[go: up one dir, main page]

CN108959946A - Electric bidding document multilayer encipher-decipher method for e-bidding - Google Patents

Electric bidding document multilayer encipher-decipher method for e-bidding Download PDF

Info

Publication number
CN108959946A
CN108959946A CN201810750703.4A CN201810750703A CN108959946A CN 108959946 A CN108959946 A CN 108959946A CN 201810750703 A CN201810750703 A CN 201810750703A CN 108959946 A CN108959946 A CN 108959946A
Authority
CN
China
Prior art keywords
encryption
relationship
file
encryption relationship
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810750703.4A
Other languages
Chinese (zh)
Inventor
林小丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810750703.4A priority Critical patent/CN108959946A/en
Publication of CN108959946A publication Critical patent/CN108959946A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of electric bidding document multilayer encipher-decipher method for e-bidding, the method includes the steps: user passes through login function unit login system;Encryption function cell call encryption relationship generates component and encrypts to file, and generates encryption relationship, and encryption relationship imports in mobile USB flash disk;Encryption relationship is imported into encryption relationship out of mobile USB flash disk and generates component, encryption relationship generates component to file decryption.This technology realizes the effect of multi-layer security using more one layer of encryption that random cryptographic relationship is substantially to file in simple encryption flow.

Description

Electric bidding document multilayer encipher-decipher method for e-bidding
Technical field
The present invention relates to field of encryption, especially a kind of electric bidding document multilayer encipher-decipher method for e-bidding.
Background technique
Be much in traditional encryption and decryption technology based on Cryptography Principles by specific file according to fixed mathematical function into Row conversion is to realize encryption, and the regularity of fixed mathematical function is stronger, and the informational of industry is also easy to more by force pass through General rule is cracked, and the electric bidding document of e-bidding belongs to classified papers, very high to security requirements.
Summary of the invention
The technical solution adopted by the present invention to solve the technical problems is:
Electric bidding document multilayer encipher-decipher method for e-bidding of the invention, includes the following steps: the first step, steps on Record request, user by login function unit login system, test by the user name of login function unit access database and password Demonstrate,prove user identity;Second step, file encryption, user issue the request of encryption file, encryption function unit to encryption function unit It calls encryption relationship to generate component to encrypt file, and generates encryption relationship and then export to encrypt and be related to encryption Relationship output precision encrypts relationship output precision for encryption relationship and imported into transport function;Transport function is to data Downloadable encryption relationship is written in library, user downloads encryption and is related in mobile USB flash disk, and database removes the encryption of backup automatically Relationship;Third step, file decryption, user issue the request of decryption file to functional unit is decrypted, and decryption functional unit, which calls, to be added Close relationship generates component and conveys decoding request, and encryption relationship is imported into encryption relationship out of mobile USB flash disk and generates component by user, Encryption relationship generates component to file decryption.
Further, the encryption relationship generates component and encrypts specifically to file, encrypts relationship generation group Part acquires all characters for needing to encrypt file, and encryption relationship generates component and each character is converted to a random coding And the mapping relations for storing above-mentioned conversion are " encryption relationship ", encryption relationship generate component by need to encrypt file each Character is converted to corresponding encoded according to encryption relational format and completes encryption.
Further, it is specifically that encryption relationship is generated to the operation that file is decrypted that the encryption relationship, which generates component, Component obtains the encryption relationship imported, and encryption relationship, which generates component, will need the file decrypted according to encryption relationship by random coded Reversion is changed to respective symbols and completes decryption.
The invention has the advantages that when carrying out encryption and decryption using the encryption relationship being randomly generated in the technical program, And by encryption relationship and file physical isolation, though obtain encrypted file under conditions of no encryption relationship still without Method cracks, using more one layer of encryption that random cryptographic relationship is substantially to file in the technical program, in simple encryption stream The effect of multi-layer security is realized in journey.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of system framework in the present invention.
Specific embodiment
In the embodiment shown in fig. 1, system of the invention includes: database, is used for storage user name and password, also uses In temporarily storage encryption relationship and user is supported to download encryption relationship login function unit, for the user name according to database And password authentification user's identity;Transport function is also used for Downloadable encryption relationship to be written into the database In receiving and forwarding user's operation request;Encryption function unit carries out file for calling the encryption relationship to generate component Encipherment protection, for calling the export encryption of encryption relationship output precision to be related to transport function;Functional unit is decrypted, is used for It calls the encryption relationship to generate component the file after encipherment protection is decrypted to release the protection to file;Encryption relationship Generate component, for generating random encryption relationship, and using random encryption relationship to specified file carry out conversion plus It is close;Be also used to specified encryption file be carried out by the encryption relationship of importing the decryption of inverse transform;Encryption relationship output precision, Transport function is exported to for the relationship of encryption to be generated the encryption relationship that component generates.
The login function unit is used to pass through data when transport function needs are connect with Database The user name in library and password verify the identity of user;The transport function is connect with the Database information, And under the encryption relationship that encryption relationship generates component generation is temporarily uploaded to database and supports user out of described database Carry encryption relationship;The encryption relationship of user's downloading is stored in the mobile USB flash disk completely cut off with database physical;The encryption function list Encryption relationship described in metacall generates component and generates a random encryption relationship, then according to random encryption relationship to needs The file of encryption is encrypted, and the encryption file by encryption is converted into unreadable file, is added to realize to file It is close;The decryption functional unit calls the encryption relationship to generate component and then imports the encryption relationship in mobile USB flash disk, is added The file of encryption is converted into the complete file that can be read by close inverse operation.
The method of the present invention includes following steps: the first step, logging request, and user logs in system by login function unit System, the user name of login function unit access database and password verify user identity.
Second step, file encryption, user issue the request of encryption file, encryption function cell call to encryption function unit Encryption relationship generates component and encrypts to file, and generates encryption relationship and then export to encrypt and be related to encryption relationship Output precision encrypts relationship output precision for encryption relationship and imported into transport function;Transport function is into database Downloadable encryption relationship is written, user downloads encryption and is related in mobile USB flash disk, and the encryption that database removes backup automatically is closed System.
Third step, file decryption, user issue the request of decryption file to decryption functional unit, and decryption functional unit calls Encryption relationship generates component and conveys decoding request, and encryption relationship is imported into encryption relationship generation group out of mobile USB flash disk by user Part, encryption relationship generate component to file decryption.
The encryption relationship generates component and encrypts specifically to file, and encryption relationship generates component acquisition and needs All characters of file are encrypted, encryption relationship generates component and each character is converted to a random coding and storage The mapping relations of above-mentioned conversion are " encryption relationship ", encryption relationship generate component will need to encrypt each character of file according to Encryption relational format is converted to corresponding encoded and completes encryption.
The encryption relationship generates component, and encryption relationship generates component and obtains The encryption relationship of importing, encryption relationship, which generates component, will need the file decrypted to be changed to random coded reversion according to encryption relationship Respective symbols complete decryption.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature Case is realized.Embodiment disclosed above, in all respects are merely illustrative, not the only.It is all this It is included in the invention in invention scope or in the change being equal in the scope of the present invention.

Claims (3)

1. a kind of electric bidding document multilayer encipher-decipher method for e-bidding, which comprises the steps of:
The first step, logging request, user pass through login function unit login system, the user of login function unit access database Name and password verify user identity;
Second step, file encryption, user issue the request of encryption file, the encryption of encryption function cell call to encryption function unit Relationship generates component and encrypts to file, and generates encryption relationship and then export to encrypt and be related to the output of encryption relationship Component encrypts relationship output precision for encryption relationship and imported into transport function;Transport function is written into database Downloadable encryption relationship, user download encryption and are related in mobile USB flash disk, and database removes the encryption relationship of backup automatically;
Third step, file decryption, user issue the request of decryption file to decryption functional unit, and decryption functional unit calls encryption Relationship generates component and conveys decoding request, and encryption relationship is imported into encryption relationship out of mobile USB flash disk and generates component by user, adds Close relationship generates component to file decryption.
2. a kind of electric bidding document multilayer encipher-decipher method for e-bidding according to claim 1, feature exist In the encryption relationship generation component encrypts specifically file, and encryption relationship generates component acquisition and needs to add All characters of ciphertext part, encryption relationship generate component and each character are converted to a random coding and is stored above-mentioned The mapping relations of conversion are " encryption relationship ", and encryption relationship, which generates component, will need to encrypt each character of file according to encryption Relational format is converted to corresponding encoded and completes encryption.
3. a kind of electric bidding document multilayer encipher-decipher method for e-bidding according to claim 1, feature exist In the encryption relationship generates component and is specifically to the operation that file is decrypted, and encryption relationship generates component and imported Encryption relationship, encryption relationship generates component, and that the file decrypted will be needed to be changed to random coded reversion according to encryption relationship will be corresponding Character completes decryption.
CN201810750703.4A 2018-07-10 2018-07-10 Electric bidding document multilayer encipher-decipher method for e-bidding Pending CN108959946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810750703.4A CN108959946A (en) 2018-07-10 2018-07-10 Electric bidding document multilayer encipher-decipher method for e-bidding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810750703.4A CN108959946A (en) 2018-07-10 2018-07-10 Electric bidding document multilayer encipher-decipher method for e-bidding

Publications (1)

Publication Number Publication Date
CN108959946A true CN108959946A (en) 2018-12-07

Family

ID=64483603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810750703.4A Pending CN108959946A (en) 2018-07-10 2018-07-10 Electric bidding document multilayer encipher-decipher method for e-bidding

Country Status (1)

Country Link
CN (1) CN108959946A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6363365B1 (en) * 1998-05-12 2002-03-26 International Business Machines Corp. Mechanism for secure tendering in an open electronic network
CN103532708A (en) * 2013-08-14 2014-01-22 南通腾启电子商务有限公司 Computer hardware encryption method of encrypting data through combining hardware
CN103795523A (en) * 2014-01-14 2014-05-14 福州市勘测院 Electronic bid document multi-layer encryption and decryption system and method for electronic bidding
CN105790940A (en) * 2016-04-14 2016-07-20 广东省电子商务认证有限公司 Electronic bid-inviting and bidding system and method based on Shamir threshold
CN106027234A (en) * 2016-05-12 2016-10-12 山东渔翁信息技术股份有限公司 Key protection method
CN106603233A (en) * 2017-01-04 2017-04-26 顾建明 Encryption and decryption method for remote bid opening type bidding system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6363365B1 (en) * 1998-05-12 2002-03-26 International Business Machines Corp. Mechanism for secure tendering in an open electronic network
CN103532708A (en) * 2013-08-14 2014-01-22 南通腾启电子商务有限公司 Computer hardware encryption method of encrypting data through combining hardware
CN103795523A (en) * 2014-01-14 2014-05-14 福州市勘测院 Electronic bid document multi-layer encryption and decryption system and method for electronic bidding
CN105790940A (en) * 2016-04-14 2016-07-20 广东省电子商务认证有限公司 Electronic bid-inviting and bidding system and method based on Shamir threshold
CN106027234A (en) * 2016-05-12 2016-10-12 山东渔翁信息技术股份有限公司 Key protection method
CN106603233A (en) * 2017-01-04 2017-04-26 顾建明 Encryption and decryption method for remote bid opening type bidding system

Similar Documents

Publication Publication Date Title
US12069038B2 (en) Encryption and decryption techniques using shuffle function
CN102196425B (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN102638568B (en) Cloud storage system and data managing method thereof
CN106067874B (en) It is a kind of by the method for data record to server end, terminal and server
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN110365468B (en) Anonymization processing method, device, equipment and storage medium
CN111625852B (en) Electronic signature method based on document and user private key under hybrid cloud architecture
CN104809407A (en) Method and system for encrypting, decrypting and verifying cloud storage front end data
US20140237252A1 (en) Techniques for validating data exchange
CN104660551A (en) Webservice-based database access device and method
CN105025102A (en) A network storage calling method and storage system for 3D printing model files
CN106919348A (en) Distributed memory system and storage method that anti-violence is cracked
CN103312690A (en) System and method for key management of cloud computing platform
CN103139143B (en) The method of digital copyright management, system and server
CN112528309A (en) Data storage encryption and decryption method and device
CN107092815A (en) The method and server of a kind of protection module file
CN113259438A (en) Method and device for sending model file and method and device for receiving model file
CN109033811A (en) Electric bidding document multilayer encrypting and deciphering system for e-bidding
CN105847261B (en) A kind of electronic signature method based on the wireless encryption and decryption of bluetooth
CN103838986A (en) Multimedia file encryption method and device
CN116702171B (en) A method for encrypting user privacy data on an Internet e-commerce platform
CN108959946A (en) Electric bidding document multilayer encipher-decipher method for e-bidding
CN116760608A (en) Data message processing method, system, computer equipment, storage medium
CN103929722A (en) Short message encryption method and system
CN116089980A (en) OFD document sensitive information encryption and decryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination