effects of the basic scheme are as follows: the encryption subsystem is arranged for generating an encryption key according to the bidding information, and the encryption key is related to the bidding party and ensures the uniqueness of the encryption key; and a public and private key pair is generated according to the encryption key, so that the generation difficulty of the public and private key pair is reduced while the uniqueness of the public and private key pair is ensured. The system comprises an encryption subsystem, a public key and a symmetric encryption algorithm, wherein the encryption subsystem is arranged for encrypting the bidding information according to the encryption key to generate a primary ciphertext, encrypting the primary ciphertext according to the public key to generate a secondary ciphertext, encrypting the bidding information for multiple times to ensure the safety of the bidding information, encrypting the bidding information by adopting the symmetric encryption algorithm to generate the primary ciphertext, realizing rapid encryption, encrypting the primary ciphertext by adopting the asymmetric encryption algorithm to generate the secondary ciphertext, and enhancing the security of encryption.
And the decryption subsystem is arranged for decrypting the secondary ciphertext by using the private key to obtain a primary ciphertext and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information. The private key is stored by the electronic bidding platform and is automatically decrypted by the electronic bidding platform when the bidding is started, the encryption secret key is stored by the bidding party and uploaded by the bidding party through the user side when the bidding is started, the electronic bidding platform decrypts the primary ciphertext according to the encryption secret key uploaded by the bidding party, namely, the private key and the encryption secret key are separately stored by the electronic bidding platform and the bidding party, the safety of bidding information is ensured, and the risk of leakage of the bidding information before the bidding is started is reduced.
Further, the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining a first encryption character from the bidding information according to a preset extraction rule, and the secret key generation module is used for generating an encryption secret key according to the first encryption character. Has the advantages that: the device comprises a character extraction module, a key generation module and a bidding information acquisition module, wherein the character extraction module is used for acquiring a first encryption character from the bidding information, and the key generation module is used for generating an encryption key according to the first encryption character, and the first encryption character is associated with the bidding information, so that the uniqueness of the encryption key is ensured.
Further, the character extraction module is further configured to randomly arrange the acquired first encrypted characters, and the key generation module is configured to generate an encryption key according to the arranged first encrypted characters. Has the advantages that: the first encrypted characters are also randomly arranged through the character extraction module, uniqueness of the encrypted secret key is effectively guaranteed through a random arrangement mode, the phenomenon that the encrypted secret keys are the same due to similarity of bidding information is reduced, and safety of the bidding information is improved.
Further, the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining second encryption characters from the encryption secret key according to preset extraction rules, and the secret key generation module is used for generating a public and private key pair according to the second encryption characters. Has the advantages that: the device comprises a character extraction module, a key generation module and a bidding information generation module, wherein the character extraction module is used for acquiring a second encryption character from an encryption key, the key generation module is used for generating a public and private key pair according to the second encryption character, the second encryption character is associated with the encryption key, and the encryption key is associated with the bidding information.
Further, the character extraction module is further configured to randomly arrange the obtained second encrypted characters, and the key generation module is configured to generate a public and private key pair according to the arranged second encrypted characters. Has the advantages that: the setting of character extraction module still arranges second encryption character random, through the mode of random arrangement, effectively guarantees the uniqueness of second encryption character, reduces to cause public and private key to the same phenomenon to produce because of encrypting secret key is similar, improves the security of bid information.
Furthermore, the encryption subsystem also comprises a secret key storage module, and the secret key storage module is used for sending the encryption secret key to the user side and storing the public and private key pair in and out. Has the advantages that: the user is used for the bidder who encrypts the bid information that the key corresponds, and encryption key sends for the user, keeps by the bidder, and public private key is to being stored by key storage module, keeps encrypting key and public private key separately, can acquire the bid information only in the condition that encryption key and public private key all exist to guarantee the security of bid information, reduce the risk of leaking bid information before opening a bid.
Further, the extraction rule is to extract numbers or letters in the bidding information or the encryption key. Has the advantages that: the extraction of the numbers or the letters is convenient for identification and extraction, and is convenient for generating an encryption key or a public and private key pair, so that the encryption speed is improved.
Furthermore, the encryption subsystem is also used for extracting verification information from the bidding information, backing up the encryption key and encrypting and generating the primary ciphertext and the verification information according to the public key when generating the secondary ciphertext; the decryption subsystem is further used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext and verification information when receiving a verification request uploaded by the user side, obtaining request information uploaded by the user side according to the verification information, verifying according to the verification information and the request information, and obtaining a backup encryption key to decrypt the primary ciphertext to obtain bidding information when verification is successful. Has the advantages that: and during encryption, the primary ciphertext and the verification information are jointly encrypted, so that the safety of the verification information is enhanced. When opening the bid and decrypting, when the encryption key is lost or forgotten by the bidder, the bidder uploads request information through the user side, the private key of the system is used for decrypting to obtain verification information, the verification is carried out according to the verification information, so that the identity of the bidder is judged, when the verification is successful, the identity of the bidder is correct, and the system obtains the backup encryption key to decrypt a ciphertext, so that the bidding information is obtained. And at the moment, the backup encryption key is obtained and is not fed back to the bidding party, so that the safety of the encryption key is ensured.
Further, the encryption subsystem comprises an information extraction module, the bidding information is the tender, and the information extraction module is used for extracting the first N pages of the tender as the verification information. Has the advantages that: the information extraction module is used for extracting verification information, the first pages of the tender book are generally covers and catalogs, and the value of N is determined according to requirements, so that information which does not relate to bidding data and the like and influences bidding results in the tender book is obtained for verification.
Further, the decryption subsystem comprises an information verification module, the information verification module is used for matching verification information according to the request information, and when the matching degree is larger than a preset matching threshold value, a verification passing signal is generated. Has the advantages that: and the information verification module is arranged to realize the verification of the request information, so that the identity of the bidder is verified.
Drawings
FIG. 1 is a logic block diagram of a first embodiment of an encryption/decryption system for remote bidding according to the present invention;
fig. 2 is a logic block diagram of a second embodiment of an encryption/decryption system for remote bidding according to the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
The method and the device are applied to the electronic bid tendering and bidding platform, and can be used for encrypting the bid information during bidding and decrypting the bid information during opening the bid.
The encryption and decryption system for remote bid tendering comprises an encryption subsystem, a decryption subsystem, a database and a user side, as shown in fig. 1. In this embodiment, the user terminal is an intelligent device used by the bidder. The database is pre-stored with extraction rules, wherein the extraction rules are to extract numbers or letters from information to be extracted, the information to be extracted includes bid information and an encryption key, in the present embodiment, the extraction rules are to extract numbers from the information to be extracted, and in other embodiments, the extraction rules are to extract letters from the information to be extracted.
The user side is used for acquiring the bid information, and the bid information is a file uploaded by a bidder, such as a bid file, a prequalification application file, and the like.
The encryption subsystem comprises a character extraction module, a secret key generation module, a secret key storage module and an encryption module.
The character extraction module is used for acquiring extraction rules from the database when the bid information is received, acquiring first encrypted characters from the bid information according to the extraction rules, and randomly arranging the acquired first encrypted characters, wherein in other embodiments, the acquired first encrypted characters are arranged according to an acquisition sequence. The key generation module is used for generating an encryption key according to the arranged first encrypted character and sending the encryption key to the character extraction module, the encryption module and the key storage module.
The character extraction module is further used for acquiring a second encryption character from the encryption key according to the extraction rule when the encryption key is received, and randomly arranging the acquired second encryption character. The secret key generating module is used for generating a public and private key pair according to the arranged second encrypted characters, sending a public key in the public and private key pair to the encrypting module, and sending a private key to the secret key storage module.
The key storage module is used for sending the received encryption key to the user side and storing the received private key. The user side is used for displaying the encryption key for the bidder to view and store.
The encryption module comprises a primary encryption submodule and a secondary encryption submodule, wherein the primary encryption submodule is used for receiving an encryption key and encrypting the bidding information corresponding to the encryption key according to the encryption key to generate a primary ciphertext; and the secondary encryption submodule is used for receiving the public key, encrypting the primary ciphertext corresponding to the public key according to the public key to generate a secondary ciphertext and storing the secondary ciphertext.
When the bidding time is up, the electronic bidding platform generates a corresponding bidding signal and sends the corresponding bidding signal to the user side of each bidding party, and at this time, the user side is used for obtaining the encryption key uploaded by the bidding party, and the encryption key at this time may be correct or wrong.
The decryption subsystem comprises a secret key obtaining module and a decryption module.
The key obtaining module is used for receiving the encryption key and obtaining a private key corresponding to the encryption key from the key storage module when the mark opening signal is received.
The decryption module comprises a primary decryption submodule and a secondary decryption submodule. The primary decryption submodule is used for acquiring a secondary ciphertext corresponding to the private key from the database and decrypting the secondary ciphertext according to the private key to acquire a primary ciphertext. The secondary decryption submodule is used for decrypting the primary ciphertext according to the encryption secret key, and when the encryption secret key is correct, the secondary decryption submodule decrypts to obtain the bidding information to realize decryption of the bidding information; and when the encryption key is wrong, the secondary decryption submodule generates a decryption failure signal and feeds the decryption failure signal back to the user side. In this embodiment, the association between the bid information, the encryption key, the public and private key pair, the primary ciphertext, the secondary ciphertext and the bidder may be implemented by setting a flag or a flag.
Example two
Because the encryption key is not stored in the system, when the bidding party loses or forgets the encryption key, the bidding party cannot decrypt the bidding information, and the bidding fails.
The difference between the present embodiment and the first embodiment is:
as shown in fig. 2, the encryption subsystem further includes an information extraction module and a key backup module, and the information extraction module is configured to extract the verification information from the bid information and send the verification information to the encryption module. The bid information is a bid document, the bid document includes a tender book, the first pages of the tender book are a cover and a directory, in this embodiment, the information extraction module extracts the first N pages of the tender book as verification information, and the value of N can be set according to the actual situation of the tender book, for example, the value of N is 2. In other embodiments, the information extraction module extracts a cover and a catalog of the tender as the verification information.
And the secondary encryption sub-module is used for encrypting the primary ciphertext and the verification information corresponding to the public key according to the public key to generate a secondary ciphertext and storing the secondary ciphertext when encrypting. That is, in the case of the secondary encryption, not only the primary ciphertext is encrypted, but also the primary ciphertext and the authentication information are jointly encrypted to form a file.
The key generation module is further configured to send the generated encryption key to the key backup module, and the key backup module is configured to backup the encryption key when receiving the encryption key.
When the bidding is started, if the bidding party is lost or forgets to encrypt the secret key, or the secondary decryption submodule generates a decryption failure signal and feeds the decryption failure signal back to the user side, at the moment, the user side is also used for obtaining a verification request of the bidding party and sending the verification request to the decryption subsystem.
The decryption subsystem further includes an information verification module.
The secret key obtaining module is further used for obtaining a secret key corresponding to the bidder from the secret key storage module when the verification request is received and the bidding signal is received.
The primary decryption submodule is used for acquiring a secondary ciphertext corresponding to the private key from the database, decrypting the secondary ciphertext according to the private key to acquire a primary ciphertext and verification information, and sending the verification information to the information verification module.
And the information verification module is used for acquiring verification problems according to the verification information and feeding back the verification problems to the user side when receiving the verification information. In this embodiment, the verification problem is preset in the information verification module in advance, and the verification problem is: please provide the continuous words in the bid-on book, which requires the number of words to exceed 20. In other embodiments, a question template is preset in the information verification module, and the information verification module is configured to generate a verification question according to the question template and the verification information, where the verification question is, for example: please provide the continuous characters in the mth line in the nth page of the tender, the value of N is the same as the value of N in the information extraction module, and the value of M is randomly selected according to the information in the nth page of the verification information.
And the user side is used for acquiring request information fed back by the bidder according to the verification problem and sending the request information to the information verification module. The information verification module is used for matching verification information according to the request information, generating a verification passing signal when the matching degree is larger than a preset matching threshold value, and sending the verification passing signal to the secret key backup module, otherwise, generating a verification failure signal, and sending the verification failure signal to the user side.
And the secret key backup module is used for screening out the encrypted secret key backed up by the bidder when receiving the verification passing signal and sending the encrypted secret key to the decryption module.
And the secondary decryption submodule is used for decrypting the primary ciphertext corresponding to the bidding party according to the encryption key when receiving the encryption key to obtain the bidding information. Since the encryption key is backed up by the system at this time, the decryption thereof must be successful.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. Encryption and decryption encryption system that long-range open type bid is used, its characterized in that: the system comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to the bid information uploaded by a user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information.
2. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining first encryption characters from the bidding information according to a preset extraction rule, and the secret key generation module is used for generating an encryption secret key according to the first encryption characters.
3. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 2, wherein: the character extraction module is further used for randomly arranging the obtained first encryption characters, and the secret key generation module is used for generating encryption secret keys according to the arranged first encryption characters.
4. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining second encryption characters from the encryption secret key according to preset extraction rules, and the secret key generation module is used for generating a public and private key pair according to the second encryption characters.
5. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 4, wherein: the character extraction module is also used for randomly arranging the obtained second encrypted characters, and the secret key generation module is used for generating a public and private key pair according to the arranged second encrypted characters.
6. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem further comprises a secret key storage module, and the secret key storage module is used for sending the encrypted secret key to the user side and storing the public and private key pair in and out.
7. The encryption/decryption encryption system for remote open-bid bidding according to any one of claims 2 to 5, wherein: the extraction rule is to extract the numbers or letters in the bidding information or encryption key.
8. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem is also used for extracting verification information from the bidding information, backing up the encryption key and encrypting and generating the primary ciphertext and the verification information according to the public key when generating the secondary ciphertext; the decryption subsystem is further used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext and verification information when receiving a verification request uploaded by the user side, obtaining request information uploaded by the user side according to the verification information, verifying according to the verification information and the request information, and obtaining a backup encryption key to decrypt the primary ciphertext to obtain bidding information when verification is successful.
9. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 8, wherein: the encryption subsystem comprises an information extraction module, the bidding information is the tender, and the information extraction module is used for extracting the first N pages of the tender as verification information.
10. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 8, wherein: the decryption subsystem comprises an information verification module, the information verification module is used for matching verification information according to the request information, and when the matching degree is larger than a preset matching threshold value, a verification passing signal is generated.
CN202010620244.5A 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding Active CN111786997B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010620244.5A CN111786997B (en) 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010620244.5A CN111786997B (en) 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding

Publications (2)

Publication Number Publication Date
CN111786997A true CN111786997A (en) 2020-10-16
CN111786997B CN111786997B (en) 2023-01-06

Family

ID=72759950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010620244.5A Active CN111786997B (en) 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding

Country Status (1)

Country Link
CN (1) CN111786997B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN112580055A (en) * 2020-12-02 2021-03-30 上海同在互联网科技有限公司 Trusted electronic bid opening method, device and system
CN116232592A (en) * 2023-05-08 2023-06-06 浙江校联信息技术有限公司 Encryption and decryption method and system for online bidding

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664740A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote-authorization-based bidding document encryption and decryption method
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
US20140279147A1 (en) * 2013-03-12 2014-09-18 Elwha LLC, a limited liability company of the State of Delaware Presenting content as a result, at least in part, to relaying of a bid and following lapse of a specific amount of content access latency
CN106682824A (en) * 2016-12-21 2017-05-17 紫勋智能科技(北京)有限公司 Electronic bid and tender management system and bid and tender management method
CN108319860A (en) * 2018-02-07 2018-07-24 南通市公共资源交易中心 A kind of long-range bid opening and bid appraisal management method, management system and management equipment
CN108737326A (en) * 2017-04-14 2018-11-02 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for carrying out token authentication
CN109064297A (en) * 2018-07-13 2018-12-21 宁夏神州好易信息发展股份有限公司 A kind of quickly online electronics opening of bid method
CN110430052A (en) * 2019-08-05 2019-11-08 中国工商银行股份有限公司 A kind of online filling method and device of POS key
CN111192050A (en) * 2019-12-31 2020-05-22 成都库珀区块链科技有限公司 Digital asset private key storage and extraction method and device
CN111277651A (en) * 2020-01-20 2020-06-12 国网江苏招标有限公司 Remote bidding method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664740A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote-authorization-based bidding document encryption and decryption method
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
US20140279147A1 (en) * 2013-03-12 2014-09-18 Elwha LLC, a limited liability company of the State of Delaware Presenting content as a result, at least in part, to relaying of a bid and following lapse of a specific amount of content access latency
CN106682824A (en) * 2016-12-21 2017-05-17 紫勋智能科技(北京)有限公司 Electronic bid and tender management system and bid and tender management method
CN108737326A (en) * 2017-04-14 2018-11-02 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for carrying out token authentication
CN108319860A (en) * 2018-02-07 2018-07-24 南通市公共资源交易中心 A kind of long-range bid opening and bid appraisal management method, management system and management equipment
CN109064297A (en) * 2018-07-13 2018-12-21 宁夏神州好易信息发展股份有限公司 A kind of quickly online electronics opening of bid method
CN110430052A (en) * 2019-08-05 2019-11-08 中国工商银行股份有限公司 A kind of online filling method and device of POS key
CN111192050A (en) * 2019-12-31 2020-05-22 成都库珀区块链科技有限公司 Digital asset private key storage and extraction method and device
CN111277651A (en) * 2020-01-20 2020-06-12 国网江苏招标有限公司 Remote bidding method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112580055A (en) * 2020-12-02 2021-03-30 上海同在互联网科技有限公司 Trusted electronic bid opening method, device and system
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN116232592A (en) * 2023-05-08 2023-06-06 浙江校联信息技术有限公司 Encryption and decryption method and system for online bidding

Also Published As

Publication number Publication date
CN111786997B (en) 2023-01-06

Similar Documents

Publication Publication Date Title
CN111786997B (en) Encryption and decryption encryption system for remote bid opening type bidding
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
US8490164B2 (en) User authentication method, user authenticating device and program product
US6549626B1 (en) Method and apparatus for encoding keys
US7606768B2 (en) Voice signature with strong binding
US6160891A (en) Methods and apparatus for recovering keys
US9246889B2 (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
US20160337124A1 (en) Secure backup and recovery system for private sensitive data
EP1322086A2 (en) Assignment of user certificates/private keys in token enabled public key infrastructure system
CN109981255B (en) Method and system for updating key pool
US20220070005A1 (en) File acquisition method and device based on two-dimensional code and two-dimensional code generating method
KR20060127080A (en) User authentication method based on the utilization of biometric identification techniques and related architecture
US20080098214A1 (en) Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media
CN112016111A (en) Credible bidding encryption and decryption method supporting centralized decryption
CN109118377B (en) Processing method and system for claim settlement event based on block chain and electronic equipment
JPH11239124A (en) Method and device for restoring secret key
CN105790940A (en) Electronic bid-inviting and bidding system and method based on Shamir threshold
CN111242611B (en) Method and system for recovering digital wallet key
CN112685786A (en) Financial data encryption and decryption method, system, equipment and storage medium
EP0912011A2 (en) Method and apparatus for encoding and recovering keys
CN114786160B (en) NFC label key management system
CN113079002B (en) Data encryption method, data decryption method, key management method, medium, and device
CN107332663A (en) Archive management method based on encryption technology
CN109412799B (en) System and method for generating local key
CN1558580B (en) A network data safety protection method based on cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000

Patentee after: Guangyike Data Technology Co.,Ltd.

Address before: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000

Patentee before: Guizhou Light Technology Co.,Ltd.

CP01 Change in the name or title of a patent holder