CN112307493A - Project settlement data submission method, system, terminal equipment and storage medium - Google Patents
Project settlement data submission method, system, terminal equipment and storage medium Download PDFInfo
- Publication number
- CN112307493A CN112307493A CN202011105162.3A CN202011105162A CN112307493A CN 112307493 A CN112307493 A CN 112307493A CN 202011105162 A CN202011105162 A CN 202011105162A CN 112307493 A CN112307493 A CN 112307493A
- Authority
- CN
- China
- Prior art keywords
- unpacking
- public
- packet
- private
- encrypted data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000013475 authorization Methods 0.000 claims description 20
- 238000012550 audit Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 6
- 230000008520 organization Effects 0.000 claims description 5
- 238000007726 management method Methods 0.000 claims description 3
- 238000010276 construction Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- General Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The application relates to a project settlement data submission method, which comprises the following steps: acquiring a settlement data packet; splitting a settlement data packet to generate a public unpacking packet and a private unpacking packet; acquiring encrypted data of the public transport packet and an encrypted number of the public transport packet, wherein the encrypted data of the public transport packet is encrypted by an encryptor to generate encrypted data of the public transport packet, and a secret key of the public transport packet and the encrypted number of the public transport packet are generated; encrypting the private unpacking by using the encryption number of the public unpacking to generate encrypted data of the private unpacking; the public unpacking encrypted data, the private unpacking encrypted data and the public unpacking key are sent to an auditing mechanism, the auditing mechanism decrypts the private unpacking encrypted data by using the public unpacking key to obtain a private unpacking, the auditing mechanism decrypts the public unpacking encrypted data to obtain a public unpacking, and the auditing mechanism merges the public unpacking and the private unpacking to obtain a settlement data packet. The method and the device can improve the safety of the submission of the project settlement data.
Description
Technical Field
The present application relates to the technical field of project management, and in particular, to a project settlement data submission method, system, terminal device, and storage medium.
Background
The project settlement refers to the process of the construction enterprises for clearing the economic documents of the project price to the construction units or owners according to the contract contracts and the finished project amount. The construction period of the project is long, the number of the consumed funds is large, intermediate settlement and annual settlement are needed to be carried out on the project price in order to compensate the funds consumed by the construction and installation enterprises in time during construction, and completion settlement is needed after all project completion acceptance. Project settlement is a very important work in the project contract, and project settlement data is finally sent to an auditing organization for auditing.
At present, with data informatization, the project settlement data is transmitted to an auditing mechanism by one or more auditors instead of using data transmission on the internet, so that the audit mechanism is convenient to modify and reexamine the settlement data while improving the audit speed.
In view of the above related technologies, the inventor believes that the project settlement data is sent to the audit by network transmission, which improves efficiency, but the network data transmission has a risk of information leakage, and if the settlement data is stolen or modified, certain economic loss is caused.
Disclosure of Invention
In order to improve the safety of project settlement data submission, the application provides a project settlement data submission method.
The project settlement data submission method provided by the application adopts the following technical scheme: acquiring a settlement data packet; splitting the settlement data packet to generate a public unpacking packet and a private unpacking packet; acquiring encrypted data of the public transport packet and an encrypted number of the public transport packet, wherein an encryptor encrypts the public transport packet to generate encrypted data of the public transport packet, and generates a secret key of the public transport packet and the encrypted number of the public transport packet; encrypting the private unpacking by using the encryption number of the public unpacking to generate encrypted data of the private unpacking; sending the encrypted data of the public unpacking, the encrypted data of the private unpacking and the key of the public unpacking to an auditing mechanism, wherein the auditing mechanism utilizes the key of the public unpacking to decrypt the encrypted data of the private unpacking to obtain the private unpacking, the auditing mechanism decrypts the encrypted data of the public unpacking to obtain the public unpacking, and the auditing mechanism combines the public unpacking and the private unpacking to obtain the settlement data packet.
By adopting the technical scheme, the auditing mechanism decrypts the encrypted data of the private unpacking by using the key of the public unpacking, and the private unpacking is encrypted by the encrypted number of the public unpacking, so that only the key of the public unpacking can decrypt the private unpacking, the condition that the item settlement data is maliciously tampered can be reduced, and the auditing safety of the item settlement data is improved.
