Bidding method based on hierarchical deterministic cryptography

A cryptographic and deterministic technology, applied in the network field, it can solve the problem that the private key cannot be cracked by any public key, and achieve the effect of proper generation and storage, improving security transmission and ensuring security.

Active Publication Date: 2018-12-18
JIANGSU TIANYUAN TENERING CO LTD
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, the HD hierarchical key generation technology widely used in the blockchain (to solve the problem that the private key is not online, it is only generated when it is used) is used in the encryption and decryption of bidding documents: on the one hand, the public key can provide n One key to ensure that each company uses a different key for encryption, and one-to-one corresponding private keys are used to decrypt one by one when decrypting, which solves the risk of all bidding documents being stolen due to the theft of a private key, and also The corresponding private key cannot be deciphered by any public key, which greatly improves the security of the bidding document transmission process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidding method based on hierarchical deterministic cryptography
  • Bidding method based on hierarchical deterministic cryptography
  • Bidding method based on hierarchical deterministic cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] First, the third-party notary office uses a key generation tool based on HD technology to generate the root private key k, specifically including three steps:

[0039] Step 1: The third-party notary uses a key generation tool to randomly generate a mnemonic. Here we use BIP39Mnemonic. The BIP39 standard is to solve the demand for mnemonic by randomly generating 12-24 easy-to-remember words , the word sequence creates a random seed as the seed of BIP32 through the PBKDF2 and HMAC-SHA512 functions, and the steps are as follows:

[0040] First generate a random sequence (entropy) with a length of 128-256 bits (bits), then take the first n bits after the entropy hash as the checksum (n=entropy length / 32), take the random sequence + checksum, The obtained result is cut every 11 bits, and then each 11-bit byte is matched with a word in the thesaurus, and the final result is the mnemonic string.

[0041]For example, the mnemonic string we got is: "length energy hip enough set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network technology, in particular to a bidding method based on cryptography technology. By introducing a layered certainty technology, the invention realizes proper generation and storage of an encryption key of a bidding document, and improves the safe transmission of an electronic bidding document under a cloud storage mode. Ensure that the sub-public key can be directly decentralized by the public key without the participation of the private key, and that the decentralized sub-public key can be authenticated by the decentralized child private key. Furthermore, the sub-public key is generated and distributed to the independent bidder when bidding, and the sub-private key is generated again when bidding is opened. The delay of time improves the security of the private key and ensures the trustworthiness of the private key storage, which greatly improves the public credibility of the bidder. At the same time, the disclosure of any private key can not lead to inferring of the root private key, which ensures the security of the whole encrypted file.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a bidding method based on hierarchical deterministic cryptographic technology (Hierarchical Deterministic, hereinafter referred to as HD technology). Background technique [0002] Bidding (Submission of Tender) refers to the behavior of the bidder (seller) submitting to the tenderee within the specified time limit at the invitation of the tenderee, according to the conditions stipulated in the tender notice or tender form. At present, most national government agencies and public utilities purchase equipment, materials and daily necessities through bidding. Bidding is also often used when conducting resource exploration, developing mineral deposits or attracting investment to undertake construction projects. [0003] In the traditional bidding process, bidders need to prepare bidding documents offline and go to the site to bid. With the development of computer network t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L29/06H04L9/14H04L9/08G06Q30/08
CPCG06Q30/08H04L9/0863H04L9/0894H04L9/14H04L9/3066H04L63/0428H04L63/0442
Inventor 丁漫江韩小山李天昊汪亦星黄娟娟汤笑周若璇曹楷王健仇敬宜
Owner JIANGSU TIANYUAN TENERING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products