CN108959946A - Electric bidding document multilayer encipher-decipher method for e-bidding - Google Patents
Electric bidding document multilayer encipher-decipher method for e-bidding Download PDFInfo
- Publication number
- CN108959946A CN108959946A CN201810750703.4A CN201810750703A CN108959946A CN 108959946 A CN108959946 A CN 108959946A CN 201810750703 A CN201810750703 A CN 201810750703A CN 108959946 A CN108959946 A CN 108959946A
- Authority
- CN
- China
- Prior art keywords
- encryption
- relationship
- file
- encryption relationship
- component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of electric bidding document multilayer encipher-decipher method for e-bidding, the method includes the steps: user passes through login function unit login system;Encryption function cell call encryption relationship generates component and encrypts to file, and generates encryption relationship, and encryption relationship imports in mobile USB flash disk;Encryption relationship is imported into encryption relationship out of mobile USB flash disk and generates component, encryption relationship generates component to file decryption.This technology realizes the effect of multi-layer security using more one layer of encryption that random cryptographic relationship is substantially to file in simple encryption flow.
Description
Technical field
The present invention relates to field of encryption, especially a kind of electric bidding document multilayer encipher-decipher method for e-bidding.
Background technique
Be much in traditional encryption and decryption technology based on Cryptography Principles by specific file according to fixed mathematical function into
Row conversion is to realize encryption, and the regularity of fixed mathematical function is stronger, and the informational of industry is also easy to more by force pass through
General rule is cracked, and the electric bidding document of e-bidding belongs to classified papers, very high to security requirements.
Summary of the invention
The technical solution adopted by the present invention to solve the technical problems is:
Electric bidding document multilayer encipher-decipher method for e-bidding of the invention, includes the following steps: the first step, steps on
Record request, user by login function unit login system, test by the user name of login function unit access database and password
Demonstrate,prove user identity;Second step, file encryption, user issue the request of encryption file, encryption function unit to encryption function unit
It calls encryption relationship to generate component to encrypt file, and generates encryption relationship and then export to encrypt and be related to encryption
Relationship output precision encrypts relationship output precision for encryption relationship and imported into transport function;Transport function is to data
Downloadable encryption relationship is written in library, user downloads encryption and is related in mobile USB flash disk, and database removes the encryption of backup automatically
Relationship;Third step, file decryption, user issue the request of decryption file to functional unit is decrypted, and decryption functional unit, which calls, to be added
Close relationship generates component and conveys decoding request, and encryption relationship is imported into encryption relationship out of mobile USB flash disk and generates component by user,
Encryption relationship generates component to file decryption.
Further, the encryption relationship generates component and encrypts specifically to file, encrypts relationship generation group
Part acquires all characters for needing to encrypt file, and encryption relationship generates component and each character is converted to a random coding
And the mapping relations for storing above-mentioned conversion are " encryption relationship ", encryption relationship generate component by need to encrypt file each
Character is converted to corresponding encoded according to encryption relational format and completes encryption.
Further, it is specifically that encryption relationship is generated to the operation that file is decrypted that the encryption relationship, which generates component,
Component obtains the encryption relationship imported, and encryption relationship, which generates component, will need the file decrypted according to encryption relationship by random coded
Reversion is changed to respective symbols and completes decryption.
The invention has the advantages that when carrying out encryption and decryption using the encryption relationship being randomly generated in the technical program,
And by encryption relationship and file physical isolation, though obtain encrypted file under conditions of no encryption relationship still without
Method cracks, using more one layer of encryption that random cryptographic relationship is substantially to file in the technical program, in simple encryption stream
The effect of multi-layer security is realized in journey.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of system framework in the present invention.
Specific embodiment
In the embodiment shown in fig. 1, system of the invention includes: database, is used for storage user name and password, also uses
In temporarily storage encryption relationship and user is supported to download encryption relationship login function unit, for the user name according to database
And password authentification user's identity;Transport function is also used for Downloadable encryption relationship to be written into the database
In receiving and forwarding user's operation request;Encryption function unit carries out file for calling the encryption relationship to generate component
Encipherment protection, for calling the export encryption of encryption relationship output precision to be related to transport function;Functional unit is decrypted, is used for
It calls the encryption relationship to generate component the file after encipherment protection is decrypted to release the protection to file;Encryption relationship
Generate component, for generating random encryption relationship, and using random encryption relationship to specified file carry out conversion plus
It is close;Be also used to specified encryption file be carried out by the encryption relationship of importing the decryption of inverse transform;Encryption relationship output precision,
Transport function is exported to for the relationship of encryption to be generated the encryption relationship that component generates.
The login function unit is used to pass through data when transport function needs are connect with Database
The user name in library and password verify the identity of user;The transport function is connect with the Database information,
And under the encryption relationship that encryption relationship generates component generation is temporarily uploaded to database and supports user out of described database
Carry encryption relationship;The encryption relationship of user's downloading is stored in the mobile USB flash disk completely cut off with database physical;The encryption function list
Encryption relationship described in metacall generates component and generates a random encryption relationship, then according to random encryption relationship to needs
The file of encryption is encrypted, and the encryption file by encryption is converted into unreadable file, is added to realize to file
It is close;The decryption functional unit calls the encryption relationship to generate component and then imports the encryption relationship in mobile USB flash disk, is added
The file of encryption is converted into the complete file that can be read by close inverse operation.
The method of the present invention includes following steps: the first step, logging request, and user logs in system by login function unit
System, the user name of login function unit access database and password verify user identity.
Second step, file encryption, user issue the request of encryption file, encryption function cell call to encryption function unit
Encryption relationship generates component and encrypts to file, and generates encryption relationship and then export to encrypt and be related to encryption relationship
Output precision encrypts relationship output precision for encryption relationship and imported into transport function;Transport function is into database
Downloadable encryption relationship is written, user downloads encryption and is related in mobile USB flash disk, and the encryption that database removes backup automatically is closed
System.
Third step, file decryption, user issue the request of decryption file to decryption functional unit, and decryption functional unit calls
Encryption relationship generates component and conveys decoding request, and encryption relationship is imported into encryption relationship generation group out of mobile USB flash disk by user
Part, encryption relationship generate component to file decryption.
The encryption relationship generates component and encrypts specifically to file, and encryption relationship generates component acquisition and needs
All characters of file are encrypted, encryption relationship generates component and each character is converted to a random coding and storage
The mapping relations of above-mentioned conversion are " encryption relationship ", encryption relationship generate component will need to encrypt each character of file according to
Encryption relational format is converted to corresponding encoded and completes encryption.
The encryption relationship generates component, and encryption relationship generates component and obtains
The encryption relationship of importing, encryption relationship, which generates component, will need the file decrypted to be changed to random coded reversion according to encryption relationship
Respective symbols complete decryption.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature
Case is realized.Embodiment disclosed above, in all respects are merely illustrative, not the only.It is all this
It is included in the invention in invention scope or in the change being equal in the scope of the present invention.
Claims (3)
1. a kind of electric bidding document multilayer encipher-decipher method for e-bidding, which comprises the steps of:
The first step, logging request, user pass through login function unit login system, the user of login function unit access database
Name and password verify user identity;
Second step, file encryption, user issue the request of encryption file, the encryption of encryption function cell call to encryption function unit
Relationship generates component and encrypts to file, and generates encryption relationship and then export to encrypt and be related to the output of encryption relationship
Component encrypts relationship output precision for encryption relationship and imported into transport function;Transport function is written into database
Downloadable encryption relationship, user download encryption and are related in mobile USB flash disk, and database removes the encryption relationship of backup automatically;
Third step, file decryption, user issue the request of decryption file to decryption functional unit, and decryption functional unit calls encryption
Relationship generates component and conveys decoding request, and encryption relationship is imported into encryption relationship out of mobile USB flash disk and generates component by user, adds
Close relationship generates component to file decryption.
2. a kind of electric bidding document multilayer encipher-decipher method for e-bidding according to claim 1, feature exist
In the encryption relationship generation component encrypts specifically file, and encryption relationship generates component acquisition and needs to add
All characters of ciphertext part, encryption relationship generate component and each character are converted to a random coding and is stored above-mentioned
The mapping relations of conversion are " encryption relationship ", and encryption relationship, which generates component, will need to encrypt each character of file according to encryption
Relational format is converted to corresponding encoded and completes encryption.
3. a kind of electric bidding document multilayer encipher-decipher method for e-bidding according to claim 1, feature exist
In the encryption relationship generates component and is specifically to the operation that file is decrypted, and encryption relationship generates component and imported
Encryption relationship, encryption relationship generates component, and that the file decrypted will be needed to be changed to random coded reversion according to encryption relationship will be corresponding
Character completes decryption.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810750703.4A CN108959946A (en) | 2018-07-10 | 2018-07-10 | Electric bidding document multilayer encipher-decipher method for e-bidding |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810750703.4A CN108959946A (en) | 2018-07-10 | 2018-07-10 | Electric bidding document multilayer encipher-decipher method for e-bidding |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN108959946A true CN108959946A (en) | 2018-12-07 |
Family
ID=64483603
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810750703.4A Pending CN108959946A (en) | 2018-07-10 | 2018-07-10 | Electric bidding document multilayer encipher-decipher method for e-bidding |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108959946A (en) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6363365B1 (en) * | 1998-05-12 | 2002-03-26 | International Business Machines Corp. | Mechanism for secure tendering in an open electronic network |
| CN103532708A (en) * | 2013-08-14 | 2014-01-22 | 南通腾启电子商务有限公司 | Computer hardware encryption method of encrypting data through combining hardware |
| CN103795523A (en) * | 2014-01-14 | 2014-05-14 | 福州市勘测院 | Electronic bid document multi-layer encryption and decryption system and method for electronic bidding |
| CN105790940A (en) * | 2016-04-14 | 2016-07-20 | 广东省电子商务认证有限公司 | Electronic bid-inviting and bidding system and method based on Shamir threshold |
| CN106027234A (en) * | 2016-05-12 | 2016-10-12 | 山东渔翁信息技术股份有限公司 | Key protection method |
| CN106603233A (en) * | 2017-01-04 | 2017-04-26 | 顾建明 | Encryption and decryption method for remote bid opening type bidding system |
-
2018
- 2018-07-10 CN CN201810750703.4A patent/CN108959946A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6363365B1 (en) * | 1998-05-12 | 2002-03-26 | International Business Machines Corp. | Mechanism for secure tendering in an open electronic network |
| CN103532708A (en) * | 2013-08-14 | 2014-01-22 | 南通腾启电子商务有限公司 | Computer hardware encryption method of encrypting data through combining hardware |
| CN103795523A (en) * | 2014-01-14 | 2014-05-14 | 福州市勘测院 | Electronic bid document multi-layer encryption and decryption system and method for electronic bidding |
| CN105790940A (en) * | 2016-04-14 | 2016-07-20 | 广东省电子商务认证有限公司 | Electronic bid-inviting and bidding system and method based on Shamir threshold |
| CN106027234A (en) * | 2016-05-12 | 2016-10-12 | 山东渔翁信息技术股份有限公司 | Key protection method |
| CN106603233A (en) * | 2017-01-04 | 2017-04-26 | 顾建明 | Encryption and decryption method for remote bid opening type bidding system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12069038B2 (en) | Encryption and decryption techniques using shuffle function | |
| CN102196425B (en) | Quantum-key-distribution-network-based mobile encryption system and communication method thereof | |
| CN102638568B (en) | Cloud storage system and data managing method thereof | |
| CN106067874B (en) | It is a kind of by the method for data record to server end, terminal and server | |
| CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
| CN110365468B (en) | Anonymization processing method, device, equipment and storage medium | |
| CN111625852B (en) | Electronic signature method based on document and user private key under hybrid cloud architecture | |
| CN104809407A (en) | Method and system for encrypting, decrypting and verifying cloud storage front end data | |
| US20140237252A1 (en) | Techniques for validating data exchange | |
| CN104660551A (en) | Webservice-based database access device and method | |
| CN105025102A (en) | A network storage calling method and storage system for 3D printing model files | |
| CN106919348A (en) | Distributed memory system and storage method that anti-violence is cracked | |
| CN103312690A (en) | System and method for key management of cloud computing platform | |
| CN103139143B (en) | The method of digital copyright management, system and server | |
| CN112528309A (en) | Data storage encryption and decryption method and device | |
| CN107092815A (en) | The method and server of a kind of protection module file | |
| CN113259438A (en) | Method and device for sending model file and method and device for receiving model file | |
| CN109033811A (en) | Electric bidding document multilayer encrypting and deciphering system for e-bidding | |
| CN105847261B (en) | A kind of electronic signature method based on the wireless encryption and decryption of bluetooth | |
| CN103838986A (en) | Multimedia file encryption method and device | |
| CN116702171B (en) | A method for encrypting user privacy data on an Internet e-commerce platform | |
| CN108959946A (en) | Electric bidding document multilayer encipher-decipher method for e-bidding | |
| CN116760608A (en) | Data message processing method, system, computer equipment, storage medium | |
| CN103929722A (en) | Short message encryption method and system | |
| CN116089980A (en) | OFD document sensitive information encryption and decryption method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |