CN114386077A - Electronic bidding document multilayer encryption and decryption system for electronic bidding - Google Patents

Electronic bidding document multilayer encryption and decryption system for electronic bidding Download PDF

Info

Publication number
CN114386077A
CN114386077A CN202210066588.5A CN202210066588A CN114386077A CN 114386077 A CN114386077 A CN 114386077A CN 202210066588 A CN202210066588 A CN 202210066588A CN 114386077 A CN114386077 A CN 114386077A
Authority
CN
China
Prior art keywords
module
decryption
calling
file
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210066588.5A
Other languages
Chinese (zh)
Inventor
鲍文博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Yiyi Information Technology Co ltd
Original Assignee
Shandong Yiyi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yiyi Information Technology Co ltd filed Critical Shandong Yiyi Information Technology Co ltd
Priority to CN202210066588.5A priority Critical patent/CN114386077A/en
Publication of CN114386077A publication Critical patent/CN114386077A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention belongs to the field of electronic bidding, relates to a data encryption technology, and is used for solving the problems that an encryption and decryption system for an electronic bidding document does not have the function of carrying out integral defense encryption on all encrypted files, the storage modes of a calling code and a secret key are the same, and the difficulty is small when a hacker cracks the encryption and decryption system, in particular to an electronic bidding document multilayer encryption and decryption system, which comprises a server, wherein the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module; the parameters of the encrypted files are analyzed by the encryption module and the calling codes are generated, the encrypted files are stored in the storage module, the calling codes are required to be input through the calling module when the files are extracted, and the calling codes of all the encrypted files in the storage module can form an integral defense wall, so that all the encrypted files in the storage module can be completely protected by defense.

