[go: up one dir, main page]

CN108462721B - Encryption method and decryption method applied to online bidding - Google Patents

Encryption method and decryption method applied to online bidding Download PDF

Info

Publication number
CN108462721B
CN108462721B CN201810260813.2A CN201810260813A CN108462721B CN 108462721 B CN108462721 B CN 108462721B CN 201810260813 A CN201810260813 A CN 201810260813A CN 108462721 B CN108462721 B CN 108462721B
Authority
CN
China
Prior art keywords
user
encryption
longitude
latitude
bidding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810260813.2A
Other languages
Chinese (zh)
Other versions
CN108462721A (en
Inventor
张帆
李明君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan International Tendering Co ltd
Original Assignee
Sichuan International Tendering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan International Tendering Co ltd filed Critical Sichuan International Tendering Co ltd
Priority to CN201810260813.2A priority Critical patent/CN108462721B/en
Publication of CN108462721A publication Critical patent/CN108462721A/en
Application granted granted Critical
Publication of CN108462721B publication Critical patent/CN108462721B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an encryption method applied to online bidding, which relates to the field of online service and solves the problems that the prior bidding document is not provided with corresponding confidentiality measures in the compiling process, the bidding document is easily known in advance by a prepared bidding party, the fairness of bidding is influenced, and the technical scheme has the key points that: s100, determining a bidding document to be encrypted, and triggering encryption operation; s200, receiving an encrypted password input by a user; s300, encrypting the bidding document to be encrypted according to the encryption password; s400, storing the encrypted bidding document in a third-party cloud server, wherein the encryption method applied to online bidding can ensure that the bidding document in the compiling process is not stolen by others, and the bidding security is improved.

Description

Encryption method and decryption method applied to online bidding
Technical Field
The invention relates to the field of online service, in particular to an encryption method and a decryption method applied to online bidding.
Background
The bidding is a short term for bidding, and refers to a behavior process in which, in the purchasing behavior of products and services, a bidder attracts numerous bidders to compete equally under the same conditions through pre-published bidding information, and experts conduct comprehensive review on the numerous bidders according to a specified program and organization technology, economy, law and the like, and select a successful bidder preferentially. Generally, bidding requires procedures such as bidding, bid opening, bid evaluation and scaling.
(1) Poster
The bidding party produces a bidding document, the bidding document reveals bidding information, and the bidding information comprises a bidding subject of the bidding project, project content, project period, project budget, bidding period and the like.
(2) Bidding
After obtaining the bidding information, the bidder creates a bidding document according to the bidding requirement, wherein the bidding document reveals the bidding information, and the bidding information comprises a bidding subject, a bidding price and the like.
(3) Opening label
After the bidding period is cut, a delegating host announces discipline, confirms and reads the bidding general profile, announces bidding information of the bidding party, checks the sealing condition of the bidding document, publishes the bidding information of the bidding party, completes recording and enables each party to sign and confirm, and the process is called bidding opening for short.
(4) Comment mark
The technical, economic and legal experts form a project appraiser, and the project appraiser carries out comprehensive appraisal according to specified conditions and procedures.
(5) Scaling
In the process of establishing the bidding document, a business manager reasonably sets substantial requirements such as qualification conditions, bidding quotation requirements, bid evaluation methods, contract terms, technical standards and the like of bidders according to characteristics and requirements of bidding items by taking relevant data and information provided by buyers as a basis and combining market research and bidding schemes, establishes the bidding document, ensures the fairness of bidding, and ensures that the bidding document needs to be known by bidders at the same time.
Disclosure of Invention
The invention aims to provide a judicial evidence storage file encryption method which can encrypt a bidding document to prevent outsiders from opening the bidding document so as to invade the privacy of users.
The technical purpose of the invention is realized by the following technical scheme:
an encryption method applied to online bidding, applied to an electronic device, the method comprising:
s100, determining a bidding document to be encrypted, and triggering encryption operation;
s200, receiving an encrypted password input by a user;
s300, encrypting the bidding document to be encrypted according to the encryption password;
and S400, storing the encrypted bidding document in a third-party cloud server.
By adopting the scheme, the bidding document is firstly determined, and is encrypted based on the encryption password input by the user, so that the content of the bidding document is prevented from being acquired by other people, the bidding document is stored in the third-party cloud server, and the user can be prevented from finding the position of the bidding document.
Preferably, step S100 specifically includes:
s110, receiving an encryption request of the bidding document, and determining the bidding document to be encrypted;
s120, receiving and judging whether the operation of the user is a precondition for triggering the encryption operation;
and S130, when the operation is a precondition for triggering the encryption operation, triggering the encryption operation.
By adopting the scheme, the encryption operation is started by judging whether the operation of the user is a precondition for triggering the encryption operation or not and when the operation of the user is judged to be the triggering of the encryption operation.
Preferably, step S120 specifically includes:
s121, judging whether the number of times that a user continuously clicks the bid document in a specific time reaches a preset number of times;
s122, if the user continuously clicks the position of the bid document within the specific time for a preset number of times, calling an unlocking interface for the user to slide and unlock through fingers;
and S123, judging whether the path formed by the sliding of the finger of the user is consistent with the interface preset by the unlocking interface.
By adopting the scheme, the action of the user can be set through S121, the setting of S122 can judge whether the action of the user meets the requirement for transferring the unlocking interface, and the setting of S123 can judge whether the channel of the user is consistent with the interface preset by the unlocking interface, so that the precondition for judging whether the operation of the user is triggering the encryption operation is really realized.
Preferably, step S200 specifically includes:
s210, simultaneously presenting a plurality of encryption condition options set by a user and marking the serial number of each encryption condition option;
s220, receiving information input by a user in each encryption condition option, and storing the information in real time;
s230, randomly changing the encryption condition option position of the information input by the emptying user for the user to input again;
and S240, receiving information input again by the user at the randomly generated encryption condition option position, comparing the information with the information stored in real time, and if the information is consistent with the information stored in real time, storing the information input by the user at each encryption condition option and the corresponding serial number into the private cloud server.
By adopting the scheme, compared with single digital password input, the difficulty of decryption by outsiders is greatly improved by inputting the corresponding information of each encryption condition option, the encryption condition option position of the input information of the emptying user is randomly changed for the user to input again, and the user can confirm the user password.
Preferably, the encryption condition options mentioned in S210 include a digital password, a real-time date, a current longitude and latitude of the user, and a valid verification code sent by the verification code platform within a limited time, where if the real-time month is singular, the longitude is before and the latitude is after; otherwise, if the longitude is back and the latitude is front, the longitude and the latitude are both integers, and in addition, a position tracker is arranged on the mobile phone of the user and a locator is arranged in the electronic equipment for completing encryption;
and when the verification code received in the step S220 is consistent with the verification code in the validity period sent by the verification code platform, the input real-time date is correct, the input longitude and latitude are the same as the user longitude and latitude tracked by the position tracker, the ordering is correct according to the rule of the real-time date, the longitude and latitude of the position where the positioner is located in the encryption electronic equipment are the same as the longitude and latitude of the position where the position tracker is located, and when the conditions are met, the step S230 is started.
By adopting the scheme, the encryption conditions of the S210 comprise the digital password, the real-time date and the current longitude and latitude of the user, the position tracker is arranged on the user, the locator in the equipment for completing encryption is verified by the digital password, the real-time date is related to the digital placement sequence of the corresponding longitude and latitude, the variability of the encryption conditions can be realized by the arrangement of the real-time date and the corresponding longitude and latitude, the rule is unknown to others, and the difficulty of cracking by others is improved
Preferably, step S240 further includes a physiological characteristic verification of the user before the synchronous storage in the private cloud server, where the physiological characteristic verification is fingerprint verification, iris verification, or pupil verification;
the private cloud server calls the user physiological characteristics corresponding to the mobile phone number of the user and compares the user physiological characteristics with the physiological characteristics of the user detected in real time, and if the user physiological characteristics are consistent with the physiological characteristics of the user detected in real time, the user physiological characteristics are stored in the private cloud server; otherwise, it is not stored.
By adopting the scheme, personal documents can be conveniently stored through the setting of physiological characteristic verification, and fingerprint authentication, iris authentication and pupil authentication pointed by the physiological characteristic verification are all the authentication of the external body structure of the user under a plurality of conditions, so that the accuracy of personal identity verification is greatly improved.
Preferably, the step S240 further includes location verification before the step S240 is synchronously stored in the private cloud server, and a locator is disposed in the electronic device that is defined to complete encryption;
comparing the longitude and latitude of the position where the positioner is located in the encrypted electronic equipment with the longitude and latitude of the position where the position tracker is located, wherein the longitude and latitude are all integrated, and if the comparison is consistent, storing the longitude and latitude into a private cloud server; otherwise, it is not stored.
By adopting the scheme, whether the user is near the encrypted electronic equipment can be indirectly acquired through the encrypted electronic equipment and the position tracker of the mobile phone of the user, and the safety of the user during login is improved again.
Preferably, S300 specifically includes the steps of:
s310, generating a verification code sending option outside the bidding document, and synchronously displaying the sequence number position corresponding to the encryption condition option;
and S320, replacing the sequence number position corresponding to the encryption condition option at regular time.
By adopting the scheme, whether the mobile phone number of the user is correct or not is favorably confirmed through the arrangement of the verification code sending option, and the position of the serial number corresponding to the encryption condition option is changed at regular time, so that the possibility of cracking the password by outsiders is further reduced.
The invention also aims to provide a decryption method applied to online bidding, which can facilitate users to decrypt the encrypted bidding documents.
Preferably, the decryption method applied to the online bidding is applied to an electronic device, and the method comprises the following steps:
a100: finding and storing the bidding document in a third-party cloud server;
a200: triggering a verification code sending option, sending a verification code to the user mobile phone by the verification code sending option, and synchronously verifying the physiological characteristics and the longitude and latitude determined by a positioner in the electronic equipment and the longitude and latitude determined by a position tracker arranged in the user mobile phone;
a300: when the physiological characteristics pass verification and the longitude and latitude determined by the positioner in the electronic equipment are the same as the longitude and latitude determined by the position tracker arranged in the mobile phone of the user, calling information input by the user in each encryption condition option in the private cloud server and a corresponding serial number;
a400, according to the position of the serial number corresponding to the encryption condition option, filling the information corresponding to the encryption condition option corresponding to the serial number in sequence;
and A500, comparing whether the input encryption condition option information is consistent with the preset information or not, wherein the real-time date indicated by the encryption condition is the current decryption date, the current longitude and latitude of the user indicated by the encryption condition is the dimension ordering meeting the current decryption date, and if all the encryption conditions are consistent, the decryption of the bidding document is finished.
By adopting the scheme, the verification code information can be obtained through the verification code sending option, and the serial numbers corresponding to the corresponding encryption options are also obtained through the confirmation of other two pieces of encryption condition option information in the private cloud server, so that the decryption can be completed by filling the corresponding encryption condition option information according to the serial numbers changed in real time when the puzzle is solved.
Preferably, in step a500, based on a comparison between each input encryption option information and each previously preset encryption option information, a progress bar is displayed at a lower end to indicate whether each input encryption option information is correct.
By adopting the scheme, the progress bar is arranged, so that convenience is brought to a user to timely know which encryption condition options are filled in.
In conclusion, the invention has the following beneficial effects: through the verification of physiological characteristics and the arrangement of a locator and a position tracker of the electronic equipment, the corresponding password is cracked through the identification of the identity and whether the user is near the equipment which completes encryption, so that the identity of the user is further judged.
Drawings
FIG. 1 is a block diagram of an overall system for an encryption method applied to online bidding;
FIG. 2 is a block diagram of the system of S100 of FIG. 1;
FIG. 3 is a system block diagram of S120 of FIG. 2;
FIG. 4 is a system block diagram of S200 in FIG. 1;
FIG. 5 is a system block diagram of S300 in FIG. 4;
fig. 6 is an overall block diagram of a decryption method applied to online bidding.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in fig. 1, the present invention relates to an encryption method applied to online bidding, which is applied to an electronic device, and the method includes: s100, determining a bidding document to be encrypted, and triggering encryption operation; s200, receiving an encrypted password input by a user; s300, encrypting the bidding document to be encrypted according to the encryption password; and S400, storing the encrypted bidding document in a third-party cloud server.
As shown in fig. 2, step S100 specifically includes: s110, receiving an encryption request of the bidding document, and determining the bidding document to be encrypted; s120, receiving and judging whether the operation of the user is a precondition for triggering the encryption operation; and S130, when the operation is a precondition for triggering the encryption operation, triggering the encryption operation.
In step S110, the user mainly touches the corresponding bid document by touching or by touching with a mouse to select the bid document to be encrypted.
As shown in fig. 3, step S120 specifically includes step S121, determining whether the number of times that the user continuously clicks the bid document within a specific time reaches a preset number of times; s122, if the user continuously clicks the position of the bid document within the specific time for a preset number of times, calling an unlocking interface for the user to slide and unlock through fingers; and S123, judging whether the path formed by the sliding of the finger of the user is consistent with the interface preset by the unlocking interface.
The number of times of continuously clicking the bid document mentioned in S121 is mainly formed by multiple times of clicking on the touch screen or multiple times of clicking on the mouse, S122 mainly refers to the number of times of clicking on the touch screen and the mouse, and for S123, it is mainly determined whether the bar generated by the sliding of the finger of the user is consistent with the preset interface of the unlock interface.
As shown in fig. 4, step S200 specifically includes: s210, simultaneously presenting a plurality of encryption condition options set by a user and marking the serial number of each encryption condition option; s220, receiving information input by a user in each encryption condition option, and storing the information in real time;
s230, randomly changing the encryption condition option position of the information input by the emptying user for the user to input again; and S240, receiving information input again by the user at the randomly generated encryption condition option position, comparing the information with the information stored in real time, and if the information is consistent with the information stored in real time, storing the information input by the user at each encryption condition option and the corresponding serial number into the private cloud server.
The encryption condition options mentioned in S210 include a digital password, a real-time date, a current longitude and latitude of the user, and a valid verification code sent by the verification code platform within a limited time, and if the real-time month is singular, the longitude is before and the latitude is after; otherwise, if the longitude is back and the latitude is front, the longitude and the latitude are both integers, and in addition, a position tracker is arranged on the mobile phone of the user and a locator is arranged in the electronic equipment for completing encryption; and when the verification code received in the step S220 is consistent with the verification code in the validity period sent by the verification code platform, the input real-time date is correct, the input longitude and latitude are the same as the user longitude and latitude tracked by the position tracker, the ordering is correct according to the rule of the real-time date, the longitude and latitude of the position where the positioner is located in the encryption electronic equipment are the same as the longitude and latitude of the position where the position tracker is located, and when the conditions are met, the step S230 is started.
Step S240, before the synchronous storage of the user identity authentication and the verification of the physiological characteristics of the user, the physiological characteristics authentication is fingerprint authentication, iris authentication or pupil authentication; the private cloud server calls the user physiological characteristics corresponding to the mobile phone number of the user and compares the user physiological characteristics with the physiological characteristics of the user detected in real time, and if the user physiological characteristics are consistent with the physiological characteristics of the user detected in real time, the user physiological characteristics are stored in the private cloud server; otherwise, it is not stored.
The fingerprint authentication is mainly identified through a fingerprint identifier on a mobile phone or a notebook computer, the identified fingerprint is compared with the fingerprint condition of a user corresponding to a mobile phone number called by a central processing unit, and the fingerprint authentication can be completed only when the fingerprints of the identified fingerprint and the fingerprint condition of the user are compared to be consistent.
The iris authentication is mainly realized by an iris recognizer arranged on a mobile phone or a notebook computer, and the iris authentication is completed only when the iris conditions of the iris recognizer are compared with the iris conditions of the user corresponding to the mobile phone number called by the central processing unit and the iris conditions of the user are consistent.
The pupil authentication is mainly to collect pupils of a user through a camera arranged on a mobile phone or a notebook computer, compare the collected pupils with the user pupil condition corresponding to a mobile phone number called by a central processing unit, and only when the pupils of the two are compared to be consistent, the pupil authentication is completed.
Step S240, before the data is synchronously stored in the private cloud server, position verification is also included, and a locator is arranged in the electronic equipment which is defined to finish encryption; comparing the longitude and latitude of the position where the positioner is located in the encrypted electronic equipment with the longitude and latitude of the position where the position tracker is located, wherein the longitude and latitude are all integrated, and if the comparison is consistent, storing the longitude and latitude into a private cloud server; otherwise, it is not stored.
As shown in fig. 5, S300 specifically includes the following steps: s310, generating a verification code sending option outside the bidding document, and synchronously displaying the sequence number position corresponding to the encryption condition option; and S320, replacing the sequence number position corresponding to the encryption condition option at regular time.
As shown in fig. 6, a forensic document decryption method is applied to an electronic device, and the method includes: a100: finding and storing the bidding document in a third-party cloud server; a200: triggering a verification code sending option, sending a verification code to the user mobile phone by the verification code sending option, and synchronously verifying the physiological characteristics and the longitude and latitude determined by a positioner in the electronic equipment and the longitude and latitude determined by a position tracker arranged in the user mobile phone; a300: when the physiological characteristics pass verification and the longitude and latitude determined by the positioner in the electronic equipment are the same as the longitude and latitude determined by the position tracker arranged in the mobile phone of the user, calling information input by the user in each encryption condition option in the private cloud server and a corresponding serial number; a400, according to the position of the serial number corresponding to the encryption condition option, filling the information corresponding to the encryption condition option corresponding to the serial number in sequence;
and A500, comparing whether the input encryption condition option information is consistent with the preset information or not, wherein the real-time date indicated by the encryption condition is the current decryption date, the current longitude and latitude of the user indicated by the encryption condition is the dimension ordering meeting the current decryption date, and if all the encryption conditions are consistent, the decryption of the bidding document is finished.
In step a500, based on the comparison between each input encryption option information and each preset encryption option information, a progress bar is displayed at the lower end to indicate whether each input encryption option information is correct.
The overall process can be decomposed into encryption and decryption processes, which are specifically described as follows:
and (3) encryption process:
and S1, triggering encryption by the user through corresponding actions, and presetting a plurality of encryption conditions after triggering the encryption.
And S2, correspondingly verifying the preset encryption conditions of the user to judge whether the preset encryption conditions of the user are correct or not, and placing the encrypted bidding document in a third-party cloud server.
And (3) decryption process:
and S1, when the user enters the third-party cloud server, performing physiological characteristic verification and position verification, and thus judging whether the user is the user and is nearby.
And S2, inputting corresponding information according to the sequence of the encrypted information, and being convenient for a user to know which information is filled correctly through the arrangement of the progress bar.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.

Claims (5)

1. An encryption method applied to online bidding, applied to an electronic device, the method comprising:
s100, determining a bidding document to be encrypted, and triggering encryption operation;
s200, receiving an encrypted password input by a user;
s300, encrypting the bidding document to be encrypted according to the encryption password;
s400, storing the encrypted bidding document in a third-party cloud server;
wherein step S100 specifically includes:
s110, receiving an encryption request of the bidding document, and determining the bidding document to be encrypted;
s120, receiving and judging whether the operation of the user is a precondition for triggering the encryption operation;
s130, when the operation is a precondition for triggering the encryption operation, triggering the encryption operation;
wherein step S120 specifically includes:
s121, judging whether the number of times that a user continuously clicks the bid document in a specific time reaches a preset number of times;
s122, if the user continuously clicks the position of the bid document within the specific time for a preset number of times, calling an unlocking interface for the user to slide and unlock through fingers;
s123, judging whether the strip formed by the sliding of the finger of the user is consistent with an interface preset by an unlocking interface or not;
wherein step S200 specifically includes:
s210, simultaneously presenting a plurality of encryption condition options set by a user and marking the serial number of each encryption condition option;
s220, receiving information input by a user in each encryption condition option, and storing the information in real time;
s230, randomly changing the encryption condition option position of the information input by the emptying user for the user to input again;
s240, receiving information input again by the user at the randomly generated encryption condition option position, comparing the information with the information stored in real time, and if the information is consistent with the information stored in real time, storing the information input by the user at each encryption condition option and the corresponding serial number into a private cloud server;
the encryption condition options mentioned in S210 include a digital password, a real-time date, a current longitude and latitude of the user, and a valid verification code sent by the verification code platform within a limited time, and if the real-time month is singular, the longitude is before and the latitude is after; otherwise, if the longitude is back and the latitude is front, the longitude and the latitude are both integers, and in addition, a position tracker is arranged on the mobile phone of the user and a locator is arranged in the electronic equipment for completing encryption;
and when the verification code received in the step S220 is consistent with the verification code in the validity period sent by the verification code platform, the input real-time date is correct, the input longitude and latitude are the same as the user longitude and latitude tracked by the position tracker, the ordering is correct according to the rule of the real-time date, the longitude and latitude of the position where the positioner is located in the encryption electronic equipment are the same as the longitude and latitude of the position where the position tracker is located, and when the conditions are met, the step S230 is started.
2. The encryption method applied to online bidding according to claim 1, wherein step S240 further comprises a physiological characteristic verification of the user before the synchronous storage in the private cloud server, wherein the physiological characteristic verification is a fingerprint authentication, an iris authentication or a pupil authentication;
the private cloud server calls the user physiological characteristics corresponding to the mobile phone number of the user and compares the user physiological characteristics with the physiological characteristics of the user detected in real time, and if the user physiological characteristics are consistent with the physiological characteristics of the user detected in real time, the user physiological characteristics are stored in the private cloud server; otherwise, it is not stored.
3. The encryption method according to claim 2, wherein the step S240 further comprises location verification before the synchronous storage in the private cloud server, and a locator is disposed in the electronic device for defining the encryption;
comparing the longitude and latitude of the position where the positioner is located in the encrypted electronic equipment with the longitude and latitude of the position where the position tracker is located, wherein the longitude and latitude are all integrated, and if the comparison is consistent, storing the longitude and latitude into a private cloud server; otherwise, it is not stored.
4. The encryption method applied to online bidding according to claim 3, wherein S300 comprises the following steps:
s310, generating a verification code sending option outside the bidding document, and synchronously displaying the sequence number position corresponding to the encryption condition option;
and S320, replacing the sequence number position corresponding to the encryption condition option at regular time.
5. A decryption method applied to online bidding, applied to an electronic device, the method comprising:
a100: finding and storing the bidding document in a third-party cloud server;
a200: triggering a verification code sending option, sending a verification code to the user mobile phone by the verification code sending option, and synchronously verifying the physiological characteristics and the longitude and latitude determined by a positioner in the electronic equipment and the longitude and latitude determined by a position tracker arranged in the user mobile phone;
a300: when the physiological characteristics pass verification and the longitude and latitude determined by the positioner in the electronic equipment are the same as the longitude and latitude determined by the position tracker arranged in the mobile phone of the user, calling information input by the user in each encryption condition option in the private cloud server and a corresponding serial number;
a400, according to the position of the serial number corresponding to the encryption condition option, filling the information corresponding to the encryption condition option corresponding to the serial number in sequence;
a500, comparing whether the input encryption condition option information is consistent with the preset information or not, wherein the real-time date indicated by the encryption condition is the current decryption date, the current longitude and latitude of the user indicated by the encryption condition is the dimension ordering meeting the current decryption date, and if all the encryption conditions are consistent, the decryption of the bidding document is finished;
in step a500, based on the comparison between each input encryption option information and each preset encryption option information, a progress bar is displayed at the lower end to indicate whether each input encryption option information is correct.
CN201810260813.2A 2018-03-27 2018-03-27 Encryption method and decryption method applied to online bidding Active CN108462721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810260813.2A CN108462721B (en) 2018-03-27 2018-03-27 Encryption method and decryption method applied to online bidding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810260813.2A CN108462721B (en) 2018-03-27 2018-03-27 Encryption method and decryption method applied to online bidding

Publications (2)

Publication Number Publication Date
CN108462721A CN108462721A (en) 2018-08-28
CN108462721B true CN108462721B (en) 2020-08-18

Family

ID=63237678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810260813.2A Active CN108462721B (en) 2018-03-27 2018-03-27 Encryption method and decryption method applied to online bidding

Country Status (1)

Country Link
CN (1) CN108462721B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114154906B (en) * 2021-12-10 2025-03-21 厦门兆翔智能科技有限公司 Airport ground service intelligent scheduling method and system
CN119067666B (en) * 2024-11-07 2025-01-24 贵州省黔云集中招标采购服务有限公司 Information encryption method, system and medium for transaction cloud platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205354036U (en) * 2015-12-30 2016-06-29 北京上古视觉科技有限公司 Data encryption cloud storage system based on multimode biological identification technique
CN106060099A (en) * 2016-08-15 2016-10-26 北京奇虎科技有限公司 Data access method and system, and devices
CN108390867A (en) * 2018-02-06 2018-08-10 杭州政信金服互联网科技有限公司 Card file enciphering method and decryption method are deposited in the administration of justice

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205354036U (en) * 2015-12-30 2016-06-29 北京上古视觉科技有限公司 Data encryption cloud storage system based on multimode biological identification technique
CN106060099A (en) * 2016-08-15 2016-10-26 北京奇虎科技有限公司 Data access method and system, and devices
CN108390867A (en) * 2018-02-06 2018-08-10 杭州政信金服互联网科技有限公司 Card file enciphering method and decryption method are deposited in the administration of justice

Also Published As

Publication number Publication date
CN108462721A (en) 2018-08-28

Similar Documents

Publication Publication Date Title
US11847199B2 (en) Remote usage of locally stored biometric authentication data
US11677565B2 (en) Network-based device authentication system
US8004491B2 (en) System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel
US20030074326A1 (en) Method and apparatus for providing biometric information as a signature to a contract
US20180268415A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
EP3190770B1 (en) User authentication method with enhanced security
EP3824592A1 (en) Public-private key pair protected password manager
WO2015088986A1 (en) System and method for high trust cloud digital signing and workflow automation in health sciences
US12101317B2 (en) Computer-implemented user identity verification method
CN106487758B (en) data security signature method, service terminal and private key backup server
GB2553258A (en) Access authentication method and system
WO2018072588A1 (en) Approval signature verification method, mobile device, terminal device, and system
CN117981272A (en) Decentralized zero-trust identity verification and authentication system and method
CN108462721B (en) Encryption method and decryption method applied to online bidding
Khelifi et al. M-Vote: a reliable and highly secure mobile voting system
KR20200054552A (en) Method of providing electronic prescription service
US9015810B2 (en) System and method for authenticating manual interaction in a computing environment
CN108390867B (en) Judicial evidence storage document encryption method
CN107332668A (en) A kind of method and apparatus for handling encrypted message
CN1698055A (en) Personal information management system, switching system, and terminal device
KR20200026627A (en) Online vote method using block chain and apparatus therefor
CN107517180A (en) Login method and device
US10693651B1 (en) System and method for authentication using biometric hash strings
US20230128345A1 (en) Computer-implemented method and system for the automated learning management
CN107301547B (en) Method, device and system for sliding password input in network payment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant