CN117272406A - Method, device, system and storage medium for verifying encrypted bidding document - Google Patents

Method, device, system and storage medium for verifying encrypted bidding document Download PDF

Info

Publication number
CN117272406A
CN117272406A CN202311573450.5A CN202311573450A CN117272406A CN 117272406 A CN117272406 A CN 117272406A CN 202311573450 A CN202311573450 A CN 202311573450A CN 117272406 A CN117272406 A CN 117272406A
Authority
CN
China
Prior art keywords
key
encrypted
lock
file
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311573450.5A
Other languages
Chinese (zh)
Other versions
CN117272406B (en
Inventor
陈洲
沈云
曹立斌
黄素龙
李强
朱斌
何永龙
张志恒
陆建
孙志浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guotai Epoint Software Co Ltd
Original Assignee
Guotai Epoint Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guotai Epoint Software Co Ltd filed Critical Guotai Epoint Software Co Ltd
Priority to CN202311573450.5A priority Critical patent/CN117272406B/en
Publication of CN117272406A publication Critical patent/CN117272406A/en
Application granted granted Critical
Publication of CN117272406B publication Critical patent/CN117272406B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device, a system and a storage medium for verifying an encrypted bidding document, and relates to the technical field of data encryption. The method comprises the following steps: acquiring an encrypted bidding document; when the encrypted bidding document is encrypted through the first CA lock, identification information is generated, wherein the identification information comprises an information value of a digital envelope and a hash value of a first key; the method comprises the steps of obtaining identification information generated when an encrypted bidding file is encrypted, checking the encrypted bidding file, decrypting an information value of a digital envelope through a second CA lock to obtain a second key, carrying out hash calculation on the second key to obtain a hash value of the second key, checking the hash value of a first key and the hash value of the second key, and judging whether the first CA lock is consistent with the second CA lock or not according to a check result. Before bidding, the encrypted bidding document is subjected to simulated decryption by adopting the method for verifying the encrypted bidding document, which is provided by the embodiment of the application, so that the verification speed is high and the security of the bidding document is ensured.

Description

Method, device, system and storage medium for verifying encrypted bidding document
Technical Field
The application belongs to the technical field of data encryption, and particularly relates to a method, a device, a system and a storage medium for verifying an encrypted bidding document.
Background
In the bidding process, the bidding document produced by the bidding unit is required to be encrypted and then uploaded, the document decryption is carried out on the bidding day through the unique key of the bidder, and the encryption operation of the bidding document is necessary operation in the bidding environment, so that the business confidentiality can be protected, the tampering and damage can be prevented, the access authority can be limited, the compliance requirement can be met, and the principles of public resource transaction, fairness and fairness can be fully embodied.
In the bidding process, the bidding unit may fail decryption in the bid opening link, and possible reasons include: the encryption and decryption are inconsistent, hardware equipment fails, decryption passwords are wrong, files are damaged or lost in the file reading and writing process, and the like, so that the problem caused by the file/environment/human errors of a bidder occurs, the problem of decryption failure is caused, and the condition of bid unit barred bid can be possibly caused.
In order to solve the problem, a scheme for checking the uploaded bidding documents is provided for part of transaction platforms, and the documents are ensured not to be damaged by checking a hash mode; but aiming at the problems of client driving environment change, lock failure and the like, the bidding unit needs to pay attention to and solve the problems.
For this situation, there are some drawbacks, such as a change in the driving environment, inconsistent encryption and decryption media lock, and media lock damage, where:
when the driving environment changes, the bidding unit is often unclear, and the lock cannot be read normally in the bidding link, so that overtime decryption fails. The reasons for the variation of the driving environment are more, such as the installation of drivers in other areas, the installation of a U-shield driver in a bank, the checking and killing of antivirus software and the like, which may cause the inconsistency of the encrypted driving environment and the decrypted driving environment, thereby causing decryption failure.
When the encryption and decryption medium locks are inconsistent and bidding units produce bidding books by multiple persons, multiple CA locks exist in enterprises at the same time, and under the condition of multiple projects, decryption failure can be caused by the fact that the bidding units use wrong locks.
The media lock is damaged, and under the condition that the media lock or the certificate is damaged in the opening link, the bidding unit cannot replace the lock or apply for the certificate in time, and the decryption failure problem is caused.
Disclosure of Invention
The present invention provides a method, an apparatus, a system, and a storage medium for verifying an encrypted bidding document, wherein the method, the apparatus, the system, and the storage medium are used for decrypting and hash-calculating an information value of a digital envelope of the encrypted bidding document through a second CA lock to obtain a hash value of a second key, verifying the hash value of the second key obtained by encrypting the encrypted bidding document through a first CA lock, and determining whether the first CA lock is consistent with the second CA lock according to a verification result.
To achieve the above object, the solution of the present application is:
in a first aspect, an embodiment of the present application provides a method for verifying an encrypted bid document, including:
acquiring an encrypted bidding document;
when the encrypted bidding document is encrypted through the first CA lock, identification information is generated, wherein the identification information comprises an information value of a digital envelope and a hash value of a first key;
the identification information generated by the encrypted bidding document during encryption is acquired, and the encrypted bidding document is checked, and the checking method comprises the following steps:
decrypting the information value of the digital envelope generated when the encrypted bidding file is encrypted through the second CA lock to obtain a second key, carrying out hash calculation on the second key to obtain a hash value of the second key, checking the hash value of the first key and the hash value of the second key, and if the check result is consistent, enabling the second CA lock to be consistent with the first CA lock; if the verification result is inconsistent, the second CA lock is inconsistent with the first CA lock.
The method according to the embodiment of the application can also have the following additional technical characteristics:
further, the encryption method for encrypting the encrypted bid file by the first CA lock comprises one-time encryption and multiple-time encryption.
Further, if the encryption method for encrypting the encrypted bid file is one-time encryption, the second key does not include the intermediate value key, and hash calculation is directly performed on the second key to obtain a hash value of the second key.
Further, if the encryption method for encrypting the encrypted bid file is multiple times of encryption, the second key comprises an intermediate value key, the last generated key is used as the second key for carrying out hash calculation, and the hash calculation is carried out on the last generated key to obtain the hash value of the second key.
Further, decrypting the encrypted bid file with the second CA lock includes detecting whether to mortise lock prior to decrypting the encrypted bid file with the second CA lock, and prompting a need to mortise lock if no mortise lock or a mortise lock failure is detected.
Further, an encrypted bid file is obtained, wherein the file format of the encrypted bid file comprises bzTF, tbzTF, bzSF and tbzSF file formats.
In a second aspect, an embodiment of the present application provides an apparatus for verifying an encrypted bid document, including:
a file acquisition module configured to acquire an encrypted bid file;
an information acquisition module configured to acquire identification information of the encrypted bidding document;
and the file verification module is configured for verifying the encrypted bidding file.
Further, the identification information of the encrypted bidding document acquired by the information acquisition module comprises an information value of a digital envelope and a hash value of a first key, wherein the information value is generated when the encrypted bidding document is encrypted through a first CA lock; the file verification module decrypts the information value of the digital envelope through the second CA lock to obtain a second key, hashes the second key to obtain a hashed value of the second key, verifies the encrypted bidding file through the hashed value of the first key and the hashed value of the second key, and if the verification results are consistent, the second CA lock is consistent with the first CA lock; if the verification result is inconsistent, the second CA lock is inconsistent with the first CA lock.
In a third aspect, embodiments of the present application provide a system for verifying an encrypted bid file, the system comprising a processor and a memory, the memory storing a computer program, the computer program being loaded and executed by the processor to implement a method for verifying an encrypted bid file as in the first aspect of embodiments of the present application.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having a computer program stored therein, which when executed by a processor, is configured to implement a method for verifying an encrypted bid file as in the first aspect of embodiments of the present application.
Before opening, the encrypted bidding document is subjected to simulated decryption by adopting the method for verifying the encrypted bidding document, which is provided by the embodiment of the application, and has the following beneficial effects:
(1) Risk reduction: the simulated decryption can avoid the bid unit missing the barred bid caused by decryption aging at the bid opening site due to the fact that the bid unit is misplaced with the CA certificate in advance.
(2) The cost is reduced: and (3) confirming the CA certificate used for encrypting the bidding document in advance, and preventing the bidding document from being found and retrieved again after arriving at the bidding site.
(3) Safety test: analog decryption may help to evaluate the security of file encryption. Potential vulnerabilities or weaknesses can be found through simulating decryption attempts so as to repair in time and ensure the security of bidding documents.
(4) Protecting bidder interests: if a problem is found in the simulation decryption stage, measures can be taken in advance to protect the interests of bidders and prevent security holes from occurring in the actual bidding process.
(5) Avoiding information leakage: analog decryption can help to eliminate the risk of information leakage due to technical failure or human error during actual bidding.
(6) Improving bidder confidence: the adoption of the analog decryption measures indicates that the bidding party pays importance to the security, and the trust of bidders in the whole bidding process can be improved.
Drawings
FIG. 1 illustrates a flow diagram of a method of verifying an encrypted bid file in accordance with an embodiment of the present application;
FIG. 2 is a block diagram illustrating the construction of an apparatus for verifying an encrypted bid file according to an embodiment of the present application;
fig. 3 shows a block diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the above objects, features and advantages of the present application more comprehensible, embodiments accompanied with figures are described in detail below. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not limiting. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present application are shown in the drawings. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms "comprising" and "having" and any variations thereof herein are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
It should be noted that, if there is a description of "first", "second", etc. in the embodiments of the present invention, the description of "first", "second", etc. is only for descriptive purposes, and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
As shown in fig. 1, a method for verifying an encrypted bidding document provided in an embodiment of the present application includes the following steps:
step 101, obtaining an encrypted bidding document.
Step 102, obtaining the identification information generated by the encryption bidding document during encryption.
And step 103, checking the encrypted bidding document.
In this embodiment, the encrypted bid file is encrypted by the first CA lock to generate identification information comprising an information value of the digital envelope and a hash value of the first key, wherein the encrypted bid file formats comprise bzTF, tbzTF, bzSF and tbzSF file formats.
It should be noted that, the file format of the encrypted bidding file in the embodiment of the present application is not limited to the above-mentioned file format, and may include files of other formats besides the above-mentioned four file formats, and whatever the file format of the encrypted bidding file is, the file format of the encrypted bidding file is within the protection scope of the embodiment of the present application, and the identification information is generated by encrypting the encrypted bidding file by the CA lock.
The embodiment of the application acquires the identification information generated when the encrypted bidding document is encrypted, and verifies the encrypted bidding document, wherein the verification method comprises the following steps:
decrypting the information value of the digital envelope generated when the encrypted bidding file is encrypted through the second CA lock to obtain a second key, carrying out hash calculation on the second key to obtain a hash value of the second key, checking the hash value of the first key and the hash value of the second key, and if the check result is consistent, enabling the second CA lock to be consistent with the first CA lock; if the verification result is inconsistent, the second CA lock is inconsistent with the first CA lock.
In this embodiment, the encryption method of encrypting the encrypted bid file by the first CA lock includes one encryption and multiple encryption.
If the encryption method for encrypting the encrypted bidding document is primary encryption, the second key does not comprise an intermediate value key, and hash calculation is directly carried out on the second key to obtain a hash value of the second key; if the encryption method for encrypting the encrypted bidding document is multiple times of encryption, the second key comprises an intermediate value key, the key generated last time is used as the second key for carrying out hash calculation, and the hash calculation is carried out on the key generated last time to obtain the hash value of the second key.
Specifically, if the encryption method for encrypting the encrypted bid file is thatSecondary encryption, the second key comprisesIntermediate value key->For the key generated last timeAs a second key for hash calculation, the last generated key +.>And carrying out hash calculation to obtain a hash value of the second key.
Because the hash algorithm has the characteristics of rapidness in forward direction, difficulty in reverse direction, sensitivity in input and collision avoidance, namely, given original text and the hash algorithm, the hash value can be calculated in limited time and limited resources; given a hash value, the original text cannot be (basically) reversely deduced within a limited time, which is also the basis of hash security; any change occurs in the original input information, and the newly generated hash value is greatly changed; the method for decrypting the information value of the digital envelope of the encrypted bidding document to obtain the second key and comparing the hash value obtained by carrying out hash calculation on the second key with the hash value of the first key fully utilizes the characteristics of the hash algorithm, has high verification speed and ensures the security of the bidding document.
According to the embodiment of the application, the encrypted bidding document is decrypted through the second CA lock, whether the locking is detected or not is detected before the encrypted bidding document is decrypted through the second CA lock, and if the unlocking is detected or the locking fails, the locking is prompted to be carried out.
As shown in fig. 2, the device for verifying an encrypted bidding document provided in the embodiment of the present application includes a document obtaining module 201, an information obtaining module 202, and a document verification module 203, where: a file acquisition module 201 configured to acquire an encrypted bid file; an information acquisition module 202 configured to acquire identification information of the encrypted bid file; the file verification module 203 is configured to verify the encrypted bid file.
Further, the information obtaining module 202 is specifically configured to: identification information generated when the encrypted bid file is encrypted through the first CA lock is obtained, wherein the identification information comprises an information value of a digital envelope and a hash value of a first key, and formats of the encrypted bid file comprise bzTF, tbzTF, bzSF and tbzSF file formats.
Further, the file verification module 203 is specifically configured to: decrypting the information value of the digital envelope generated when the encrypted bidding file is encrypted through the second CA lock to obtain a second key, carrying out hash calculation on the second key to obtain a hash value of the second key, checking the hash value of the first key and the hash value of the second key, and if the check result is consistent, enabling the second CA lock to be consistent with the first CA lock; if the verification result is inconsistent, the second CA lock is inconsistent with the first CA lock.
The device for verifying the encrypted bidding document in the embodiment of the present application may be a computer device, or may be a component in the computer device, such as an integrated circuit or a chip. The computer device may be a terminal or may be other devices than a terminal. The computer device may be a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted computer device, a mobile internet device (Mobile Internet Device, MID), an Ultra-mobile personal computer (Ultra-Mobile Personal Computer, UMPC), a netbook or a personal digital assistant (Personal Digital Assistant, PDA), or the like, or may be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (Personal Computer, PC), or the like, which is not limited in particular.
The device for verifying the encrypted bidding document provided in the embodiment of the present application can implement each process implemented in the method embodiment of verifying the encrypted bidding document of fig. 1, and in order to avoid repetition, the description is omitted here.
The embodiment of the present application further provides a computer device, as shown in fig. 3, where the computer device includes a processor 301 and a memory 302, and a program or an instruction that can be executed on the processor 301 is stored in the memory 302, and when the program or the instruction is executed by the processor 301, each step of the method for verifying the encrypted bidding document can be implemented, and the same technical effect can be achieved, so that repetition is avoided, and no further description is given here.
It should be noted that, the computer device in the embodiment of the present application includes the mobile computer device and the non-mobile computer device described above.
The memory 302 may be used to store software programs as well as various data. The memory 302 may mainly include a first memory area storing programs or instructions and a second memory area storing data, wherein the first memory area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 302 may include volatile memory or nonvolatile memory, or the memory 302 may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM). Memory 302 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 301 may include one or more processing units; optionally, the processor 301 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, etc., and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 301.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored, where the program or the instruction implements each process of the method embodiment for verifying an encrypted bidding document when executed by a processor, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
The embodiment of the application also provides a chip, the chip comprises a processor and a communication interface, the communication interface is coupled with the processor, the processor is used for running programs or instructions, the processes of the method embodiment for verifying the encrypted bidding document can be realized, the same technical effects can be achieved, and the repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
The embodiments of the present application further provide a computer program product stored in a storage medium, where the program product is executed by at least one processor to implement the respective processes of the method embodiments for verifying an encrypted bidding document as described above, and achieve the same technical effects, and for avoiding repetition, a detailed description is omitted herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those of ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the protection of the present application.

Claims (10)

1. A method of verifying an encrypted bid document, the method comprising:
acquiring an encrypted bidding document;
generating identification information when the encrypted bidding file is encrypted through a first CA lock, wherein the identification information comprises an information value of a digital envelope and a hash value of a first key;
the identification information generated by the encryption bidding document during encryption is obtained, the encryption bidding document is verified, and the verification method comprises the following steps:
decrypting the information value of the digital envelope generated when the encrypted bidding file is encrypted through a second CA lock to obtain a second key, carrying out hash calculation on the second key to obtain a hash value of the second key, checking the hash value of the first key and the hash value of the second key, and if the check result is consistent, enabling the second CA lock to be consistent with the first CA lock; and if the verification result is inconsistent, the second CA lock is inconsistent with the first CA lock.
2. The method of verifying the encrypted bid file of claim 1, wherein the encrypting the encrypted bid file by the first CA lock comprises encrypting the encrypted bid file once and encrypting multiple times.
3. The method of verifying the encrypted bid file of claim 2, wherein if the encryption method for encrypting the encrypted bid file is one-time encryption, the second key does not include an intermediate value key, and the hash calculation is directly performed on the second key to obtain the hash value of the second key.
4. The method of verifying the encrypted bid file of claim 2, wherein if the encryption method of encrypting the encrypted bid file is a plurality of encryptions, the second key comprises an intermediate value key, a last generated key is used as the second key for performing the hash computation, and the hash computation is performed on the last generated key to obtain the hash value of the second key.
5. The method of verifying the encrypted bid file of claim 1, wherein decrypting the encrypted bid file with the second CA lock comprises detecting whether a lock is in place prior to decrypting the encrypted bid file with the second CA lock, and prompting a need for a lock if no lock is detected or a lock fails.
6. The method of verifying the encrypted bid file of claim 1, wherein the obtaining the encrypted bid file comprises a file format of bzTF, tbzTF, bzSF and tbzSF.
7. An apparatus for verifying an encrypted bid document, the apparatus comprising:
a file acquisition module configured to acquire an encrypted bid file;
an information acquisition module configured to acquire identification information of the encrypted bidding document;
and the file verification module is configured for verifying the encrypted bidding file.
8. The apparatus of claim 7, wherein the identification information of the encrypted bid file acquired by the information acquisition module includes an information value of a digital envelope generated when the encrypted bid file is encrypted by a first CA lock and a hash value of a first key; the file verification module decrypts the information value of the digital envelope through a second CA lock to obtain a second key, carries out hash calculation on the second key to obtain a hash value of the second key, verifies the encrypted bidding file through the hash value of the first key and the hash value of the second key, and if the verification results are consistent, the second CA lock is consistent with the first CA lock; and if the verification result is inconsistent, the second CA lock is inconsistent with the first CA lock.
9. A verification encrypted bid file system, the system comprising a processor and a memory, the memory having a computer program stored therein, wherein the computer program is loaded and executed by the processor to implement the method of verifying an encrypted bid file as claimed in any one of claims 1 to 6.
10. A computer readable storage medium having a computer program stored therein, which when executed by a processor, is adapted to carry out the method of verifying an encrypted bid file as claimed in any one of claims 1 to 6.
CN202311573450.5A 2023-11-23 2023-11-23 Method, device, system and storage medium for verifying encrypted bidding document Active CN117272406B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311573450.5A CN117272406B (en) 2023-11-23 2023-11-23 Method, device, system and storage medium for verifying encrypted bidding document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311573450.5A CN117272406B (en) 2023-11-23 2023-11-23 Method, device, system and storage medium for verifying encrypted bidding document

Publications (2)

Publication Number Publication Date
CN117272406A true CN117272406A (en) 2023-12-22
CN117272406B CN117272406B (en) 2024-03-12

Family

ID=89203136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311573450.5A Active CN117272406B (en) 2023-11-23 2023-11-23 Method, device, system and storage medium for verifying encrypted bidding document

Country Status (1)

Country Link
CN (1) CN117272406B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111934873A (en) * 2020-10-12 2020-11-13 江西省精彩纵横采购咨询有限公司 Bidding file encryption and decryption method and device
CN112633884A (en) * 2020-12-30 2021-04-09 标信智链(杭州)科技发展有限公司 Local private key recovery method and device for transaction main body identity certificate
CN112651031A (en) * 2020-12-14 2021-04-13 展讯半导体(成都)有限公司 Digital signature method, digital signature verification method, electronic device and storage medium
CN112700245A (en) * 2020-12-30 2021-04-23 标信智链(杭州)科技发展有限公司 Block chain-based digital mobile certificate application method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111934873A (en) * 2020-10-12 2020-11-13 江西省精彩纵横采购咨询有限公司 Bidding file encryption and decryption method and device
CN112651031A (en) * 2020-12-14 2021-04-13 展讯半导体(成都)有限公司 Digital signature method, digital signature verification method, electronic device and storage medium
CN112633884A (en) * 2020-12-30 2021-04-09 标信智链(杭州)科技发展有限公司 Local private key recovery method and device for transaction main body identity certificate
CN112700245A (en) * 2020-12-30 2021-04-23 标信智链(杭州)科技发展有限公司 Block chain-based digital mobile certificate application method and device

Also Published As

Publication number Publication date
CN117272406B (en) 2024-03-12

Similar Documents

Publication Publication Date Title
CN109792386B (en) Method and apparatus for trusted computing
CN111723383B (en) Data storage and verification method and device
CN101939754B (en) Finger sensing apparatus using hybrid matching and associated methods
RU2263407C2 (en) Data protection method
CN108734018B (en) Authentication method, device, system and computer readable storage medium
CN110798475B (en) Security authentication method, device, equipment and storage medium
KR20090027578A (en) Method and apparatus for verifying digital data using trusted computing
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
CN110830257B (en) File signature method and device, electronic equipment and readable storage medium
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
CN113225324A (en) Block chain anonymous account creation method, system, device and storage medium
JP4718321B2 (en) Log audit system and log audit method
CN109818965B (en) Personal identity verification device and method
CN117272406B (en) Method, device, system and storage medium for verifying encrypted bidding document
CN110826034B (en) File signature method and device, electronic equipment and readable storage medium
CN115514492A (en) BIOS firmware verification method, device, server, storage medium and program product
CN115208575A (en) Software security verification method, device and storage medium
CN111046440A (en) Tamper verification method and system for secure area content
CN115913563B (en) Electronic signature generation method, verification method and device
CN113868628B (en) Signature verification method, signature verification device, computer equipment and storage medium
CN115225350B (en) Government cloud encryption login verification method based on national secret certificate and storage medium
US10970407B2 (en) Processes and related apparatus for secure access control
KR101943166B1 (en) Dynamic module, method for authenticating and ensuring integrity of dynamic module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant