CN111786997B - Encryption and decryption encryption system for remote bid opening type bidding - Google Patents

Encryption and decryption encryption system for remote bid opening type bidding Download PDF

Info

Publication number
CN111786997B
CN111786997B CN202010620244.5A CN202010620244A CN111786997B CN 111786997 B CN111786997 B CN 111786997B CN 202010620244 A CN202010620244 A CN 202010620244A CN 111786997 B CN111786997 B CN 111786997B
Authority
CN
China
Prior art keywords
encryption
information
key
bidding
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010620244.5A
Other languages
Chinese (zh)
Other versions
CN111786997A (en
Inventor
石健昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangyike Data Technology Co ltd
Original Assignee
Guizhou Light Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Light Technology Co ltd filed Critical Guizhou Light Technology Co ltd
Priority to CN202010620244.5A priority Critical patent/CN111786997B/en
Publication of CN111786997A publication Critical patent/CN111786997A/en
Application granted granted Critical
Publication of CN111786997B publication Critical patent/CN111786997B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention relates to the technical field of digital information secure transmission, in particular to an encryption and decryption encryption system for remote bid-opening type bidding, which comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to bid information uploaded by a user end and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information. By adopting the scheme, the technical problem that the bidding information is not high in safety when the bidding is remotely carried out in the prior art can be solved.

Description

Encryption and decryption encryption system for remote bid opening type bidding
Technical Field
The invention relates to the technical field of digital information secure transmission, in particular to an encryption and decryption encryption system for remote bid opening type bidding.
Background
With the development of internet technology, various transactions have been changed from off-line transactions to on-line transactions, for example, an electronic bidding platform, a bidder creates qualification pre-approval documents, bidding documents and the like to upload to the electronic bidding platform, the electronic bidding platform publishes bidding announcements and performs operations such as bidding, the bidder creates qualification pre-approval application documents, bidding documents and the like to upload to the electronic bidding platform, when opening bids, key information in all bidding documents is disclosed to all bidders, and the bidders are connected through the electronic bidding platform to realize remote opening bids, thereby completing series operations of bidding.
In the bidding process, in order to avoid the situation that surrounding bidding, string bidding and the like damage the bidder or the interests of the bidder, the electronic bidding platform needs to encrypt bidding documents and the like uploaded by the bidder, and ensures that other people cannot obtain the bidding information of the bidder from the electronic bidding platform before opening the bid. The encryption and decryption modes adopted by the existing electronic bid inviting and bidding platform are mainly symmetric algorithm encryption and decryption and asymmetric algorithm encryption and decryption, but a symmetric algorithm is simply adopted, the same secret key is adopted for encryption and decryption, the encryption and decryption process is simple, the security is not high, the situation of being cracked easily occurs, an asymmetric algorithm is simply adopted, a pair of public key and private key is adopted for encryption and decryption, the security is high, but the private key is usually stored by a bidding party, and therefore during decryption, the bidding party is required to go to the site to provide the private key, decryption is finished, and remote bid opening cannot be realized.
Disclosure of Invention
The invention aims to provide an encryption and decryption encryption system for remote bid opening type bidding, and aims to solve the technical problem that the bidding information safety is not high when the bidding is carried out remotely in the prior art.
The basic scheme provided by the invention is as follows: the encryption and decryption encryption system for the remote bid opening type bidding comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to the bid information uploaded by the user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information.
Description of the nouns: intelligent equipment used by the user side as a bidder, such as a PC; the bidding information is a qualification prequalification application file, a bidding file and the like uploaded by the bidder; the encryption key is used by adopting a symmetric encryption algorithm; the public and private key pair is a pair of a public key and a private key used by adopting an asymmetric encryption algorithm.
The basic scheme has the beneficial effects that: the encryption subsystem is arranged for generating an encryption key according to the bid information, and the encryption key is related to the bid party and ensures the uniqueness of the encryption key; and generating a public and private key pair according to the encryption secret key, and reducing the generation difficulty of the public and private key pair while ensuring the uniqueness of the public and private key pair. The system comprises an encryption subsystem, a public key and a symmetric encryption algorithm, wherein the encryption subsystem is arranged for encrypting the bidding information according to the encryption key to generate a primary ciphertext, encrypting the primary ciphertext according to the public key to generate a secondary ciphertext, encrypting the bidding information for multiple times to ensure the safety of the bidding information, encrypting the bidding information by adopting the symmetric encryption algorithm to generate the primary ciphertext, realizing rapid encryption, encrypting the primary ciphertext by adopting the asymmetric encryption algorithm to generate the secondary ciphertext, and enhancing the security of encryption.
And the decryption subsystem is arranged for decrypting the secondary ciphertext by using the private key to obtain a primary ciphertext and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information. The private key is stored by the electronic bidding and bidding platform, and carry out automatic deciphering by the electronic bidding and bidding platform when opening the bid, the encryption key is preserved by the bidding party, upload through the user end by the bidding party when opening the bid, the electronic bidding and bidding platform decrypts the ciphertext according to the encryption key that the bidding party uploaded, private key and encryption key are preserved by the electronic bidding and bidding platform and the bidding party separately promptly, guarantee the security of bid information, reduce the risk of revealing bid information before opening the bid.
Further, the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining a first encryption character from the bidding information according to a preset extraction rule, and the secret key generation module is used for generating an encryption secret key according to the first encryption character. Has the advantages that: the device comprises a character extraction module, a key generation module and a display module, wherein the character extraction module is used for obtaining a first encryption character from the bid information, the key generation module is used for generating an encryption key according to the first encryption character, and the first encryption character is associated with the bid information, so that the uniqueness of the encryption key is ensured.
Further, the character extraction module is further configured to randomly arrange the acquired first encrypted characters, and the key generation module is configured to generate an encryption key according to the arranged first encrypted characters. Has the advantages that: the first encrypted characters are also randomly arranged through the character extraction module, uniqueness of the encrypted secret key is effectively guaranteed through a random arrangement mode, the phenomenon that the encrypted secret keys are the same due to similarity of bidding information is reduced, and safety of the bidding information is improved.
Further, the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining second encryption characters from the encryption secret key according to preset extraction rules, and the secret key generation module is used for generating a public and private key pair according to the second encryption characters. Has the advantages that: the device comprises a character extraction module, a key generation module and a bidding information generation module, wherein the character extraction module is used for acquiring a second encryption character from an encryption key, the key generation module is used for generating a public and private key pair according to the second encryption character, the second encryption character is associated with the encryption key, and the encryption key is associated with the bidding information.
Further, the character extraction module is also used for randomly arranging the obtained second encrypted characters, and the secret key generation module is used for generating a public and private key pair according to the arranged second encrypted characters. Has the beneficial effects that: the setting of character extraction module still arranges second encryption character random, through the mode of random arrangement, effectively guarantees the uniqueness of second encryption character, reduces to cause public and private key to the same phenomenon to produce because of encrypting secret key is similar, improves the security of bid information.
Furthermore, the encryption subsystem also comprises an encryption key storage module, and the encryption key storage module is used for sending the encryption key to the user side and storing the public and private key pair in and out. Has the advantages that: the user is used for the bidder who encrypts the bid information that the key corresponds, and encryption key sends for the user, keeps by the bidder, and public private key is to being stored by key storage module, keeps encrypting key and public private key separately, can acquire the bid information only in the condition that encryption key and public private key all exist to guarantee the security of bid information, reduce the risk of leaking bid information before opening a bid.
Further, the extraction rule is to extract numbers or letters in the bidding information or the encryption key. Has the beneficial effects that: the extraction of the numbers or the letters is convenient for identification and extraction, and is convenient for generating an encryption key or a public and private key pair, so that the encryption speed is improved.
Furthermore, the encryption subsystem is also used for extracting verification information from the bidding information, backing up the encryption key and encrypting and generating the primary ciphertext and the verification information according to the public key when generating the secondary ciphertext; the decryption subsystem is further used for decrypting the secondary ciphertext according to the private key to obtain the primary ciphertext and the verification information when receiving the verification request uploaded by the user side, obtaining the request information uploaded by the user side according to the verification information, verifying according to the verification information and the request information, and obtaining the backup encryption key to decrypt the primary ciphertext to obtain the bidding information when the verification is successful. Has the advantages that: during encryption, the primary ciphertext and the verification information are encrypted together, so that the safety of the verification information is enhanced. When opening the bid and decrypting, when the encryption key is lost or forgotten by the bidder, the bidder uploads request information through the user side, the private key of the system is used for decrypting to obtain verification information, the verification is carried out according to the verification information, so that the identity of the bidder is judged, when the verification is successful, the identity of the bidder is correct, and the system obtains the backup encryption key to decrypt a ciphertext, so that the bidding information is obtained. And at the moment, the backup encryption key is obtained and is not fed back to the bidding party, so that the safety of the encryption key is ensured.
Further, the encryption subsystem comprises an information extraction module, the bidding information is the tender, and the information extraction module is used for extracting the first N pages of the tender as the verification information. Has the advantages that: the information extraction module is used for extracting verification information, the first pages of the tender book are generally covers and catalogues, and the value of N is determined according to requirements, so that information which does not relate to bidding data and the like and influences bidding results in the tender book is obtained for verification.
Further, the decryption subsystem comprises an information verification module, the information verification module is used for matching verification information according to the request information, and when the matching degree is larger than a preset matching threshold value, a verification passing signal is generated. Has the beneficial effects that: and the information verification module is arranged to realize the verification of the request information, so that the identity of the bidder is verified.
Drawings
FIG. 1 is a logic block diagram of a first embodiment of an encryption/decryption system for remote bidding according to the present invention;
fig. 2 is a logic block diagram of a second embodiment of an encryption/decryption system for remote bidding according to the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
The method and the device are applied to the electronic bid tendering and bidding platform, and can be used for encrypting the bid information during bidding and decrypting the bid information during opening the bid.
The encryption and decryption system for remote bid tendering comprises an encryption subsystem, a decryption subsystem, a database and a user side, as shown in fig. 1. In this embodiment, the user terminal is an intelligent device used by the bidder. The database is pre-stored with extraction rules, wherein the extraction rules are to extract numbers or letters from information to be extracted, the information to be extracted includes bid information and an encryption key, in the present embodiment, the extraction rules are to extract numbers from the information to be extracted, and in other embodiments, the extraction rules are to extract letters from the information to be extracted.
The user side is used for acquiring the bid information, and the bid information is a file uploaded by a bidder, such as a bid file, a prequalification application file, and the like.
The encryption subsystem comprises a character extraction module, a secret key generation module, a secret key storage module and an encryption module.
The character extraction module is used for acquiring an extraction rule from the database when the bid information is received, acquiring a first encrypted character from the bid information according to the extraction rule, and randomly arranging the acquired first encrypted character, wherein in other embodiments, the acquired first encrypted character is arranged according to an acquisition sequence. The key generation module is used for generating an encryption key according to the arranged first encrypted character and sending the encryption key to the character extraction module, the encryption module and the key storage module.
The character extraction module is further used for obtaining second encryption characters from the encryption key according to the extraction rule when the encryption key is received, and randomly arranging the obtained second encryption characters. The secret key generating module is used for generating a public and private key pair according to the arranged second encrypted characters, sending a public key in the public and private key pair to the encrypting module, and sending a private key to the secret key storage module.
The key storage module is used for sending the received encryption key to the user side and storing the received private key. The user side is used for displaying the encryption key for the bidder to view and store.
The encryption module comprises a primary encryption submodule and a secondary encryption submodule, wherein the primary encryption submodule is used for receiving the encryption key and encrypting the bidding information corresponding to the encryption key according to the encryption key to generate a primary ciphertext; the secondary encryption submodule is used for receiving the public key, encrypting the primary ciphertext corresponding to the public key according to the public key to generate a secondary ciphertext and storing the secondary ciphertext.
When the bidding time is up, the electronic bidding platform generates a corresponding bidding signal and sends the corresponding bidding signal to the user side of each bidding party, and at this time, the user side is used for obtaining the encryption key uploaded by the bidding party, and the encryption key at this time may be correct or wrong.
The decryption subsystem comprises a key acquisition module and a decryption module.
The key obtaining module is used for receiving the encryption key and obtaining a private key corresponding to the encryption key from the key storage module when the mark opening signal is received.
The decryption module comprises a primary decryption submodule and a secondary decryption submodule. The primary decryption submodule is used for acquiring a secondary ciphertext corresponding to the private key from the database and decrypting the secondary ciphertext according to the private key to acquire a primary ciphertext. The secondary decryption submodule is used for decrypting the primary ciphertext according to the encryption secret key, and when the encryption secret key is correct, the secondary decryption submodule decrypts to obtain the bid information to realize decryption of the bid information; and when the encryption key is wrong, the secondary decryption submodule generates a decryption failure signal and feeds the decryption failure signal back to the user side. In this embodiment, the association between the bid information, the encryption key, the public and private key pair, the primary ciphertext, the secondary ciphertext, and the bidder may be implemented by setting a flag or a flag.
Example two
Because the encryption key is not stored in the system, when the bidder loses or forgets the encryption key, the bidder cannot decrypt the bidding information, and the bidding fails.
The difference between the present embodiment and the first embodiment is:
as shown in fig. 2, the encryption subsystem further includes an information extraction module and a key backup module, and the information extraction module is configured to extract the verification information from the bid information and send the verification information to the encryption module. The bid information is a bid document, the bid document includes a bid book, the first pages of the bid book are a cover and a directory, in this embodiment, the information extraction module extracts the first N pages of the bid book as verification information, and the value of N can be set according to the actual situation of the bid book, for example, the value of N is 2. In other embodiments, the information extraction module extracts a cover and a catalog of the tender as the verification information.
And the secondary encryption sub-module is used for encrypting the primary ciphertext and the verification information corresponding to the public key according to the public key to generate a secondary ciphertext and storing the secondary ciphertext when encrypting. That is, in the case of the secondary encryption, not only the primary ciphertext is encrypted, but also the primary ciphertext and the authentication information are jointly encrypted to form a file.
The key generation module is further configured to send the generated encryption key to the key backup module, and the key backup module is configured to backup the encryption key when receiving the encryption key.
When the bidding is started, if the bidding party is lost or forgets to encrypt the secret key, or the secondary decryption submodule generates a decryption failure signal and feeds the decryption failure signal back to the user side, at the moment, the user side is also used for obtaining a verification request of the bidding party and sending the verification request to the decryption subsystem.
The decryption subsystem further comprises an information verification module.
The secret key obtaining module is also used for obtaining a secret key corresponding to the bidder from the secret key storage module when the verification request is received and the bid opening signal is received.
The primary decryption submodule is used for acquiring a secondary ciphertext corresponding to the private key from the database, decrypting the secondary ciphertext according to the private key to acquire a primary ciphertext and verification information, and sending the verification information to the information verification module.
And the information verification module is used for acquiring verification problems according to the verification information and feeding back the verification problems to the user side when receiving the verification information. In this embodiment, the verification problem is preset in the information verification module in advance, and the verification problem is: please provide the continuous words in the bid-on book, which requires the number of words to exceed 20. In other embodiments, the information verification module is preset with a question template, and the information verification module is configured to generate a verification question according to the question template and the verification information, where the verification question includes: please provide the continuous characters in the mth line in the nth page of the tender, the value of N is the same as the value of N in the information extraction module, and the value of M is randomly selected according to the information in the nth page of the verification information.
And the user side is used for acquiring request information fed back by the bidder according to the verification problem and sending the request information to the information verification module. The information verification module is used for matching verification information according to the request information, generating a verification passing signal when the matching degree is larger than a preset matching threshold value, and sending the verification passing signal to the secret key backup module, otherwise, generating a verification failure signal, and sending the verification failure signal to the user side.
And the secret key backup module is used for screening out the encrypted secret key backed up by the bidder when receiving the verification passing signal and sending the encrypted secret key to the decryption module.
And the secondary decryption submodule is used for decrypting the primary ciphertext corresponding to the bidding party according to the encryption key when receiving the encryption key to obtain the bidding information. Since the encryption key is backed up by the system at this time, the decryption thereof must be successful.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (8)

1. Encryption and decryption encryption system that long-range open type bid is used, its characterized in that: the system comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to the bid information uploaded by a user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to an encryption key uploaded by the user side to obtain bidding information;
the encryption subsystem is also used for extracting verification information from the bidding information, backing up the encryption key and encrypting and generating the primary ciphertext and the verification information according to the public key when generating the secondary ciphertext; the decryption subsystem is further used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext and verification information when receiving a verification request uploaded by the user side, obtaining request information uploaded by the user side according to the verification information, verifying according to the verification information and the request information, and obtaining a backup encryption key to decrypt the primary ciphertext to obtain bidding information when the verification is successful;
the encryption subsystem comprises an information extraction module, the bidding information is the tender, and the information extraction module is used for extracting the first N pages of the tender as verification information.
2. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining first encryption characters from the bidding information according to a preset extraction rule, and the secret key generation module is used for generating an encryption secret key according to the first encryption characters.
3. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 2, wherein: the character extraction module is further used for randomly arranging the obtained first encryption characters, and the secret key generation module is used for generating an encryption secret key according to the arranged first encryption characters.
4. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining second encryption characters from the encryption secret key according to preset extraction rules, and the secret key generation module is used for generating a public and private key pair according to the second encryption characters.
5. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 4, wherein: the character extraction module is also used for randomly arranging the obtained second encrypted characters, and the secret key generation module is used for generating a public and private key pair according to the arranged second encrypted characters.
6. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem also comprises an encryption key storage module, and the encryption key storage module is used for sending the encryption key to the user side and storing the public and private key pair in and out.
7. The encryption/decryption encryption system for remote bid-opening type bidding according to any one of claims 2 to 5, wherein: the extraction rule is to extract the numbers or letters in the bidding information or encryption key.
8. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the decryption subsystem comprises an information verification module, the information verification module is used for matching verification information according to the request information, and when the matching degree is larger than a preset matching threshold value, a verification passing signal is generated.
CN202010620244.5A 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding Active CN111786997B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010620244.5A CN111786997B (en) 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010620244.5A CN111786997B (en) 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding

Publications (2)

Publication Number Publication Date
CN111786997A CN111786997A (en) 2020-10-16
CN111786997B true CN111786997B (en) 2023-01-06

Family

ID=72759950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010620244.5A Active CN111786997B (en) 2020-06-30 2020-06-30 Encryption and decryption encryption system for remote bid opening type bidding

Country Status (1)

Country Link
CN (1) CN111786997B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112580055A (en) * 2020-12-02 2021-03-30 上海同在互联网科技有限公司 Trusted electronic bid opening method, device and system
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN116232592B (en) * 2023-05-08 2023-08-01 浙江校联信息技术有限公司 Encryption and decryption method and system for online bidding

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064297A (en) * 2018-07-13 2018-12-21 宁夏神州好易信息发展股份有限公司 A kind of quickly online electronics opening of bid method
CN111192050A (en) * 2019-12-31 2020-05-22 成都库珀区块链科技有限公司 Digital asset private key storage and extraction method and device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
CN102664740B (en) * 2012-05-02 2014-12-17 四川建设网有限责任公司 Remote-authorization-based bidding document encryption and decryption method
US20140279146A1 (en) * 2013-03-12 2014-09-18 Elwha Llc Presenting content as a result, at least in part, to relaying of a bid and following lapse of a specific amount of content access latency
CN106682824A (en) * 2016-12-21 2017-05-17 紫勋智能科技(北京)有限公司 Electronic bid and tender management system and bid and tender management method
CN108737326B (en) * 2017-04-14 2021-03-30 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for token verification
CN108319860B (en) * 2018-02-07 2021-05-11 南通市公共资源交易中心 Remote bid evaluation management method, management system and management equipment
CN110430052B (en) * 2019-08-05 2023-01-31 中国工商银行股份有限公司 POS key online filling method and device
CN111277651B (en) * 2020-01-20 2024-04-09 国网江苏招标有限公司 Remote bidding method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064297A (en) * 2018-07-13 2018-12-21 宁夏神州好易信息发展股份有限公司 A kind of quickly online electronics opening of bid method
CN111192050A (en) * 2019-12-31 2020-05-22 成都库珀区块链科技有限公司 Digital asset private key storage and extraction method and device

Also Published As

Publication number Publication date
CN111786997A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN111786997B (en) Encryption and decryption encryption system for remote bid opening type bidding
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
US10659220B2 (en) Method and system for encrypting and decrypting two-dimensional code mask
US6549626B1 (en) Method and apparatus for encoding keys
CN101057448B (en) Securely computing a similarity measure
US7606768B2 (en) Voice signature with strong binding
US9246889B2 (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
US20080082817A1 (en) User authentication method, user authenticating device and program product
KR20060127080A (en) User authentication method based on the utilization of biometric identification techniques and related architecture
US20080098214A1 (en) Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media
CN109118377B (en) Processing method and system for claim settlement event based on block chain and electronic equipment
CN112016111A (en) Credible bidding encryption and decryption method supporting centralized decryption
CN111144531B (en) Two-dimensional code generation method and device, electronic equipment and computer readable storage medium
CN111917535A (en) Data encryption storage method and device and server
CN114786160B (en) NFC label key management system
CN113079002B (en) Data encryption method, data decryption method, key management method, medium, and device
CN107332663A (en) Archive management method based on encryption technology
CN109412799B (en) System and method for generating local key
CN1558580B (en) A network data safety protection method based on cryptography
US20200092096A1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN111541708B (en) Identity authentication method based on power distribution
CN111541652B (en) System for improving security of secret information keeping and transmission
CN109302284B (en) Hardware wallet
CN115114648A (en) Data processing method and device and electronic equipment
CN113922973A (en) Ciphertext-based login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000

Patentee after: Guangyike Data Technology Co.,Ltd.

Address before: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000

Patentee before: Guizhou Light Technology Co.,Ltd.

CP01 Change in the name or title of a patent holder