Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File decryption method and device

A file and to-be-decrypted technology, applied in the field of data processing, can solve the problems of high labor cost, waste of resources, and long bid opening process, and achieve the effect of improving the efficiency of file decryption

Inactive Publication Date: 2016-08-10
BEIJING GUODIANTONG NETWORK TECH CO LTD +2
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the bid opening process, suppliers need to line up on site to insert and remove electronic keys, and decrypt all bidding documents through the client in turn, which will take up a lot of time only to decrypt the bidding documents, resulting in a long bid opening process, waste of resources, and high labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File decryption method and device
  • File decryption method and device
  • File decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] When entering the bid opening link, the bidding documents of all suppliers must be decrypted one by one. Once you encounter a bidding project with a relatively large amount, there will be many suppliers participating in the bidding. Some bidding projects often have as many as thousands of suppliers. As many suppliers as there are, you need to insert the electroni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a file decryption method and device. A secret key used for decryption is pre-stored in a secret key set configured in a decryption server. The decryption server can schedule the secret key of a file to be decrypted from the secret key set according to the file identifier of the file to be decrypted when the batch file decryption process is performed in the bid opening link, and the file to be decrypted is decrypted so that file decryption of the bid opening link does not depend on participation of client sides, unified file decryption is performed through the decryption server directly and thus the file decryption efficiency of the bid opening link can be greatly enhanced.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a file decryption method and device. Background technique [0002] In the traditional bidding process, suppliers will provide corresponding bidding documents. The bidding documents are encrypted files, and the bidding documents can only be decrypted when entering the bid opening link. [0003] When it is necessary to decrypt the bidding documents, the traditional method is that the supplier inserts the electronic key on the client side, obtains the key after passing the verification on the server side, and then the supplier enters the electronic key password on the client side again, calls the supplier’s private key, Decrypt the encryption key, and then use the decrypted key to decrypt the tender document on the server side. It can be seen that the decryption of a bidding document requires the supplier to plug and unplug the electronic key several times. [0004] Generally speak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/06H04L63/0428H04L63/065H04L63/083
Inventor 杨树文爱军熊力程华福董爱强燕鹏凌智王伟
Owner BEIJING GUODIANTONG NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products