Electronic bidding document multilayer encryption and decryption system for electronic bidding

A bidding, encryption and decryption technology, which is applied in the fields of electrical digital data processing, instruments, digital data protection, etc., can solve the problem of low difficulty for hackers to crack, and achieve the effect of ensuring storage security, improving security, and reducing possibility

Pending Publication Date: 2022-04-22
山东标书易信息技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is: the existing encryption and decryption system for electronic bidding documents does not have the function of overall defense and encryption for all encrypted files, and the retrieval code and key are stored in the same way, so it is very difficult for hackers to crack The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic bidding document multilayer encryption and decryption system for electronic bidding
  • Electronic bidding document multilayer encryption and decryption system for electronic bidding
  • Electronic bidding document multilayer encryption and decryption system for electronic bidding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 2 As shown, the user uploads the electronic bidding document file to be encrypted to the encryption module through the upload module, and the encryption module encrypts the electronic bidding document file after receiving the electronic bidding document file: mark the electronic bidding document file to be encrypted as a processing file, and obtain the processing file Complete pinyin of the first character of the name and mark the first letter as the initial letter A1, obtain the full pinyin of the last word of the processed file name and mark the last letter as the last letter A2, and obtain the total number of characters in the processed file name And mark it as the number of characters B1, get the memory value of the processed file, the unit is Mb, perform octal conversion on the memory value and round the obtained value, mark the obtained value as the memory performance value C1, and generate a call in the form of A-B-C Code fetching, where A is the comb...

Embodiment 2

[0042] see image 3 As shown, the risk monitoring module is used to monitor and analyze the risk of file retrieval: the number of times the retrieval personnel enters the retrieval code is marked as DC, the number of times the retrieval module receives a first-level failure signal is marked as YS, and the retrieval The number of times that the fetching module receives the second-level failure signal is marked as ES, and the number of times that the calling module receives the third-level failure signal is marked as SS. It is obtained by the formula FX=α1×DC+α2×YS+α3×ES+α4×SS The risk coefficient FX retrieved from the file, where α1, α2, α3, and α4 are all proportional coefficients, and α1>α2>α3>α4>0; obtain the risk threshold FXmax through the storage module, and compare the risk coefficient FX with the risk threshold FXmax Comparison: If the risk coefficient FX is less than the risk threshold FXmax, it is determined that the file retrieval is safe, and the risk monitoring mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of electronic bidding, relates to a data encryption technology, and is used for solving the problems that an encryption and decryption system for an electronic bidding document does not have a function of carrying out integral defense encryption on all encrypted files, the storage modes of a calling code and a secret key are the same, and the difficulty is very small when a hacker cracks the encryption and decryption system. The electronic bidding document multilayer encryption and decryption system comprises a server, the server is in communication connection with an encryption module, a decryption module, a storage module, a calling module and a risk monitoring module, and the encryption module is in communication connection with an uploading module; parameters of the encrypted files are analyzed through the encryption module, the calling codes are generated, the encrypted files are stored in the storage module, the calling codes need to be input through the calling module when the files are extracted, and the calling codes of all the encrypted files in the storage module can form an integral defense wall. And all encrypted files in the storage module can be defended and protected.

Description

technical field [0001] The invention belongs to the field of electronic bidding and relates to data encryption technology, in particular to a multi-layer encryption and decryption system of electronic bidding documents for electronic bidding. Background technique [0002] Data encryption is a technology with a long history. It refers to converting plaintext into ciphertext through encryption algorithm and encryption key, and decryption is to restore ciphertext to plaintext through decryption algorithm and decryption key. Its core is cryptography . [0003] When the existing encryption and decryption systems for electronic bidding documents are encrypted, they only have an encryption effect on the file itself, but do not have the function of overall defense encryption for all encrypted files, and the retrieval code and key are stored in the same way, which is easy for hackers to crack The difficulty is small. [0004] To this end, we propose a multi-layer encryption and dec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218G06F2221/2107
Inventor 鲍文博
Owner 山东标书易信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products