Preferably, before decrypting the private unpacked encrypted data, the auditing mechanism includes: sending an authorization application of the audit to the encryptor so that the encryptor can authorize the audit; the public unpacking encrypted data contains the authorization number of the encryptor, and the auditing agency applies for authorization by using the authorization number of the encryptor.
By adopting the technical scheme, the authorization is applied by utilizing the authorization number of the encryptor, and the private unpacking decryption can be carried out only after the encryptor authorizes, so that the safety of the submission of the project settlement data is further improved.
Preferably, the data packet splitting is performed on the settlement data packet, and includes: splitting the engineering blueprint in the settlement data packet, and splitting the engineering blueprint into a public unpacking packet and a private unpacking packet respectively; and the audit mechanism combines the public unpacking and the private unpacking, and comprises the following steps: and combining the part of the engineering blueprint in the public unpacking packet and the part of the blueprint in the private unpacking packet obtained by decryption to obtain the engineering blueprint of the auditing agency, and matching the engineering blueprint with the engineering blueprint of the encryptor.
By adopting the technical scheme, the engineering blueprint obtained by decryption is matched with the original engineering blueprint of the encryptor, and the engineering blueprint has higher structural complexity and lower possibility of being tampered, so that the engineering blueprint can be used for verification and the safety is improved.
Preferably, the method further comprises the following steps: and acquiring a matching result, and sending the matching result to the encryptor when the matching result is not in accordance, so that the engineering blueprint is sent again by encryption.
By adopting the technical scheme, when the matching result is not in accordance, the matching result is sent to the encryptor, so that the encryptor can conveniently and quickly send the original engineering blueprint, and the verification efficiency is favorably improved.
Preferably, the encryption process of the public packet is configured as a local encryption process; decrypting the encrypted data of the public tear down packet is configured as a local decryption process.
By adopting the technical scheme, the local encryption processing and the local decryption processing are offline processing in a disconnected network, so that malicious attacks on the network can be reduced, and the security in the encryption and decryption processes is improved.
Preferably, the data packet splitting of the settlement data packet is configured to split the settlement data packet in an offline state.
By adopting the technical scheme, the settlement data packet is split in an off-line state, so that the leakage of the key and the encryption number in the generation process can be reduced, and the auditing safety of the project settlement data is further improved.
The present application further provides a project settlement data submission system, including:
a first acquisition unit configured to acquire a settlement data packet;
the splitting unit is configured to split the settlement data packet to generate a public packet and a private packet, and the splitting unit further comprises: the splitting subunit is configured to split the engineering blueprint in the settlement data packet, and split the engineering blueprint into a public packet and a private packet respectively;
a second obtaining unit configured to obtain the encrypted data of the public transport package and the encrypted number of the public transport package, the encrypted data of the public transport package being encrypted by an encryptor of the public transport package to generate the encrypted data of the public transport package, and to generate the key of the public transport package and the encrypted number of the public transport package;
the encryption unit is configured to encrypt the private unpacking packet by using the encryption number of the public unpacking packet to generate encrypted data of the private unpacking packet;
and the sending unit is used for sending the encrypted data of the public unpacking, the encrypted data of the private unpacking and the key of the public unpacking to an auditing mechanism.
Preferably, the method further comprises the following steps: and the third acquisition unit is used for acquiring a matching result and sending the matching result to the encryptor when the matching result is not in accordance, so that the encryptor sends the engineering blueprint again.
The application also provides a project settlement data submission terminal, which comprises a memory and a processor, wherein the memory is stored with a computer program which can be loaded by the processor and can execute any one of the methods.
The present application also provides a storage medium, a storage medium having stored thereon computer instructions, characterized in that a computer program is stored which can be loaded by a processor and which performs any of the methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
by splitting the generated key and the generated encrypted number, the auditing mechanism decrypts the encrypted data of the private unpacking by using the key of the public unpacking, and the private unpacking is encrypted by using the encrypted number of the public unpacking, so that the private unpacking can be decrypted only by using the key of the public unpacking, the condition that the item settlement data is maliciously tampered can be further reduced, and the auditing safety of the item settlement data is improved;
the engineering blueprint is split, the engineering blueprint obtained by decryption is matched with the original engineering blueprint of an encryptor, and the engineering blueprint is higher in structural complexity and lower in possibility of being tampered, so that verification can be further performed, and safety is improved.
Drawings
FIG. 1 is a flowchart of a project settlement data submission method in the application embodiment.
FIG. 2 is a schematic diagram of a project settlement data submission system in an embodiment of the application.
Detailed Description
The present application is described in further detail below with reference to figures 1-2.
The embodiment of the application discloses a project settlement data submission method. Referring to fig. 1, a project settlement data submission method includes:
s11, obtaining the settlement data packet.
The settlement data can comprise project bidding documents, construction contracts, project blueprints, design changes and other project data, the encryptor packs the settlement data and generates a settlement data packet, and the settlement data packet generated by the encryptor is sent to the submission system.
In a specific implementation, the encryptor can be a construction party or an internal auditing part of a construction unit.
S12, the data packet of the calculation data is split to generate a public packet and a private packet.
Because the settlement data packet is internally provided with the project blueprints, when the data packet is split, one or more project blueprints are split, and the same project blueprint is split into a public packet and a private packet. When the settlement data packet is split, the submission system can be offline disconnected, so that malicious attacks on a network end can be reduced, and the splitting safety can be improved.
After the data packet is split, the encryptor encrypts the public breaking packet to produce encrypted data of the public breaking packet, and the encrypted data together form a secret key with a digital signature and an encrypted number.
In specific implementation, the encryption processing of the public removal packet by an encryptor can be local encryption processing, which is beneficial to reducing the attack of a network end, and the encrypted data of the public removal packet and the encrypted number of the public removal packet are sent to the submission system after the local encryption processing.
And S13, acquiring the encrypted data of the public packets and the encrypted numbers of the public packets.
In a specific implementation, the encrypted data of the public packet contains an authorization number of the encryptor, and the authorization number can be a telephone number or a numerical code.
And S14, encrypting the private unpacking by using the encryption number of the public unpacking to generate the encrypted data of the private unpacking.
And S15, sending the public unpacked encrypted data and the private unpacked encrypted data to an auditing agency.
And S16, sending an authorization application of the auditing mechanism to the encryptor, authorizing by the encryptor, and decrypting by the auditing mechanism after the authorization is finished.
In particular implementations, the audit authority may first decrypt the public unpacked encrypted data, which in particular embodiments may be decrypted locally. And obtaining the authorization number after the decryption is finished, applying for authorization in an audit system by using the authorization number by an audit organization, and then authorizing by an encryptor. The authorization is applied by using the authorization number of the encryptor, and the next step can be carried out only after the encryptor authorizes, so that the safety of the project settlement data submission is further improved.
After the encryptor completes authorization, the auditing mechanism decrypts the encrypted data of the private unpacking by using the key of the public unpacking to obtain the decrypted private unpacking. In the specific description, the public unpacking key can be transmitted by the audit system, and the key on the hand of the encryptor can also be transmitted to the audit organization by other transmission methods.
And S17, merging the part of the engineering blueprints in the public unpacking and the private unpacking obtained by decryption to obtain the engineering blueprints of an auditing agency, and matching the engineering blueprints with the engineering blueprints of the encryptor. If the matching result matches, S18 is executed, and if the matching result does not match, S19 is executed.
And respectively decrypting the public unpacking and the private unpacking to respectively obtain two parts of engineering blueprints, merging the two parts of engineering blueprints, and matching the merged engineering blueprints with the original engineering blueprints of the encryptor to obtain matching results. The engineering blueprint has higher structural complexity and lower possibility of being tampered, so that the engineering blueprint can be used for verification and the safety is improved.
In the specific description, the engineering blueprint can be transmitted by the audit sending system, and the key on the hand of the encryptor can also be transmitted to the audit organization by other transmission modes.
And S18, sending the matching result to an auditing mechanism, so that the auditing mechanism combines the public unpacking and the private unpacking to obtain a settlement data packet.
If the matching result is in line, the original private unpacking and public unpacking are indicated, and then an auditing mechanism can merge the decrypted public unpacking and the decrypted private unpacking to finally obtain a merged settlement data packet.
And S19, sending the matching result to the encryptor, and enabling the encryptor to resend the engineering blueprint.
If the matching result is not in accordance, the submission system can send the matching result to the encryptor, so that the encryptor can resend the engineering blueprint, the encryptor can conveniently and quickly send the original engineering blueprint, and the verification efficiency can be improved.
By adopting the embodiment, the auditing mechanism decrypts the encrypted data of the private unpacking by using the key of the public unpacking, and the private unpacking is encrypted by the encryption number of the public unpacking, so that only the key of the public unpacking can decrypt the private unpacking, the condition that the item settlement data is maliciously tampered can be reduced, and the safety of the submission of the item settlement data is improved.
Fig. 2 shows a project settlement data submission system 200 according to an embodiment of the present application, which includes a first obtaining unit 21, a splitting unit 22, a second obtaining unit 23, an encrypting unit 24, a sending unit 25, and a third obtaining unit 26.
A first acquiring unit 21 configured to acquire the settlement data packet.
A splitting unit 22 configured to split the settlement data packet to generate a public packet and a private packet; the splitting unit further comprises: the splitting subunit 221 is configured to split the engineering blueprint in the settlement data packet, and split the engineering blueprint into the public breaking packet and the private breaking packet, respectively.
A second obtaining unit 23 configured to obtain the encrypted data of the public packet and the encrypted number of the public packet, the encrypted data of the public packet being encrypted by the encryptor public packet, generating the encrypted data of the public packet, and generating the key of the public packet and the encrypted number of the public packet.
And an encryption unit 24 configured to encrypt the private unpacking by using the encryption number of the public unpacking, and generate encrypted data of the private unpacking.
And the sending unit 25 is used for sending the public unpacked encrypted data, the private unpacked encrypted data and the public unpacked key to an auditing mechanism, the auditing mechanism decrypts the private unpacked encrypted data by using the public unpacked key to obtain a decrypted private unpacked, and the auditing mechanism decrypts the public unpacked encrypted data to obtain a decrypted private unpacked.
The third obtaining unit 26 obtains the matching result, and when the matching result is not in compliance, sends the matching result to the encryptor, so that the encryptor sends the engineering blueprint again.
The embodiment of the application also provides an engineering project bid inviting management terminal, which comprises a memory and a processor; the memory may be a RAM, ROM, EPROM, EEPROM, FLAH, magnetic or optical disk, or the like. The memory is stored with a computer program which can be loaded by the processor and can execute the project settlement data submission method. The processor includes a central processing unit such as a CPU or MPU, or a host system configured with the CPU or MPU as a core, and includes hardware or software.
The embodiment of the present application further provides a storage medium, where the computer-readable storage medium includes various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and a computer program capable of being loaded by a processor and executing the method for submitting settlement data of the item is stored in the storage medium.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.
Claims (10)
1. A method for submitting project settlement data, comprising:
acquiring a settlement data packet;
splitting the settlement data packet to generate a public unpacking packet and a private unpacking packet;
acquiring encrypted data of the public transport packet and an encrypted number of the public transport packet, wherein an encryptor encrypts the public transport packet to generate encrypted data of the public transport packet, and generates a secret key of the public transport packet and the encrypted number of the public transport packet;
encrypting the private unpacking by using the encryption number of the public unpacking to generate encrypted data of the private unpacking;
sending the encrypted data of the public unpacking, the encrypted data of the private unpacking and the key of the public unpacking to an auditing mechanism, wherein the auditing mechanism utilizes the key of the public unpacking to decrypt the encrypted data of the private unpacking to obtain the private unpacking, the auditing mechanism decrypts the encrypted data of the public unpacking to obtain the public unpacking, and the auditing mechanism combines the public unpacking and the private unpacking to obtain the settlement data packet.
2. The method as claimed in claim 1, wherein before the auditing mechanism decrypts the private unpacked encrypted data, it comprises: sending an authorization application of the audit to the encryptor so that the encryptor can authorize the audit; the public unpacking encrypted data contains the authorization number of the encryptor, and the auditing agency applies for authorization by using the authorization number of the encryptor.
3. The method as claimed in claim 1, wherein the step of splitting the settlement data packet comprises: splitting the engineering blueprint in the settlement data packet, and splitting the engineering blueprint into a public unpacking packet and a private unpacking packet respectively; and the number of the first and second groups,
the audit organization merges the public unpacking and the private unpacking, and the method comprises the following steps: and combining the part of the engineering blueprint in the public unpacking packet and the part of the blueprint in the private unpacking packet obtained by decryption to obtain the engineering blueprint of the auditing agency, and matching the engineering blueprint with the engineering blueprint of the encryptor.
4. The method of claim 3, further comprising: and acquiring a matching result, and sending the matching result to the encryptor when the matching result is not in accordance, so that the encryptor sends the engineering blueprint again.
5. The method of claim 1, wherein the public bag encryption process is configured as a local encryption process; decrypting the encrypted data of the public tear down packet is configured as a local decryption process.
6. The method as claimed in claim 1, wherein the splitting of the settlement data packets is configured to be performed in an offline state.
7. A project settlement data submission system, comprising:
a first acquisition unit configured to acquire a settlement data packet;
the splitting unit is configured to split the settlement data packet to generate a public packet and a private packet, and the splitting unit further comprises: the splitting subunit is configured to split the engineering blueprint in the settlement data packet, and split the engineering blueprint into a public packet and a private packet respectively;
a second obtaining unit configured to obtain the encrypted data of the public transport package and the encrypted number of the public transport package, the encrypted data of the public transport package being encrypted by an encryptor of the public transport package to generate the encrypted data of the public transport package, and to generate the key of the public transport package and the encrypted number of the public transport package;
the encryption unit is configured to encrypt the private unpacking packet by using the encryption number of the public unpacking packet to generate encrypted data of the private unpacking packet;
and the sending unit is used for sending the encrypted data of the public unpacking, the encrypted data of the private unpacking and the key of the public unpacking to an auditing mechanism.
8. An engineering tender management system of claim 7,
further comprising a third acquisition subunit: and acquiring a matching result, and sending the matching result to the encryptor when the matching result is wrong, so that the encryption resends the engineering blueprint.
9. A project settlement document submission terminal comprising a memory and a processor, the memory having stored thereon a computer program that is loadable by the processor and operable to perform the method of any of claims 1 to 6.
10. A storage medium having stored thereon computer instructions, characterized in that a computer program is stored which can be loaded by a processor and which performs the method according to any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011105162.3A CN112307493B (en) | 2020-10-15 | 2020-10-15 | Project settlement data review sending method, system, terminal equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011105162.3A CN112307493B (en) | 2020-10-15 | 2020-10-15 | Project settlement data review sending method, system, terminal equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112307493A true CN112307493A (en) | 2021-02-02 |
CN112307493B CN112307493B (en) | 2024-02-09 |
Family
ID=74327742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011105162.3A Active CN112307493B (en) | 2020-10-15 | 2020-10-15 | Project settlement data review sending method, system, terminal equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112307493B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215077A (en) * | 2011-06-13 | 2011-10-12 | 四川大学 | Automatic dependence surveillance-broadcast (ADS-B) accurate target location encryption method |
CN104917782A (en) * | 2014-03-10 | 2015-09-16 | 上海奇博自动化科技有限公司 | Decentralized charging settlement method in cloud computing environment |
CN105574445A (en) * | 2015-12-22 | 2016-05-11 | 广州广电运通金融电子股份有限公司 | Safety communication method and device for self-service terminal equipment hardware |
CN107197037A (en) * | 2017-02-24 | 2017-09-22 | 重庆第二师范学院 | A kind of data access method and system with audit function based on Cloud Server |
EP3291480A1 (en) * | 2016-09-05 | 2018-03-07 | multitiv GmbH | Secure data transmission |
CN108388664A (en) * | 2018-03-14 | 2018-08-10 | 深圳市网域科技股份有限公司 | Integration method, device, computer equipment and the storage medium of sentence segment |
CN109902494A (en) * | 2019-01-24 | 2019-06-18 | 北京融链科技有限公司 | Data encryption storage method, device and document storage system |
CN110224984A (en) * | 2019-05-07 | 2019-09-10 | 平安科技(深圳)有限公司 | A kind of multi-party authorization method and device based on block chain technology |
CN111181899A (en) * | 2018-11-13 | 2020-05-19 | 阿里巴巴集团控股有限公司 | Data processing method, device and system and electronic equipment |
CN111461644A (en) * | 2020-03-17 | 2020-07-28 | 国网辽宁省电力有限公司 | Audit information management and control platform |
CN111585998A (en) * | 2020-04-24 | 2020-08-25 | 广东电网有限责任公司 | Audit data secure transmission method and system |
-
2020
- 2020-10-15 CN CN202011105162.3A patent/CN112307493B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215077A (en) * | 2011-06-13 | 2011-10-12 | 四川大学 | Automatic dependence surveillance-broadcast (ADS-B) accurate target location encryption method |
CN104917782A (en) * | 2014-03-10 | 2015-09-16 | 上海奇博自动化科技有限公司 | Decentralized charging settlement method in cloud computing environment |
CN105574445A (en) * | 2015-12-22 | 2016-05-11 | 广州广电运通金融电子股份有限公司 | Safety communication method and device for self-service terminal equipment hardware |
EP3291480A1 (en) * | 2016-09-05 | 2018-03-07 | multitiv GmbH | Secure data transmission |
CN107197037A (en) * | 2017-02-24 | 2017-09-22 | 重庆第二师范学院 | A kind of data access method and system with audit function based on Cloud Server |
CN108388664A (en) * | 2018-03-14 | 2018-08-10 | 深圳市网域科技股份有限公司 | Integration method, device, computer equipment and the storage medium of sentence segment |
CN111181899A (en) * | 2018-11-13 | 2020-05-19 | 阿里巴巴集团控股有限公司 | Data processing method, device and system and electronic equipment |
CN109902494A (en) * | 2019-01-24 | 2019-06-18 | 北京融链科技有限公司 | Data encryption storage method, device and document storage system |
CN110224984A (en) * | 2019-05-07 | 2019-09-10 | 平安科技(深圳)有限公司 | A kind of multi-party authorization method and device based on block chain technology |
CN111461644A (en) * | 2020-03-17 | 2020-07-28 | 国网辽宁省电力有限公司 | Audit information management and control platform |
CN111585998A (en) * | 2020-04-24 | 2020-08-25 | 广东电网有限责任公司 | Audit data secure transmission method and system |
Also Published As
Publication number | Publication date |
---|---|
CN112307493B (en) | 2024-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
CN109697365B (en) | Information processing method, block chain node and electronic equipment | |
US8239679B2 (en) | Authentication method, client, server and system | |
US12008124B2 (en) | Secure deferred file decryption | |
CN102663640A (en) | Remote bidding method and system | |
CN110868291B (en) | Data encryption transmission method, device, system and storage medium | |
CN109711841B (en) | Data transaction method and system, platform and storage medium | |
CN112700245A (en) | Block chain-based digital mobile certificate application method and device | |
TW202002563A (en) | Tag data generation method, tag, and nfc tag-based data processing | |
CN112633884B (en) | Local private key recovery method and device for transaction main body identity certificate | |
CN109684129B (en) | Data backup recovery method, storage medium, encryption machine, client and server | |
CN103258152A (en) | System, devices and methods for collaborative execution of a software application comprising encrypted instruction | |
JP2001244925A (en) | System and method for managing enciphered data and storage medium | |
CN101158998A (en) | Management method and device of DRM licenses | |
CN114499875B (en) | Service data processing method, device, computer equipment and storage medium | |
CN114143306B (en) | Bid file transfer method and transfer device based on block chain | |
CN108959962B (en) | API (application programming interface) secure calling method of dynamic library | |
CN102693478A (en) | Trading method of bid security during bidding procedure and system thereof | |
CN108650214B (en) | Dynamic page encryption anti-unauthorized method and device | |
CN110611679A (en) | Data transmission method, device, equipment and system | |
CN116707778A (en) | Data hybrid encryption transmission method and device and electronic equipment | |
EP4283549A1 (en) | Payment service implementation method and device | |
CN112307493A (en) | Project settlement data submission method, system, terminal equipment and storage medium | |
TWI430643B (en) | Secure key recovery system and method | |
CN114553557A (en) | Key calling method, key calling device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |