Remote-authorization-based bidding document encryption and decryption method

A remote authorization and bidding technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve security and efficiency problems, slow encryption and decryption speed, inconvenient management and other problems, and achieve fast data transmission speed , Guarantee safety, good safety effect

Active Publication Date: 2012-09-12
SICHUAN CONSTR NETWORK
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Simply using symmetric algorithm encryption is not safe and easy to be cracked; purely using asymmetric algorithm keys, the speed of encryption and decryption is slow, and it is not easy to manage during use
Since the asymmetric algorithm needs to provide a private key for decryption, it often requires the user to provide the private key on site to complete the decryption, which brings security and efficiency problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote-authorization-based bidding document encryption and decryption method
  • Remote-authorization-based bidding document encryption and decryption method
  • Remote-authorization-based bidding document encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment 1: Symmetrical algorithm + asymmetrical algorithm

[0051] In this embodiment, a combination of a symmetric algorithm and an asymmetric algorithm is adopted, wherein the primary encryption (encryption of bidding documents) adopts a symmetric algorithm, and the secondary encryption (encryption of a file encryption key) adopts an asymmetric algorithm. Its purpose is to enable users to authorize other trusted people to decrypt without providing a private key, so that the decryption of encrypted documents such as bidding does not require the user to provide a remote decryption method with a private key, thereby providing efficiency and ensuring file security. The following Described further.

[0052] see figure 1 , represents a sequence diagram of a method for encrypting and decrypting bidding documents based on remote authorization according to an embodiment of the present invention. In this embodiment, the encryption and decryption method of bidding documents...

Embodiment 2

[0075] Embodiment 2: Symmetric Algorithm + Symmetric Algorithm

[0076] In this embodiment, a combination of a symmetric algorithm and a symmetric algorithm is adopted, wherein both the primary encryption and the secondary encryption use a symmetric algorithm, and the specific methods are as follows.

[0077] see figure 2 , represents a sequence diagram of the remote authorization-based encryption and decryption method for bidding documents according to Embodiment 2 of the present invention. This embodiment specifically comprises the following steps:

[0078] 201. The encryption terminal encrypts the bidding documents once with a symmetric algorithm;

[0079] 202. The encryption end performs secondary encryption on the primary encryption symmetric key with a symmetric algorithm;

[0080] 203. The encryption terminal transmits the encrypted bidding documents once to the decryption terminal;

[0081] 204. When the specified time is reached, the primary encryption symmetric ...

Embodiment 3

[0084] Embodiment 3: Asymmetric Algorithm + Symmetric Algorithm

[0085] In this embodiment, a combination of an asymmetric algorithm and a symmetric algorithm is adopted, wherein the primary encryption is an asymmetric algorithm, and the secondary encryption is a symmetric algorithm. The specific methods are as follows.

[0086] see image 3 , showing a sequence diagram of the method for encrypting and decrypting bidding documents based on remote authorization in Embodiment 3 of the present invention. This embodiment specifically comprises the following steps:

[0087] 301. The encryption end encrypts the bidding documents once with an asymmetric algorithm;

[0088] 302. The encryption end performs secondary encryption on the primary encrypted asymmetric private key with a symmetric algorithm;

[0089] 303. The encryption end transmits the once-encrypted bidding documents and the once-encrypted asymmetric public key to the decryption end;

[0090] 304. When the specified ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a computer information security technology, and particularly discloses a remote-authorization-based bidding document encryption and decryption method, which comprises the following steps that: an encryptor primarily encrypts a bidding document; the encryptor secondarily encrypts a primary encryption key; the encryptor transmits the primarily encrypted bidding document to a decryptor; the encryptor transmits the primary encryption key decrypted by a secondary encryption key to the decryptor when specified time is reached; and the decryptor decrypts the bidding document according to the decrypted primary encryption symmetric key. The encryption key is secondarily encrypted when the bidding document is primarily encrypted, so that the remote authorization decryption of the bidding document can be facilitated, the security of the bidding document can be ensured, and the decryption efficiency of the bidding document can be improved.

Description

technical field [0001] The invention relates to computer information security technology, in particular to a method for encrypting and decrypting bidding documents based on remote authorization, which can help improve the decryption efficiency of bidding documents and greatly improve the security of bidding document data. Background technique [0002] Existing electronic information systems generally need to protect sensitive data, specifically by using a certain encryption method for encryption. The basic process of data encryption is to process the original plaintext file or data according to a certain encryption and decryption algorithm, making it an unreadable piece of code, usually called "ciphertext", so that it can only be read after entering the corresponding key. Only then can the original content be displayed, and the purpose of protecting the data from being stolen and read by illegal persons can be achieved through this method; the reverse process of the encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王文印泽斌卜献文甘朝晖徐松邓秀兵丁文彭绍全张云德
Owner SICHUAN CONSTR NETWORK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products