Method for coping with bidding decryption failure and capable of proving consistency of bidding files
A consistent and document-based technology, applied in the field of information security, can solve problems such as inconvenient offline bid opening, inconsistent electronic trends, easy leaks, etc., and achieve the effect of promoting openness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0051] A method of provably conforming to bid documents in response to bid decryption failures, comprising:
[0052] Making tender documents:
[0053] (1) The bidding software packs the original bidding file into a ZIP file, which is recorded as Fzip=ZIP(File1,...,FileN), and calculates the HASH value of Fzip, which is recorded as H1=HASH(Fzip);
[0054] (2) The bidding software uses the private key SignCert_PriKey of the bidder's signature certificate to sign H1, and obtain the signature value S1=Sign(SignCert_PriKey, H1);
[0055] (3) The standard making software stamps the time stamp of the third-party CA institution on the signature value S1, and obtains the time stamp T1=TsaSign(S1);
[0056] (4) The standard making software combines the values (H1, S1, T1) generated in steps (1)-(3) to generate Fzip’s additional signature file Fsign=H1+S1+T1;
[0057] (5) The standard making software calculates the HASH value for Fsign, and obtains H2=HASH(Fsign);
[0058] (6) The b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