Description

Electronic bidding document multilayer encryption and decryption system for electronic bidding
Technical Field
The invention belongs to the field of electronic bidding, relates to a data encryption technology, and particularly relates to an electronic bidding document multilayer encryption and decryption system for electronic bidding.
Background
Data encryption is a long-history technology, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption is to recover the ciphertext into the plaintext through a decryption algorithm and a decryption key, and the core of the data encryption is cryptography.
When the existing encryption and decryption system aiming at the electronic bidding document is used for encrypting, the encryption effect is only realized on the file, the function of integrally defending and encrypting all encrypted files is not realized, the storage modes of the access code and the secret key are the same, and the difficulty of cracking by a hacker is very small.
Therefore, an electronic bidding document multi-layer encryption and decryption system for electronic bidding is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an electronic bidding multilayer encryption and decryption system for electronic bidding.
The technical problem to be solved by the invention is as follows: the existing encryption and decryption system for the electronic bidding document does not have the function of carrying out integral defense encryption on all encrypted files, and has the problems that the storage modes of the access code and the secret key are the same, and the difficulty is small when a hacker cracks the access code.
The purpose of the invention can be realized by the following technical scheme:
an electronic bidding document multilayer encryption and decryption system for electronic bidding comprises a server, wherein the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module;
the user uploads the electronic bidding document file to be encrypted to the encryption module through the uploading module, the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file and generates a calling code, and the calling code is generated in an A-B-C mode;
generating a plurality of redundant data, matching the generated redundant data with a calling code, randomly inserting the redundant data into a processing file for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to a server by an encryption module, and sending the received encrypted file to a storage module by the server for storage;
and the calling module calls the processing file through the calling code.
As a preferred embodiment of the present invention, the process of encrypting the electronic bidding document file includes: marking an electronic bidding document to be encrypted as a processing document, acquiring a pinyin full spelling of a first word of a name of the processing document and marking a first letter as a first letter A1, acquiring a pinyin full spelling of a last word of the name of the processing document and marking the last letter as a last letter A2, acquiring the total number of characters of the name of the processing document and marking as the number of characters B1, acquiring a memory value of the processing document with the unit of Mb, carrying out octal conversion on the memory value and rounding on the obtained value, marking the obtained value as a memory representation value C1, wherein A in a calling code is a combination of the first letter A1 and the last letter A2, B is the number of characters B1, and C is the memory representation value C1, namely: a ═ A1a2, B ═ B1, and C ═ C1.
As a preferred embodiment of the present invention, the process of retrieving the processing file includes: the method comprises the steps that a calling code is input into a calling module, the calling code and a calling instruction are sent to a decryption module, the decryption module receives the calling instruction and the calling code and then conducts first-level decryption, second-level decryption and third-level decryption, after the third-level decryption is successful, a corresponding processing file is marked as a calling file, the decryption module sends the calling code to a server to obtain redundant data matched with the calling code, the redundant data in the calling file are eliminated, and the calling module generates a calling success signal and sends the calling success signal to a display module to display.
As a preferred embodiment of the present invention, the primary decryption process includes: splitting A in the calling code into A1 and A2, and comparing A1 with the first letter of the first word of the file name in the storage module:
if A1 is the same as the first letter of the first word of the processed document, then A2 is compared to the last letter of the last word of the processed document name:
if A2 is the same as the last letter of the file name, then the first-level decryption is judged to be successful;
if A2 is not the same as the last letter of the name of the processed file, selecting the next processed file for primary decryption;
if the A1 is not the same as the first letter of the first word of the processing file, the next processing file is selected for primary decryption until all the processing files cannot be matched with the A1 and the A2, the primary decryption is judged to be failed, and the decryption module sends a primary failure signal to the calling module.
As a preferred embodiment of the present invention, after the first-level decryption is successful, the decryption module performs the second-level decryption: compare B1 to the total number of characters handling the filename:
if the total number of the characters of the B1 and the processed file name is different, selecting the next processed file for secondary decryption until all the processed files cannot be matched with the B1, judging that the secondary decryption fails, and sending a secondary failure signal to the calling module by the decryption module;
if B1 is the same as the total number of characters of the processed file name, the second-level decryption is determined to be successful.
As a preferred embodiment of the present invention, after the second-level decryption is successful, the decryption module performs the third-level decryption: and (3) converting the memory value of the processed file by an octal system, rounding, and comparing the obtained numerical value with C1:
if the obtained numerical value is different from C1, selecting the next processing file to carry out three-level decryption until the memory values of all the processing files are octal-based and the rounded numerical value cannot be matched with C1, judging that the three-level decryption fails, and sending a three-level failure signal to the calling module by the decryption module;
if the obtained value is the same as C1, the decryption is determined to be successful.
As a preferred embodiment of the present invention, the risk monitoring module is configured to monitor and analyze a risk of file retrieval: marking the number of times of inputting the calling code by a calling person as DC, marking the number of times of receiving a primary failure signal by a calling module as YS, marking the number of times of receiving a secondary failure signal by the calling module as ES, marking the number of times of receiving a tertiary failure signal by the calling module as SS, and obtaining a risk coefficient FX of calling a file by a formula FX ═ alpha 1 × DC + alpha 2 × YS + alpha 3 × ES + alpha 4 × SS, wherein alpha 1, alpha 2, alpha 3 and alpha 4 are proportionality coefficients, and alpha 1 is greater than alpha 2 is greater than alpha 3 is greater than alpha 4 is greater than 0; obtaining a risk threshold value FXmax through a storage module, and comparing the risk coefficient FX with the risk threshold value FXmax: if the risk coefficient FX is smaller than the risk threshold FXmax, file transferring safety is judged, and a transferring safety signal is sent to a server by a risk monitoring module; if the risk coefficient FX is larger than or equal to the risk threshold FXmax, the file transfer danger is judged, the risk monitoring module sends a transfer danger signal to the server, the server sends the transfer danger signal to the transfer module after receiving the transfer danger signal, and the transfer module terminates the transfer behavior of transfer personnel after receiving the transfer danger signal.
Compared with the prior art, the invention has the beneficial effects that:
1. the parameters of the encrypted files are analyzed through the encryption module and the calling codes are generated, the encrypted files are stored in the storage module, the calling codes are required to be input through the calling module when the files are extracted, and the calling codes of all the encrypted files in the storage module can form an integral defense wall, so that all the encrypted files in the storage module can be completely protected by defense, and the storage safety of the encrypted electronic bidding documents is ensured;
2. the data storage security is greatly improved by separately storing the encrypted file and the redundant data, when a hacker invades, after the encrypted file in the storage module is illegally called, the redundant data still needs to be obtained through the server, and the redundant data corresponds to the calling code, so that in the illegal calling process without looking at the calling code, the called encrypted file still has the redundant data, so that the stolen encrypted file still cannot be used and leaked, the difficulty of hacking is increased, and the data storage security is improved;
3. according to the invention, the risk monitoring module is used for carrying out risk monitoring on the decryption process and obtaining the risk coefficient, the numerical value of the risk coefficient can be increased after decryption fails, and the calling process is immediately terminated when the numerical value of the risk coefficient is higher than the risk threshold value, so that the possibility that data is illegally called is reduced.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is an overall system block diagram of the present invention;
FIG. 2 is a block diagram of a system according to a first embodiment of the present invention;
fig. 3 is a system block diagram in the second embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the electronic bidding document multi-layer encryption and decryption system for electronic bidding comprises a server, wherein the server is in communication connection with an encryption module, a decryption module, a storage module, a display module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module.
Example one
Referring to fig. 2, a user uploads an electronic bidding document file to be encrypted to an encryption module through an upload module, and the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file: marking an electronic bidding document to be encrypted as a processing document, acquiring a pinyin full spelling of a first word of a name of the processing document and marking a first letter as a first letter A1, acquiring a pinyin full spelling of a last word of the name of the processing document and marking the last letter as a last letter A2, acquiring the total number of characters of the name of the processing document and marking as the number of characters B1, acquiring a memory value of the processing document with the unit of Mb, carrying out octal conversion on the memory value and rounding on the obtained value, marking the obtained value as a memory representation value C1, and generating a retrieval code in an A-B-C mode, wherein A is a combination of the first letter A1 and the last letter A2, B is the number of characters B1, and C is the memory representation value C1, namely: a ═ A1a2, B ═ B1, C ═ C1;
the method comprises the steps of generating a plurality of redundant data, matching the generated redundant data with a calling code, randomly generating the redundant data, randomly inserting a plurality of redundant data into a processing file at random for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to a server by an encryption module, and sending the received encrypted file to a storage module for storage, wherein the redundant data are only used for data encryption and decryption and are not used for data calling, and the encrypted file cannot be leaked after a hacker illegally calls the encrypted file, so that the data storage safety is greatly improved.
