CN114386077A - Electronic bidding document multilayer encryption and decryption system for electronic bidding - Google Patents
Electronic bidding document multilayer encryption and decryption system for electronic bidding Download PDFInfo
- Publication number
- CN114386077A CN114386077A CN202210066588.5A CN202210066588A CN114386077A CN 114386077 A CN114386077 A CN 114386077A CN 202210066588 A CN202210066588 A CN 202210066588A CN 114386077 A CN114386077 A CN 114386077A
- Authority
- CN
- China
- Prior art keywords
- module
- decryption
- calling
- file
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention belongs to the field of electronic bidding, relates to a data encryption technology, and is used for solving the problems that an encryption and decryption system for an electronic bidding document does not have the function of carrying out integral defense encryption on all encrypted files, the storage modes of a calling code and a secret key are the same, and the difficulty is small when a hacker cracks the encryption and decryption system, in particular to an electronic bidding document multilayer encryption and decryption system, which comprises a server, wherein the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module; the parameters of the encrypted files are analyzed by the encryption module and the calling codes are generated, the encrypted files are stored in the storage module, the calling codes are required to be input through the calling module when the files are extracted, and the calling codes of all the encrypted files in the storage module can form an integral defense wall, so that all the encrypted files in the storage module can be completely protected by defense.
Description
Technical Field
The invention belongs to the field of electronic bidding, relates to a data encryption technology, and particularly relates to an electronic bidding document multilayer encryption and decryption system for electronic bidding.
Background
Data encryption is a long-history technology, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption is to recover the ciphertext into the plaintext through a decryption algorithm and a decryption key, and the core of the data encryption is cryptography.
When the existing encryption and decryption system aiming at the electronic bidding document is used for encrypting, the encryption effect is only realized on the file, the function of integrally defending and encrypting all encrypted files is not realized, the storage modes of the access code and the secret key are the same, and the difficulty of cracking by a hacker is very small.
Therefore, an electronic bidding document multi-layer encryption and decryption system for electronic bidding is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an electronic bidding multilayer encryption and decryption system for electronic bidding.
The technical problem to be solved by the invention is as follows: the existing encryption and decryption system for the electronic bidding document does not have the function of carrying out integral defense encryption on all encrypted files, and has the problems that the storage modes of the access code and the secret key are the same, and the difficulty is small when a hacker cracks the access code.
The purpose of the invention can be realized by the following technical scheme:
an electronic bidding document multilayer encryption and decryption system for electronic bidding comprises a server, wherein the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module;
the user uploads the electronic bidding document file to be encrypted to the encryption module through the uploading module, the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file and generates a calling code, and the calling code is generated in an A-B-C mode;
generating a plurality of redundant data, matching the generated redundant data with a calling code, randomly inserting the redundant data into a processing file for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to a server by an encryption module, and sending the received encrypted file to a storage module by the server for storage;
and the calling module calls the processing file through the calling code.
As a preferred embodiment of the present invention, the process of encrypting the electronic bidding document file includes: marking an electronic bidding document to be encrypted as a processing document, acquiring a pinyin full spelling of a first word of a name of the processing document and marking a first letter as a first letter A1, acquiring a pinyin full spelling of a last word of the name of the processing document and marking the last letter as a last letter A2, acquiring the total number of characters of the name of the processing document and marking as the number of characters B1, acquiring a memory value of the processing document with the unit of Mb, carrying out octal conversion on the memory value and rounding on the obtained value, marking the obtained value as a memory representation value C1, wherein A in a calling code is a combination of the first letter A1 and the last letter A2, B is the number of characters B1, and C is the memory representation value C1, namely: a ═ A1a2, B ═ B1, and C ═ C1.
As a preferred embodiment of the present invention, the process of retrieving the processing file includes: the method comprises the steps that a calling code is input into a calling module, the calling code and a calling instruction are sent to a decryption module, the decryption module receives the calling instruction and the calling code and then conducts first-level decryption, second-level decryption and third-level decryption, after the third-level decryption is successful, a corresponding processing file is marked as a calling file, the decryption module sends the calling code to a server to obtain redundant data matched with the calling code, the redundant data in the calling file are eliminated, and the calling module generates a calling success signal and sends the calling success signal to a display module to display.
As a preferred embodiment of the present invention, the primary decryption process includes: splitting A in the calling code into A1 and A2, and comparing A1 with the first letter of the first word of the file name in the storage module:
if A1 is the same as the first letter of the first word of the processed document, then A2 is compared to the last letter of the last word of the processed document name:
if A2 is the same as the last letter of the file name, then the first-level decryption is judged to be successful;
if A2 is not the same as the last letter of the name of the processed file, selecting the next processed file for primary decryption;
if the A1 is not the same as the first letter of the first word of the processing file, the next processing file is selected for primary decryption until all the processing files cannot be matched with the A1 and the A2, the primary decryption is judged to be failed, and the decryption module sends a primary failure signal to the calling module.
As a preferred embodiment of the present invention, after the first-level decryption is successful, the decryption module performs the second-level decryption: compare B1 to the total number of characters handling the filename:
if the total number of the characters of the B1 and the processed file name is different, selecting the next processed file for secondary decryption until all the processed files cannot be matched with the B1, judging that the secondary decryption fails, and sending a secondary failure signal to the calling module by the decryption module;
if B1 is the same as the total number of characters of the processed file name, the second-level decryption is determined to be successful.
As a preferred embodiment of the present invention, after the second-level decryption is successful, the decryption module performs the third-level decryption: and (3) converting the memory value of the processed file by an octal system, rounding, and comparing the obtained numerical value with C1:
if the obtained numerical value is different from C1, selecting the next processing file to carry out three-level decryption until the memory values of all the processing files are octal-based and the rounded numerical value cannot be matched with C1, judging that the three-level decryption fails, and sending a three-level failure signal to the calling module by the decryption module;
if the obtained value is the same as C1, the decryption is determined to be successful.
As a preferred embodiment of the present invention, the risk monitoring module is configured to monitor and analyze a risk of file retrieval: marking the number of times of inputting the calling code by a calling person as DC, marking the number of times of receiving a primary failure signal by a calling module as YS, marking the number of times of receiving a secondary failure signal by the calling module as ES, marking the number of times of receiving a tertiary failure signal by the calling module as SS, and obtaining a risk coefficient FX of calling a file by a formula FX ═ alpha 1 × DC + alpha 2 × YS + alpha 3 × ES + alpha 4 × SS, wherein alpha 1, alpha 2, alpha 3 and alpha 4 are proportionality coefficients, and alpha 1 is greater than alpha 2 is greater than alpha 3 is greater than alpha 4 is greater than 0; obtaining a risk threshold value FXmax through a storage module, and comparing the risk coefficient FX with the risk threshold value FXmax: if the risk coefficient FX is smaller than the risk threshold FXmax, file transferring safety is judged, and a transferring safety signal is sent to a server by a risk monitoring module; if the risk coefficient FX is larger than or equal to the risk threshold FXmax, the file transfer danger is judged, the risk monitoring module sends a transfer danger signal to the server, the server sends the transfer danger signal to the transfer module after receiving the transfer danger signal, and the transfer module terminates the transfer behavior of transfer personnel after receiving the transfer danger signal.
Compared with the prior art, the invention has the beneficial effects that:
1. the parameters of the encrypted files are analyzed through the encryption module and the calling codes are generated, the encrypted files are stored in the storage module, the calling codes are required to be input through the calling module when the files are extracted, and the calling codes of all the encrypted files in the storage module can form an integral defense wall, so that all the encrypted files in the storage module can be completely protected by defense, and the storage safety of the encrypted electronic bidding documents is ensured;
2. the data storage security is greatly improved by separately storing the encrypted file and the redundant data, when a hacker invades, after the encrypted file in the storage module is illegally called, the redundant data still needs to be obtained through the server, and the redundant data corresponds to the calling code, so that in the illegal calling process without looking at the calling code, the called encrypted file still has the redundant data, so that the stolen encrypted file still cannot be used and leaked, the difficulty of hacking is increased, and the data storage security is improved;
3. according to the invention, the risk monitoring module is used for carrying out risk monitoring on the decryption process and obtaining the risk coefficient, the numerical value of the risk coefficient can be increased after decryption fails, and the calling process is immediately terminated when the numerical value of the risk coefficient is higher than the risk threshold value, so that the possibility that data is illegally called is reduced.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is an overall system block diagram of the present invention;
FIG. 2 is a block diagram of a system according to a first embodiment of the present invention;
fig. 3 is a system block diagram in the second embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the electronic bidding document multi-layer encryption and decryption system for electronic bidding comprises a server, wherein the server is in communication connection with an encryption module, a decryption module, a storage module, a display module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module.
Example one
Referring to fig. 2, a user uploads an electronic bidding document file to be encrypted to an encryption module through an upload module, and the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file: marking an electronic bidding document to be encrypted as a processing document, acquiring a pinyin full spelling of a first word of a name of the processing document and marking a first letter as a first letter A1, acquiring a pinyin full spelling of a last word of the name of the processing document and marking the last letter as a last letter A2, acquiring the total number of characters of the name of the processing document and marking as the number of characters B1, acquiring a memory value of the processing document with the unit of Mb, carrying out octal conversion on the memory value and rounding on the obtained value, marking the obtained value as a memory representation value C1, and generating a retrieval code in an A-B-C mode, wherein A is a combination of the first letter A1 and the last letter A2, B is the number of characters B1, and C is the memory representation value C1, namely: a ═ A1a2, B ═ B1, C ═ C1;
the method comprises the steps of generating a plurality of redundant data, matching the generated redundant data with a calling code, randomly generating the redundant data, randomly inserting a plurality of redundant data into a processing file at random for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to a server by an encryption module, and sending the received encrypted file to a storage module for storage, wherein the redundant data are only used for data encryption and decryption and are not used for data calling, and the encrypted file cannot be leaked after a hacker illegally calls the encrypted file, so that the data storage safety is greatly improved.
The calling module is used for calling the processing file: the input is transferred and is got the code in transferring the module, transfers the code and transfers the instruction to send to decryption module with transferring, and decryption module carries out one-level deciphering after receiving the instruction of transferring and transferring the code: splitting A in the calling code into A1 and A2, and comparing A1 with the first letter of the first word of the file name in the storage module: if A1 is the same as the first letter of the first word of the processed document, then A2 is compared to the last letter of the last word of the processed document name: if A2 is the same as the last letter of the file name, then the first-level decryption is judged to be successful; if A2 is not the same as the last letter of the name of the processed file, selecting the next processed file for primary decryption; if the A1 is different from the first letter of the first word of the processing file, selecting the next processing file for primary decryption until all the processing files cannot be matched with A1 and A2, judging that the primary decryption fails, and sending a primary failure signal to the calling module by the decryption module; after the first-level decryption is successful, the decryption module carries out second-level decryption: compare B1 to the total number of characters handling the filename: if the total number of the characters of the B1 and the processed file name is different, selecting the next processed file for secondary decryption until all the processed files cannot be matched with the B1, judging that the secondary decryption fails, and sending a secondary failure signal to the calling module by the decryption module; if B1 is the same as the total number of characters of the processed file name, the second-level decryption is judged to be successful; after the second-level decryption succeeds, the decryption module performs third-level decryption: and (3) converting the memory value of the processed file by an octal system, rounding, and comparing the obtained numerical value with C1: if the obtained numerical value is different from C1, selecting the next processing file to carry out three-level decryption until the memory values of all the processing files are octal-based and the rounded numerical value cannot be matched with C1, judging that the three-level decryption fails, and sending a three-level failure signal to the calling module by the decryption module; if the obtained value is the same as C1, the third-level decryption is determined to be successful.
And the calling module generates a re-calling signal when receiving the primary failure signal, the secondary failure signal or the tertiary failure signal and sends the re-calling signal to the display module for display, and calling personnel re-input the calling code for decryption.
Example two
Referring to fig. 3, the risk monitoring module is configured to monitor and analyze a risk of file retrieval: marking the number of times of inputting the calling code by a calling person as DC, marking the number of times of receiving a primary failure signal by a calling module as YS, marking the number of times of receiving a secondary failure signal by the calling module as ES, marking the number of times of receiving a tertiary failure signal by the calling module as SS, and obtaining a risk coefficient FX of calling a file by a formula FX ═ alpha 1 × DC + alpha 2 × YS + alpha 3 × ES + alpha 4 × SS, wherein alpha 1, alpha 2, alpha 3 and alpha 4 are proportionality coefficients, and alpha 1 is greater than alpha 2 is greater than alpha 3 is greater than alpha 4 is greater than 0; obtaining a risk threshold value FXmax through a storage module, and comparing the risk coefficient FX with the risk threshold value FXmax: if the risk coefficient FX is smaller than the risk threshold FXmax, file transferring safety is judged, and a transferring safety signal is sent to a server by a risk monitoring module; if the risk coefficient FX is larger than or equal to the risk threshold FXmax, the file transfer danger is judged, the risk monitoring module sends a transfer danger signal to the server, the server sends the transfer danger signal to the transfer module after receiving the transfer danger signal, and the transfer module terminates the transfer behavior of transfer personnel after receiving the transfer danger signal.
When the electronic bidding multi-layer encryption and decryption system for electronic bidding is in work, a user uploads an electronic bidding document to be encrypted to an encryption module through an uploading module, the encryption module encrypts the electronic bidding document after receiving the electronic bidding document and generates a calling code, and the calling code is generated in an A-B-C mode; generating a plurality of redundant data, matching the generated redundant data with the calling code, randomly inserting the redundant data into the processing file for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to the server by the encryption module, and sending the received encrypted file to the storage module by the server for storage.
The formulas are all calculated by removing dimensions and taking numerical values, the formula is a formula which is obtained by acquiring a large amount of data and performing software simulation to obtain the latest real situation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation;
such as the formula: FX ═ α 1 × DC + α 2 × YS + α 3 × ES + α 4 × SS;
collecting multiple groups of sample data and setting corresponding risk coefficient for each group of sample data by technicians in the field; substituting the set risk coefficient and the acquired sample data into formulas, forming a quaternary linear equation set by any four formulas, screening the calculated coefficients and taking the mean value to obtain values of alpha 1, alpha 2, alpha 3 and alpha 4 which are respectively 3.54, 3.23, 2.87 and 1.58;
the size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding risk coefficient preliminarily set by a person skilled in the art for each group of sample data; as long as the proportional relationship between the parameters and the quantized values is not affected.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.
Claims (7)
1. An electronic bidding document multilayer encryption and decryption system for electronic bidding and tendering comprises a server, and is characterized in that the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module;
the user uploads the electronic bidding document file to be encrypted to the encryption module through the uploading module, the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file and generates a calling code, and the calling code is generated in an A-B-C mode;
generating a plurality of redundant data, matching the generated redundant data with a calling code, randomly inserting the redundant data into a processing file for encryption, marking the processing file which is encrypted as an encrypted file, synchronously sending the calling code and the encrypted file to a server by an encryption module, and sending the received encrypted file to a storage module by the server for storage;
and the calling module calls the processing file through the calling code.
2. The electronic-bidding multilayer encryption and decryption system according to claim 1, wherein the process of encrypting the electronic-bidding document comprises: marking an electronic bidding document to be encrypted as a processing document, acquiring a pinyin full spelling of a first word of a name of the processing document and marking a first letter as a first letter A1, acquiring a pinyin full spelling of a last word of the name of the processing document and marking the last letter as a last letter A2, acquiring the total number of characters of the name of the processing document and marking as the number of characters B1, acquiring a memory value of the processing document with the unit of Mb, carrying out octal conversion on the memory value and rounding on the obtained value, marking the obtained value as a memory representation value C1, wherein A in a calling code is a combination of the first letter A1 and the last letter A2, B is the number of characters B1, and C is the memory representation value C1, namely: a ═ A1a2, B ═ B1, and C ═ C1.
3. The electronic bidding multilayer encryption and decryption system according to claim 1, wherein the process of retrieving the processed document comprises: the method comprises the steps that a calling code is input into a calling module, the calling code and a calling instruction are sent to a decryption module, the decryption module receives the calling instruction and the calling code and then conducts first-level decryption, second-level decryption and third-level decryption, after the third-level decryption is successful, a corresponding processing file is marked as a calling file, the decryption module sends the calling code to a server to obtain redundant data matched with the calling code, the redundant data in the calling file are eliminated, and the calling module generates a calling success signal and sends the calling success signal to a display module to display.
4. The multi-layer encryption and decryption system for the electronic bidding document for electronic bidding according to claim 1, wherein the primary decryption process comprises: splitting A in the calling code into A1 and A2, and comparing A1 with the first letter of the first word of the file name in the storage module:
if A1 is the same as the first letter of the first word of the processed document, then A2 is compared to the last letter of the last word of the processed document name:
if A2 is the same as the last letter of the file name, then the first-level decryption is judged to be successful;
if A2 is not the same as the last letter of the name of the processed file, selecting the next processed file for primary decryption;
if the A1 is not the same as the first letter of the first word of the processing file, the next processing file is selected for primary decryption until all the processing files cannot be matched with the A1 and the A2, the primary decryption is judged to be failed, and the decryption module sends a primary failure signal to the calling module.
5. The multi-layer encryption and decryption system for the electronic bidding document for electronic bidding according to claim 1, wherein after the first-level decryption is successful, the decryption module performs a second-level decryption: compare B1 to the total number of characters handling the filename:
if the total number of the characters of the B1 and the processed file name is different, selecting the next processed file for secondary decryption until all the processed files cannot be matched with the B1, judging that the secondary decryption fails, and sending a secondary failure signal to the calling module by the decryption module;
if B1 is the same as the total number of characters of the processed file name, the second-level decryption is determined to be successful.
6. The multi-layer encryption and decryption system for the electronic bidding document for electronic bidding according to claim 1, wherein after the second-level decryption is successful, the decryption module performs three-level decryption: and (3) converting the memory value of the processed file by an octal system, rounding, and comparing the obtained numerical value with C1:
if the obtained numerical value is different from C1, selecting the next processing file to carry out three-level decryption until the memory values of all the processing files are octal-based and the rounded numerical value cannot be matched with C1, judging that the three-level decryption fails, and sending a three-level failure signal to the calling module by the decryption module;
if the obtained value is the same as C1, the decryption is determined to be successful.
7. The electronic bidding multilayer encryption and decryption system according to claim 1, wherein the risk monitoring module is configured to monitor and analyze the risk of document retrieval: marking the number of times of inputting the calling code by a calling person as DC, marking the number of times of receiving a primary failure signal by a calling module as YS, marking the number of times of receiving a secondary failure signal by the calling module as ES, marking the number of times of receiving a tertiary failure signal by the calling module as SS, and obtaining a risk coefficient FX of calling a file by a formula FX ═ alpha 1 × DC + alpha 2 × YS + alpha 3 × ES + alpha 4 × SS, wherein alpha 1, alpha 2, alpha 3 and alpha 4 are proportionality coefficients, and alpha 1 is greater than alpha 2 is greater than alpha 3 is greater than alpha 4 is greater than 0; obtaining a risk threshold value FXmax through a storage module, and comparing the risk coefficient FX with the risk threshold value FXmax: if the risk coefficient FX is smaller than the risk threshold FXmax, file transferring safety is judged, and a transferring safety signal is sent to a server by a risk monitoring module; if the risk coefficient FX is larger than or equal to the risk threshold FXmax, the file transfer danger is judged, the risk monitoring module sends a transfer danger signal to the server, the server sends the transfer danger signal to the transfer module after receiving the transfer danger signal, and the transfer module terminates the transfer behavior of transfer personnel after receiving the transfer danger signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210066588.5A CN114386077A (en) | 2022-01-20 | 2022-01-20 | Electronic bidding document multilayer encryption and decryption system for electronic bidding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210066588.5A CN114386077A (en) | 2022-01-20 | 2022-01-20 | Electronic bidding document multilayer encryption and decryption system for electronic bidding |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114386077A true CN114386077A (en) | 2022-04-22 |
Family
ID=81203425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210066588.5A Pending CN114386077A (en) | 2022-01-20 | 2022-01-20 | Electronic bidding document multilayer encryption and decryption system for electronic bidding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114386077A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116308702A (en) * | 2023-05-17 | 2023-06-23 | 四川建设网有限责任公司 | Method and system for efficiently decrypting bidding document by server |
-
2022
- 2022-01-20 CN CN202210066588.5A patent/CN114386077A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116308702A (en) * | 2023-05-17 | 2023-06-23 | 四川建设网有限责任公司 | Method and system for efficiently decrypting bidding document by server |
CN116308702B (en) * | 2023-05-17 | 2023-07-25 | 四川建设网有限责任公司 | Method and system for efficiently decrypting bidding document by server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10951392B2 (en) | Fast format-preserving encryption for variable length data | |
CN104704501B (en) | Securely generate and store in computer systems password | |
CN110034926B (en) | Internet of things dynamic password generation and verification method and system and computer equipment | |
CN114444105B (en) | Intelligent audit data reporting safety method | |
CN104899499A (en) | Internet image search based Web verification code generation method | |
CN111177763A (en) | Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption | |
CN103997504B (en) | Authentication system and auth method | |
CN114386077A (en) | Electronic bidding document multilayer encryption and decryption system for electronic bidding | |
CN111800387A (en) | Intelligent encryption transmission system for computer information data | |
CN112988331B (en) | Safety data exchange method between cloud platform virtual machines | |
US11695740B2 (en) | Anonymization method and apparatus, device, and storage medium | |
CN113489710A (en) | File sharing method, device, equipment and storage medium | |
CN117499553A (en) | Data transmission management system for inspection work | |
CN105827404A (en) | Identity authentication method, identity authentication device, and server | |
CN116614251A (en) | Data security monitoring system | |
CN105933303A (en) | File tempering detection method and device | |
CN114065169B (en) | Privacy protection biometric authentication method and device and electronic equipment | |
CN115859370A (en) | Transaction data processing method and device, computer equipment and storage medium | |
CN114297672A (en) | Anti-counterfeit verification method and system for anti-counterfeit label and storage medium | |
CN115935299A (en) | Authorization control method, device, computer equipment and storage medium | |
CN114629701A (en) | Information display system based on information encryption | |
RU2259639C2 (en) | Method for complex protection of distributed information processing in computer systems and system for realization of said method | |
CN114218176A (en) | Cross-platform data secure sharing and exchanging method | |
CN116305071B (en) | Account password security system based on artificial intelligence | |
KR102276559B1 (en) | Method for checking encrypted data and method for data encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |