Quotation file privacy protection method and system
A privacy protection and file technology, applied in the field of data encryption and decryption, can solve the problems of easy cracking and poor data security, and achieve the effect of improving user experience, improving confidentiality performance, and overcoming easy cracking.
Active Publication Date: 2022-07-08
北京信锚网络有限公司
6 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The quotation file privacy protection method comprises the following steps: encrypting file content and address content of a storage address of a quotation file by using a public key, and setting decryption time; after the decryption time is up, starting a private key to obtain a storage path of a bidding item corresponding to the quotation file, and assigning the storage path of the bidding item to a storage address; and calling the storage path, obtaining the quotation file, and obtaining the file content by using the private key. Double encryption of addresses and contents is carried out on the quotation file, so that the secrecy performance of quotation data of a bidder is improved; besides, the address content in the storage address is a dynamic address and is assigned after decryption, so that the defect of easy cracking in the prior art is overcome, and the use experience of the user is further improved.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Waterproof plug pulling alarm mechanism and mobile terminal thereof
InactiveCN109427183AEasy to operateImprove security performanceAlarmsTelephone set constructionsElectricityUser needs
Owner:ZTE CORP
Time-sharing control multi-party server certificate verification method and system
Owner:武汉长江计算科技有限公司
Transformer substation intelligent identification system
PendingCN112700573ASimple structureImprove security performanceIndividual entry/exit registersBurglar alarmTransformerData bank
Owner:ZIYANG POWER SUPPLY COMPANY STATE GRID SICHUAN ELECTRIC POWER
Structure-adjustable recognition camera device for elevator
InactiveCN114508682AImprove security performanceHigh degree of intelligenceTelevision system detailsLighting elementsSurveillance cameraCar door
Owner:苏州飞易智能系统有限公司
Intelligent wardrobe and control method thereof
InactiveCN111568058AHigh degree of intelligenceImprove security performanceWardrobesLavatory sanitoryFacial recognition systemMechanical engineering
Owner:北京博纳菲德科技有限公司
Classification and recommendation of technical efficacy words
- Improve security performance
- Overcoming easy to crack
Indoor camera shooting monitoring system based on pyroelectric sensing detection
InactiveCN104159074AImprove security performanceAvoid influenceClosed circuit television systemsEngineeringSignal processing
Owner:SUZHOU HAOFENG ENVIRONMENTAL PROTECTION SCI &TECH
Ocean towed line array three-wing positioning device and positioning method
InactiveCN102637039AImprove security performancePosition/course control in three dimensionsAerospace engineeringPressure sensor
Owner:710TH RES INST OF CHINA SHIPBUILDING IND CORP
Security protection cover for numerical control cutting machine
InactiveCN102699755AImprove security performanceReduce the spread of noiseMaintainance and safety accessoriesEngineeringNumerical control
Owner:苏州赛特尔集团机械有限公司
Electronic lock with double-motor structure
ActiveCN104481280AImprove security performanceImprove safety performanceNon-mechanical controlsClutchControl theory
Owner:广东德瑞智能科技有限公司
Lithium battery having fire-proof and explosion-proof device and electrical vehicle equipped with same
ActiveCN104218202AImprove security performanceReduce security risksFire rescueSecondary cell gas removalAutomotive engineeringElectric cars
Owner:ZHEJIANG CHAOWEI CHUANGYUAN INDUSTRAIAL