The calling module is used for calling the processing file: the input is transferred and is got the code in transferring the module, transfers the code and transfers the instruction to send to decryption module with transferring, and decryption module carries out one-level deciphering after receiving the instruction of transferring and transferring the code: splitting A in the calling code into A1 and A2, and comparing A1 with the first letter of the first word of the file name in the storage module: if A1 is the same as the first letter of the first word of the processed document, then A2 is compared to the last letter of the last word of the processed document name: if A2 is the same as the last letter of the file name, then the first-level decryption is judged to be successful; if A2 is not the same as the last letter of the name of the processed file, selecting the next processed file for primary decryption; if the A1 is different from the first letter of the first word of the processing file, selecting the next processing file for primary decryption until all the processing files cannot be matched with A1 and A2, judging that the primary decryption fails, and sending a primary failure signal to the calling module by the decryption module; after the first-level decryption is successful, the decryption module carries out second-level decryption: compare B1 to the total number of characters handling the filename: if the total number of the characters of the B1 and the processed file name is different, selecting the next processed file for secondary decryption until all the processed files cannot be matched with the B1, judging that the secondary decryption fails, and sending a secondary failure signal to the calling module by the decryption module; if B1 is the same as the total number of characters of the processed file name, the second-level decryption is judged to be successful; after the second-level decryption succeeds, the decryption module performs third-level decryption: and (3) converting the memory value of the processed file by an octal system, rounding, and comparing the obtained numerical value with C1: if the obtained numerical value is different from C1, selecting the next processing file to carry out three-level decryption until the memory values of all the processing files are octal-based and the rounded numerical value cannot be matched with C1, judging that the three-level decryption fails, and sending a three-level failure signal to the calling module by the decryption module; if the obtained value is the same as C1, the third-level decryption is determined to be successful.
And the calling module generates a re-calling signal when receiving the primary failure signal, the secondary failure signal or the tertiary failure signal and sends the re-calling signal to the display module for display, and calling personnel re-input the calling code for decryption.
Example two
Referring to fig. 3, the risk monitoring module is configured to monitor and analyze a risk of file retrieval: marking the number of times of inputting the calling code by a calling person as DC, marking the number of times of receiving a primary failure signal by a calling module as YS, marking the number of times of receiving a secondary failure signal by the calling module as ES, marking the number of times of receiving a tertiary failure signal by the calling module as SS, and obtaining a risk coefficient FX of calling a file by a formula FX ═ alpha 1 × DC + alpha 2 × YS + alpha 3 × ES + alpha 4 × SS, wherein alpha 1, alpha 2, alpha 3 and alpha 4 are proportionality coefficients, and alpha 1 is greater than alpha 2 is greater than alpha 3 is greater than alpha 4 is greater than 0; obtaining a risk threshold value FXmax through a storage module, and comparing the risk coefficient FX with the risk threshold value FXmax: if the risk coefficient FX is smaller than the risk threshold FXmax, file transferring safety is judged, and a transferring safety signal is sent to a server by a risk monitoring module; if the risk coefficient FX is larger than or equal to the risk threshold FXmax, the file transfer danger is judged, the risk monitoring module sends a transfer danger signal to the server, the server sends the transfer danger signal to the transfer module after receiving the transfer danger signal, and the transfer module terminates the transfer behavior of transfer personnel after receiving the transfer danger signal.
When the electronic bidding multi-layer encryption and decryption system for electronic bidding is in work, a user uploads an electronic bidding document to be encrypted to an encryption module through an uploading module, the encryption module encrypts the electronic bidding document after receiving the electronic bidding document and generates a calling code, and the calling code is generated in an A-B-C mode; generating a plurality of redundant data, matching the generated redundant data with the calling code, randomly inserting the redundant data into the processing file for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to the server by the encryption module, and sending the received encrypted file to the storage module by the server for storage.
The formulas are all calculated by removing dimensions and taking numerical values, the formula is a formula which is obtained by acquiring a large amount of data and performing software simulation to obtain the latest real situation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation;
such as the formula: FX ═ α 1 × DC + α 2 × YS + α 3 × ES + α 4 × SS;
collecting multiple groups of sample data and setting corresponding risk coefficient for each group of sample data by technicians in the field; substituting the set risk coefficient and the acquired sample data into formulas, forming a quaternary linear equation set by any four formulas, screening the calculated coefficients and taking the mean value to obtain values of alpha 1, alpha 2, alpha 3 and alpha 4 which are respectively 3.54, 3.23, 2.87 and 1.58;
the size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding risk coefficient preliminarily set by a person skilled in the art for each group of sample data; as long as the proportional relationship between the parameters and the quantized values is not affected.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (7)

1. An electronic bidding document multilayer encryption and decryption system for electronic bidding and tendering comprises a server, and is characterized in that the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module;
the user uploads the electronic bidding document file to be encrypted to the encryption module through the uploading module, the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file and generates a calling code, and the calling code is generated in an A-B-C mode;
generating a plurality of redundant data, matching the generated redundant data with a calling code, randomly inserting the redundant data into a processing file for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to a server by an encryption module, and sending the received encrypted file to a storage module by the server for storage;
and the calling module calls the processing file through the calling code.
2. The electronic-bidding multilayer encryption and decryption system according to claim 1, wherein the process of encrypting the electronic-bidding document comprises: marking an electronic bidding document to be encrypted as a processing document, acquiring a pinyin full spelling of a first word of a name of the processing document and marking a first letter as a first letter A1, acquiring a pinyin full spelling of a last word of the name of the processing document and marking the last letter as a last letter A2, acquiring the total number of characters of the name of the processing document and marking as the number of characters B1, acquiring a memory value of the processing document with the unit of Mb, carrying out octal conversion on the memory value and rounding on the obtained value, marking the obtained value as a memory representation value C1, wherein A in a calling code is a combination of the first letter A1 and the last letter A2, B is the number of characters B1, and C is the memory representation value C1, namely: a ═ A1a2, B ═ B1, and C ═ C1.
3. The electronic bidding multilayer encryption and decryption system according to claim 1, wherein the process of retrieving the processed document comprises: the method comprises the steps that a calling code is input into a calling module, the calling code and a calling instruction are sent to a decryption module, the decryption module receives the calling instruction and the calling code and then conducts first-level decryption, second-level decryption and third-level decryption, after the third-level decryption is successful, a corresponding processing file is marked as a calling file, the decryption module sends the calling code to a server to obtain redundant data matched with the calling code, the redundant data in the calling file are eliminated, and the calling module generates a calling success signal and sends the calling success signal to a display module to display.
4. The multi-layer encryption and decryption system for the electronic bidding document for electronic bidding according to claim 1, wherein the primary decryption process comprises: splitting A in the calling code into A1 and A2, and comparing A1 with the first letter of the first word of the file name in the storage module:
if A1 is the same as the first letter of the first word of the processed document, then A2 is compared to the last letter of the last word of the processed document name:
if A2 is the same as the last letter of the file name, then the first-level decryption is judged to be successful;
if A2 is not the same as the last letter of the name of the processed file, selecting the next processed file for primary decryption;
if the A1 is not the same as the first letter of the first word of the processing file, the next processing file is selected for primary decryption until all the processing files cannot be matched with the A1 and the A2, the primary decryption is judged to be failed, and the decryption module sends a primary failure signal to the calling module.
5. The multi-layer encryption and decryption system for the electronic bidding document for electronic bidding according to claim 1, wherein after the first-level decryption is successful, the decryption module performs a second-level decryption: compare B1 to the total number of characters handling the filename:
if the total number of the characters of the B1 and the processed file name is different, selecting the next processed file for secondary decryption until all the processed files cannot be matched with the B1, judging that the secondary decryption fails, and sending a secondary failure signal to the calling module by the decryption module;
if B1 is the same as the total number of characters of the processed file name, the second-level decryption is determined to be successful.
6. The multi-layer encryption and decryption system for the electronic bidding document for electronic bidding according to claim 1, wherein after the second-level decryption is successful, the decryption module performs three-level decryption: and (3) converting the memory value of the processed file by an octal system, rounding, and comparing the obtained numerical value with C1:
if the obtained numerical value is different from C1, selecting the next processing file to carry out three-level decryption until the memory values of all the processing files are octal-based and the rounded numerical value cannot be matched with C1, judging that the three-level decryption fails, and sending a three-level failure signal to the calling module by the decryption module;
if the obtained value is the same as C1, the decryption is determined to be successful.
7. The electronic bidding multilayer encryption and decryption system according to claim 1, wherein the risk monitoring module is configured to monitor and analyze the risk of document retrieval: marking the number of times of inputting the calling code by a calling person as DC, marking the number of times of receiving a primary failure signal by a calling module as YS, marking the number of times of receiving a secondary failure signal by the calling module as ES, marking the number of times of receiving a tertiary failure signal by the calling module as SS, and obtaining a risk coefficient FX of calling a file by a formula FX ═ alpha 1 × DC + alpha 2 × YS + alpha 3 × ES + alpha 4 × SS, wherein alpha 1, alpha 2, alpha 3 and alpha 4 are proportionality coefficients, and alpha 1 is greater than alpha 2 is greater than alpha 3 is greater than alpha 4 is greater than 0; obtaining a risk threshold value FXmax through a storage module, and comparing the risk coefficient FX with the risk threshold value FXmax: if the risk coefficient FX is smaller than the risk threshold FXmax, file transferring safety is judged, and a transferring safety signal is sent to a server by a risk monitoring module; if the risk coefficient FX is larger than or equal to the risk threshold FXmax, the file transfer danger is judged, the risk monitoring module sends a transfer danger signal to the server, the server sends the transfer danger signal to the transfer module after receiving the transfer danger signal, and the transfer module terminates the transfer behavior of transfer personnel after receiving the transfer danger signal.
CN202210066588.5A 2022-01-20 2022-01-20 Electronic bidding document multilayer encryption and decryption system for electronic bidding Pending CN114386077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210066588.5A CN114386077A (en) 2022-01-20 2022-01-20 Electronic bidding document multilayer encryption and decryption system for electronic bidding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210066588.5A CN114386077A (en) 2022-01-20 2022-01-20 Electronic bidding document multilayer encryption and decryption system for electronic bidding

Publications (1)

Publication Number Publication Date
CN114386077A true CN114386077A (en) 2022-04-22

Family

ID=81203425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210066588.5A Pending CN114386077A (en) 2022-01-20 2022-01-20 Electronic bidding document multilayer encryption and decryption system for electronic bidding

Country Status (1)

Country Link
CN (1) CN114386077A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116308702A (en) * 2023-05-17 2023-06-23 四川建设网有限责任公司 Method and system for efficiently decrypting bidding document by server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116308702A (en) * 2023-05-17 2023-06-23 四川建设网有限责任公司 Method and system for efficiently decrypting bidding document by server
CN116308702B (en) * 2023-05-17 2023-07-25 四川建设网有限责任公司 Method and system for efficiently decrypting bidding document by server

Similar Documents

Publication Publication Date Title
US10951392B2 (en) Fast format-preserving encryption for variable length data
CN104704501B (en) Securely generate and store in computer systems password
CN110034926B (en) Internet of things dynamic password generation and verification method and system and computer equipment
CN114444105B (en) Intelligent audit data reporting safety method
CN104899499A (en) Internet image search based Web verification code generation method
CN111177763A (en) Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption
CN103997504B (en) Authentication system and auth method
CN114386077A (en) Electronic bidding document multilayer encryption and decryption system for electronic bidding
CN111800387A (en) Intelligent encryption transmission system for computer information data
CN112988331B (en) Safety data exchange method between cloud platform virtual machines
US11695740B2 (en) Anonymization method and apparatus, device, and storage medium
CN113489710A (en) File sharing method, device, equipment and storage medium
CN117499553A (en) Data transmission management system for inspection work
CN105827404A (en) Identity authentication method, identity authentication device, and server
CN116614251A (en) Data security monitoring system
CN105933303A (en) File tempering detection method and device
CN114065169B (en) Privacy protection biometric authentication method and device and electronic equipment
CN115859370A (en) Transaction data processing method and device, computer equipment and storage medium
CN114297672A (en) Anti-counterfeit verification method and system for anti-counterfeit label and storage medium
CN115935299A (en) Authorization control method, device, computer equipment and storage medium
CN114629701A (en) Information display system based on information encryption
RU2259639C2 (en) Method for complex protection of distributed information processing in computer systems and system for realization of said method
CN114218176A (en) Cross-platform data secure sharing and exchanging method
CN116305071B (en) Account password security system based on artificial intelligence
KR102276559B1 (en) Method for checking encrypted data and method for data encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination