CN111786997B - Encryption and decryption encryption system for remote bid opening type bidding - Google Patents
Encryption and decryption encryption system for remote bid opening type bidding Download PDFInfo
- Publication number
- CN111786997B CN111786997B CN202010620244.5A CN202010620244A CN111786997B CN 111786997 B CN111786997 B CN 111786997B CN 202010620244 A CN202010620244 A CN 202010620244A CN 111786997 B CN111786997 B CN 111786997B
- Authority
- CN
- China
- Prior art keywords
- encryption
- information
- key
- bidding
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/08—Auctions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Abstract
The invention relates to the technical field of digital information secure transmission, in particular to an encryption and decryption encryption system for remote bid-opening type bidding, which comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to bid information uploaded by a user end and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information. By adopting the scheme, the technical problem that the bidding information is not high in safety when the bidding is remotely carried out in the prior art can be solved.
Description
Technical Field
The invention relates to the technical field of digital information secure transmission, in particular to an encryption and decryption encryption system for remote bid opening type bidding.
Background
With the development of internet technology, various transactions have been changed from off-line transactions to on-line transactions, for example, an electronic bidding platform, a bidder creates qualification pre-approval documents, bidding documents and the like to upload to the electronic bidding platform, the electronic bidding platform publishes bidding announcements and performs operations such as bidding, the bidder creates qualification pre-approval application documents, bidding documents and the like to upload to the electronic bidding platform, when opening bids, key information in all bidding documents is disclosed to all bidders, and the bidders are connected through the electronic bidding platform to realize remote opening bids, thereby completing series operations of bidding.
In the bidding process, in order to avoid the situation that surrounding bidding, string bidding and the like damage the bidder or the interests of the bidder, the electronic bidding platform needs to encrypt bidding documents and the like uploaded by the bidder, and ensures that other people cannot obtain the bidding information of the bidder from the electronic bidding platform before opening the bid. The encryption and decryption modes adopted by the existing electronic bid inviting and bidding platform are mainly symmetric algorithm encryption and decryption and asymmetric algorithm encryption and decryption, but a symmetric algorithm is simply adopted, the same secret key is adopted for encryption and decryption, the encryption and decryption process is simple, the security is not high, the situation of being cracked easily occurs, an asymmetric algorithm is simply adopted, a pair of public key and private key is adopted for encryption and decryption, the security is high, but the private key is usually stored by a bidding party, and therefore during decryption, the bidding party is required to go to the site to provide the private key, decryption is finished, and remote bid opening cannot be realized.
Disclosure of Invention
The invention aims to provide an encryption and decryption encryption system for remote bid opening type bidding, and aims to solve the technical problem that the bidding information safety is not high when the bidding is carried out remotely in the prior art.
The basic scheme provided by the invention is as follows: the encryption and decryption encryption system for the remote bid opening type bidding comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to the bid information uploaded by the user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information.
Description of the nouns: intelligent equipment used by the user side as a bidder, such as a PC; the bidding information is a qualification prequalification application file, a bidding file and the like uploaded by the bidder; the encryption key is used by adopting a symmetric encryption algorithm; the public and private key pair is a pair of a public key and a private key used by adopting an asymmetric encryption algorithm.
The basic scheme has the beneficial effects that: the encryption subsystem is arranged for generating an encryption key according to the bid information, and the encryption key is related to the bid party and ensures the uniqueness of the encryption key; and generating a public and private key pair according to the encryption secret key, and reducing the generation difficulty of the public and private key pair while ensuring the uniqueness of the public and private key pair. The system comprises an encryption subsystem, a public key and a symmetric encryption algorithm, wherein the encryption subsystem is arranged for encrypting the bidding information according to the encryption key to generate a primary ciphertext, encrypting the primary ciphertext according to the public key to generate a secondary ciphertext, encrypting the bidding information for multiple times to ensure the safety of the bidding information, encrypting the bidding information by adopting the symmetric encryption algorithm to generate the primary ciphertext, realizing rapid encryption, encrypting the primary ciphertext by adopting the asymmetric encryption algorithm to generate the secondary ciphertext, and enhancing the security of encryption.
And the decryption subsystem is arranged for decrypting the secondary ciphertext by using the private key to obtain a primary ciphertext and decrypting the primary ciphertext according to the encryption key uploaded by the user side to obtain the bidding information. The private key is stored by the electronic bidding and bidding platform, and carry out automatic deciphering by the electronic bidding and bidding platform when opening the bid, the encryption key is preserved by the bidding party, upload through the user end by the bidding party when opening the bid, the electronic bidding and bidding platform decrypts the ciphertext according to the encryption key that the bidding party uploaded, private key and encryption key are preserved by the electronic bidding and bidding platform and the bidding party separately promptly, guarantee the security of bid information, reduce the risk of revealing bid information before opening the bid.
Further, the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining a first encryption character from the bidding information according to a preset extraction rule, and the secret key generation module is used for generating an encryption secret key according to the first encryption character. Has the advantages that: the device comprises a character extraction module, a key generation module and a display module, wherein the character extraction module is used for obtaining a first encryption character from the bid information, the key generation module is used for generating an encryption key according to the first encryption character, and the first encryption character is associated with the bid information, so that the uniqueness of the encryption key is ensured.
Further, the character extraction module is further configured to randomly arrange the acquired first encrypted characters, and the key generation module is configured to generate an encryption key according to the arranged first encrypted characters. Has the advantages that: the first encrypted characters are also randomly arranged through the character extraction module, uniqueness of the encrypted secret key is effectively guaranteed through a random arrangement mode, the phenomenon that the encrypted secret keys are the same due to similarity of bidding information is reduced, and safety of the bidding information is improved.
Further, the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining second encryption characters from the encryption secret key according to preset extraction rules, and the secret key generation module is used for generating a public and private key pair according to the second encryption characters. Has the advantages that: the device comprises a character extraction module, a key generation module and a bidding information generation module, wherein the character extraction module is used for acquiring a second encryption character from an encryption key, the key generation module is used for generating a public and private key pair according to the second encryption character, the second encryption character is associated with the encryption key, and the encryption key is associated with the bidding information.
Further, the character extraction module is also used for randomly arranging the obtained second encrypted characters, and the secret key generation module is used for generating a public and private key pair according to the arranged second encrypted characters. Has the beneficial effects that: the setting of character extraction module still arranges second encryption character random, through the mode of random arrangement, effectively guarantees the uniqueness of second encryption character, reduces to cause public and private key to the same phenomenon to produce because of encrypting secret key is similar, improves the security of bid information.
Furthermore, the encryption subsystem also comprises an encryption key storage module, and the encryption key storage module is used for sending the encryption key to the user side and storing the public and private key pair in and out. Has the advantages that: the user is used for the bidder who encrypts the bid information that the key corresponds, and encryption key sends for the user, keeps by the bidder, and public private key is to being stored by key storage module, keeps encrypting key and public private key separately, can acquire the bid information only in the condition that encryption key and public private key all exist to guarantee the security of bid information, reduce the risk of leaking bid information before opening a bid.
Further, the extraction rule is to extract numbers or letters in the bidding information or the encryption key. Has the beneficial effects that: the extraction of the numbers or the letters is convenient for identification and extraction, and is convenient for generating an encryption key or a public and private key pair, so that the encryption speed is improved.
Furthermore, the encryption subsystem is also used for extracting verification information from the bidding information, backing up the encryption key and encrypting and generating the primary ciphertext and the verification information according to the public key when generating the secondary ciphertext; the decryption subsystem is further used for decrypting the secondary ciphertext according to the private key to obtain the primary ciphertext and the verification information when receiving the verification request uploaded by the user side, obtaining the request information uploaded by the user side according to the verification information, verifying according to the verification information and the request information, and obtaining the backup encryption key to decrypt the primary ciphertext to obtain the bidding information when the verification is successful. Has the advantages that: during encryption, the primary ciphertext and the verification information are encrypted together, so that the safety of the verification information is enhanced. When opening the bid and decrypting, when the encryption key is lost or forgotten by the bidder, the bidder uploads request information through the user side, the private key of the system is used for decrypting to obtain verification information, the verification is carried out according to the verification information, so that the identity of the bidder is judged, when the verification is successful, the identity of the bidder is correct, and the system obtains the backup encryption key to decrypt a ciphertext, so that the bidding information is obtained. And at the moment, the backup encryption key is obtained and is not fed back to the bidding party, so that the safety of the encryption key is ensured.
Further, the encryption subsystem comprises an information extraction module, the bidding information is the tender, and the information extraction module is used for extracting the first N pages of the tender as the verification information. Has the advantages that: the information extraction module is used for extracting verification information, the first pages of the tender book are generally covers and catalogues, and the value of N is determined according to requirements, so that information which does not relate to bidding data and the like and influences bidding results in the tender book is obtained for verification.
Further, the decryption subsystem comprises an information verification module, the information verification module is used for matching verification information according to the request information, and when the matching degree is larger than a preset matching threshold value, a verification passing signal is generated. Has the beneficial effects that: and the information verification module is arranged to realize the verification of the request information, so that the identity of the bidder is verified.
Drawings
FIG. 1 is a logic block diagram of a first embodiment of an encryption/decryption system for remote bidding according to the present invention;
fig. 2 is a logic block diagram of a second embodiment of an encryption/decryption system for remote bidding according to the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
The method and the device are applied to the electronic bid tendering and bidding platform, and can be used for encrypting the bid information during bidding and decrypting the bid information during opening the bid.
The encryption and decryption system for remote bid tendering comprises an encryption subsystem, a decryption subsystem, a database and a user side, as shown in fig. 1. In this embodiment, the user terminal is an intelligent device used by the bidder. The database is pre-stored with extraction rules, wherein the extraction rules are to extract numbers or letters from information to be extracted, the information to be extracted includes bid information and an encryption key, in the present embodiment, the extraction rules are to extract numbers from the information to be extracted, and in other embodiments, the extraction rules are to extract letters from the information to be extracted.
The user side is used for acquiring the bid information, and the bid information is a file uploaded by a bidder, such as a bid file, a prequalification application file, and the like.
The encryption subsystem comprises a character extraction module, a secret key generation module, a secret key storage module and an encryption module.
The character extraction module is used for acquiring an extraction rule from the database when the bid information is received, acquiring a first encrypted character from the bid information according to the extraction rule, and randomly arranging the acquired first encrypted character, wherein in other embodiments, the acquired first encrypted character is arranged according to an acquisition sequence. The key generation module is used for generating an encryption key according to the arranged first encrypted character and sending the encryption key to the character extraction module, the encryption module and the key storage module.
The character extraction module is further used for obtaining second encryption characters from the encryption key according to the extraction rule when the encryption key is received, and randomly arranging the obtained second encryption characters. The secret key generating module is used for generating a public and private key pair according to the arranged second encrypted characters, sending a public key in the public and private key pair to the encrypting module, and sending a private key to the secret key storage module.
The key storage module is used for sending the received encryption key to the user side and storing the received private key. The user side is used for displaying the encryption key for the bidder to view and store.
The encryption module comprises a primary encryption submodule and a secondary encryption submodule, wherein the primary encryption submodule is used for receiving the encryption key and encrypting the bidding information corresponding to the encryption key according to the encryption key to generate a primary ciphertext; the secondary encryption submodule is used for receiving the public key, encrypting the primary ciphertext corresponding to the public key according to the public key to generate a secondary ciphertext and storing the secondary ciphertext.
When the bidding time is up, the electronic bidding platform generates a corresponding bidding signal and sends the corresponding bidding signal to the user side of each bidding party, and at this time, the user side is used for obtaining the encryption key uploaded by the bidding party, and the encryption key at this time may be correct or wrong.
The decryption subsystem comprises a key acquisition module and a decryption module.
The key obtaining module is used for receiving the encryption key and obtaining a private key corresponding to the encryption key from the key storage module when the mark opening signal is received.
The decryption module comprises a primary decryption submodule and a secondary decryption submodule. The primary decryption submodule is used for acquiring a secondary ciphertext corresponding to the private key from the database and decrypting the secondary ciphertext according to the private key to acquire a primary ciphertext. The secondary decryption submodule is used for decrypting the primary ciphertext according to the encryption secret key, and when the encryption secret key is correct, the secondary decryption submodule decrypts to obtain the bid information to realize decryption of the bid information; and when the encryption key is wrong, the secondary decryption submodule generates a decryption failure signal and feeds the decryption failure signal back to the user side. In this embodiment, the association between the bid information, the encryption key, the public and private key pair, the primary ciphertext, the secondary ciphertext, and the bidder may be implemented by setting a flag or a flag.
Example two
Because the encryption key is not stored in the system, when the bidder loses or forgets the encryption key, the bidder cannot decrypt the bidding information, and the bidding fails.
The difference between the present embodiment and the first embodiment is:
as shown in fig. 2, the encryption subsystem further includes an information extraction module and a key backup module, and the information extraction module is configured to extract the verification information from the bid information and send the verification information to the encryption module. The bid information is a bid document, the bid document includes a bid book, the first pages of the bid book are a cover and a directory, in this embodiment, the information extraction module extracts the first N pages of the bid book as verification information, and the value of N can be set according to the actual situation of the bid book, for example, the value of N is 2. In other embodiments, the information extraction module extracts a cover and a catalog of the tender as the verification information.
And the secondary encryption sub-module is used for encrypting the primary ciphertext and the verification information corresponding to the public key according to the public key to generate a secondary ciphertext and storing the secondary ciphertext when encrypting. That is, in the case of the secondary encryption, not only the primary ciphertext is encrypted, but also the primary ciphertext and the authentication information are jointly encrypted to form a file.
The key generation module is further configured to send the generated encryption key to the key backup module, and the key backup module is configured to backup the encryption key when receiving the encryption key.
When the bidding is started, if the bidding party is lost or forgets to encrypt the secret key, or the secondary decryption submodule generates a decryption failure signal and feeds the decryption failure signal back to the user side, at the moment, the user side is also used for obtaining a verification request of the bidding party and sending the verification request to the decryption subsystem.
The decryption subsystem further comprises an information verification module.
The secret key obtaining module is also used for obtaining a secret key corresponding to the bidder from the secret key storage module when the verification request is received and the bid opening signal is received.
The primary decryption submodule is used for acquiring a secondary ciphertext corresponding to the private key from the database, decrypting the secondary ciphertext according to the private key to acquire a primary ciphertext and verification information, and sending the verification information to the information verification module.
And the information verification module is used for acquiring verification problems according to the verification information and feeding back the verification problems to the user side when receiving the verification information. In this embodiment, the verification problem is preset in the information verification module in advance, and the verification problem is: please provide the continuous words in the bid-on book, which requires the number of words to exceed 20. In other embodiments, the information verification module is preset with a question template, and the information verification module is configured to generate a verification question according to the question template and the verification information, where the verification question includes: please provide the continuous characters in the mth line in the nth page of the tender, the value of N is the same as the value of N in the information extraction module, and the value of M is randomly selected according to the information in the nth page of the verification information.
And the user side is used for acquiring request information fed back by the bidder according to the verification problem and sending the request information to the information verification module. The information verification module is used for matching verification information according to the request information, generating a verification passing signal when the matching degree is larger than a preset matching threshold value, and sending the verification passing signal to the secret key backup module, otherwise, generating a verification failure signal, and sending the verification failure signal to the user side.
And the secret key backup module is used for screening out the encrypted secret key backed up by the bidder when receiving the verification passing signal and sending the encrypted secret key to the decryption module.
And the secondary decryption submodule is used for decrypting the primary ciphertext corresponding to the bidding party according to the encryption key when receiving the encryption key to obtain the bidding information. Since the encryption key is backed up by the system at this time, the decryption thereof must be successful.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (8)
1. Encryption and decryption encryption system that long-range open type bid is used, its characterized in that: the system comprises an encryption subsystem and a decryption subsystem, wherein the encryption subsystem is used for generating an encryption key according to the bid information uploaded by a user side and encrypting the bid information according to the encryption key to generate a ciphertext; generating a public and private key pair according to the encryption secret key, and encrypting the primary ciphertext according to the public key to generate a secondary ciphertext; the decryption subsystem is used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext, and decrypting the primary ciphertext according to an encryption key uploaded by the user side to obtain bidding information;
the encryption subsystem is also used for extracting verification information from the bidding information, backing up the encryption key and encrypting and generating the primary ciphertext and the verification information according to the public key when generating the secondary ciphertext; the decryption subsystem is further used for decrypting the secondary ciphertext according to the private key to obtain a primary ciphertext and verification information when receiving a verification request uploaded by the user side, obtaining request information uploaded by the user side according to the verification information, verifying according to the verification information and the request information, and obtaining a backup encryption key to decrypt the primary ciphertext to obtain bidding information when the verification is successful;
the encryption subsystem comprises an information extraction module, the bidding information is the tender, and the information extraction module is used for extracting the first N pages of the tender as verification information.
2. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining first encryption characters from the bidding information according to a preset extraction rule, and the secret key generation module is used for generating an encryption secret key according to the first encryption characters.
3. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 2, wherein: the character extraction module is further used for randomly arranging the obtained first encryption characters, and the secret key generation module is used for generating an encryption secret key according to the arranged first encryption characters.
4. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem comprises a character extraction module and a secret key generation module, the character extraction module is used for obtaining second encryption characters from the encryption secret key according to preset extraction rules, and the secret key generation module is used for generating a public and private key pair according to the second encryption characters.
5. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 4, wherein: the character extraction module is also used for randomly arranging the obtained second encrypted characters, and the secret key generation module is used for generating a public and private key pair according to the arranged second encrypted characters.
6. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the encryption subsystem also comprises an encryption key storage module, and the encryption key storage module is used for sending the encryption key to the user side and storing the public and private key pair in and out.
7. The encryption/decryption encryption system for remote bid-opening type bidding according to any one of claims 2 to 5, wherein: the extraction rule is to extract the numbers or letters in the bidding information or encryption key.
8. The encryption/decryption encryption system for remote bid-opening type bidding according to claim 1, wherein: the decryption subsystem comprises an information verification module, the information verification module is used for matching verification information according to the request information, and when the matching degree is larger than a preset matching threshold value, a verification passing signal is generated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010620244.5A CN111786997B (en) | 2020-06-30 | 2020-06-30 | Encryption and decryption encryption system for remote bid opening type bidding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010620244.5A CN111786997B (en) | 2020-06-30 | 2020-06-30 | Encryption and decryption encryption system for remote bid opening type bidding |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111786997A CN111786997A (en) | 2020-10-16 |
CN111786997B true CN111786997B (en) | 2023-01-06 |
Family
ID=72759950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010620244.5A Active CN111786997B (en) | 2020-06-30 | 2020-06-30 | Encryption and decryption encryption system for remote bid opening type bidding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111786997B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112580055A (en) * | 2020-12-02 | 2021-03-30 | 上海同在互联网科技有限公司 | Trusted electronic bid opening method, device and system |
CN112468514A (en) * | 2020-12-15 | 2021-03-09 | 天津普泽工程咨询有限责任公司 | System and method for realizing electronic bidding encryption in VPN (virtual private network) |
CN116232592B (en) * | 2023-05-08 | 2023-08-01 | 浙江校联信息技术有限公司 | Encryption and decryption method and system for online bidding |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109064297A (en) * | 2018-07-13 | 2018-12-21 | 宁夏神州好易信息发展股份有限公司 | A kind of quickly online electronics opening of bid method |
CN111192050A (en) * | 2019-12-31 | 2020-05-22 | 成都库珀区块链科技有限公司 | Digital asset private key storage and extraction method and device |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102684879A (en) * | 2012-05-02 | 2012-09-19 | 四川建设网有限责任公司 | Method and system for remote bid opening and bid evaluation |
CN102664740B (en) * | 2012-05-02 | 2014-12-17 | 四川建设网有限责任公司 | Remote-authorization-based bidding document encryption and decryption method |
US20140279146A1 (en) * | 2013-03-12 | 2014-09-18 | Elwha Llc | Presenting content as a result, at least in part, to relaying of a bid and following lapse of a specific amount of content access latency |
CN106682824A (en) * | 2016-12-21 | 2017-05-17 | 紫勋智能科技(北京)有限公司 | Electronic bid and tender management system and bid and tender management method |
CN108737326B (en) * | 2017-04-14 | 2021-03-30 | 北京京东尚科信息技术有限公司 | Method, system, device and electronic equipment for token verification |
CN108319860B (en) * | 2018-02-07 | 2021-05-11 | 南通市公共资源交易中心 | Remote bid evaluation management method, management system and management equipment |
CN110430052B (en) * | 2019-08-05 | 2023-01-31 | 中国工商银行股份有限公司 | POS key online filling method and device |
CN111277651B (en) * | 2020-01-20 | 2024-04-09 | 国网江苏招标有限公司 | Remote bidding method and system |
-
2020
- 2020-06-30 CN CN202010620244.5A patent/CN111786997B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109064297A (en) * | 2018-07-13 | 2018-12-21 | 宁夏神州好易信息发展股份有限公司 | A kind of quickly online electronics opening of bid method |
CN111192050A (en) * | 2019-12-31 | 2020-05-22 | 成都库珀区块链科技有限公司 | Digital asset private key storage and extraction method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111786997A (en) | 2020-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111786997B (en) | Encryption and decryption encryption system for remote bid opening type bidding | |
CN106548345B (en) | Method and system for realizing block chain private key protection based on key partitioning | |
US10659220B2 (en) | Method and system for encrypting and decrypting two-dimensional code mask | |
US6549626B1 (en) | Method and apparatus for encoding keys | |
CN101057448B (en) | Securely computing a similarity measure | |
US7606768B2 (en) | Voice signature with strong binding | |
US9246889B2 (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
US20080082817A1 (en) | User authentication method, user authenticating device and program product | |
KR20060127080A (en) | User authentication method based on the utilization of biometric identification techniques and related architecture | |
US20080098214A1 (en) | Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media | |
CN109118377B (en) | Processing method and system for claim settlement event based on block chain and electronic equipment | |
CN112016111A (en) | Credible bidding encryption and decryption method supporting centralized decryption | |
CN111144531B (en) | Two-dimensional code generation method and device, electronic equipment and computer readable storage medium | |
CN111917535A (en) | Data encryption storage method and device and server | |
CN114786160B (en) | NFC label key management system | |
CN113079002B (en) | Data encryption method, data decryption method, key management method, medium, and device | |
CN107332663A (en) | Archive management method based on encryption technology | |
CN109412799B (en) | System and method for generating local key | |
CN1558580B (en) | A network data safety protection method based on cryptography | |
US20200092096A1 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment | |
CN111541708B (en) | Identity authentication method based on power distribution | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN109302284B (en) | Hardware wallet | |
CN115114648A (en) | Data processing method and device and electronic equipment | |
CN113922973A (en) | Ciphertext-based login method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000 Patentee after: Guangyike Data Technology Co.,Ltd. Address before: No. 1, Floor 30, Unit 1, Building 5, Greenland Liansheng International, No. 8, Chengxin North Road, Guanshanhu District, Guiyang City, Guizhou Province, 550000 Patentee before: Guizhou Light Technology Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |