Quotation file privacy protection method and system

A privacy protection and file technology, applied in the field of data encryption and decryption, can solve the problems of easy cracking and poor data security, and achieve the effect of improving user experience, improving confidentiality performance, and overcoming easy cracking.

Active Publication Date: 2022-07-08
北京信锚网络有限公司
6 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] However, using encryption methods such as CA digital certificates and U-shields is to packa...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In some embodiments, the storage address is a fixed location, after the address content of the storage address is encrypted, the address content in the storage address is cleared, that is, the built-in content in the storage address is blank, which overcomes the prior art The disadvantages that are easy to crack.
The method for privacy protection of quotation file of the present application, by carrying out the double encryption of storage path and content to quotation file, has improved the secrecy performance of bidder's quotation data; In addition, the address content in storage address is dynamic a...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The quotation file privacy protection method comprises the following steps: encrypting file content and address content of a storage address of a quotation file by using a public key, and setting decryption time; after the decryption time is up, starting a private key to obtain a storage path of a bidding item corresponding to the quotation file, and assigning the storage path of the bidding item to a storage address; and calling the storage path, obtaining the quotation file, and obtaining the file content by using the private key. Double encryption of addresses and contents is carried out on the quotation file, so that the secrecy performance of quotation data of a bidder is improved; besides, the address content in the storage address is a dynamic address and is assigned after decryption, so that the defect of easy cracking in the prior art is overcome, and the use experience of the user is further improved.

Application Domain

Technology Topic

Image

  • Quotation file privacy protection method and system
  • Quotation file privacy protection method and system

Examples

  • Experimental program(1)

Example Embodiment

[0020] For a better understanding of the present application, various aspects of the present application will be described in more detail with reference to the accompanying drawings. It should be understood that these detailed descriptions are merely illustrative of exemplary embodiments of the present application and are not intended to limit the scope of the present application in any way. Throughout the specification, the same reference numerals refer to the same elements. The expression "and/or" includes any and all combinations of one or more of the associated listed items.
[0021] In the drawings, the size, size, and shape of elements have been slightly adjusted for ease of illustration. The drawings are examples only and are not drawn strictly to scale. As used herein, the terms "approximately," "approximately," and similar terms are used as terms of approximation, not of degree, and are intended to describe measurements that would be recognized by those of ordinary skill in the art or inherent bias in the calculated value. In addition, in this application, the order in which the processes of each step are described does not necessarily represent the order in which these processes appear in actual operations, unless there is a clear other definition or it can be inferred from the context.
[0022] It should also be understood that expressions such as "includes," "includes," "has," "includes," and/or "includes" in this specification are open-ended rather than closed expressions, indicating the presence of all Recited features, elements and/or components do not exclude the presence of one or more other features, elements, components and/or combinations thereof. Furthermore, when an expression such as "at least one of" appears after a list of listed features, it modifies the entire list of features and not only individual elements of the list. Furthermore, when describing embodiments of the present application, the use of "may" means "one or more embodiments of the present application." Also, the term "exemplary" is intended to refer to an example or illustration.
[0023] Unless otherwise defined, all terms (including engineering and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It should also be understood that, unless expressly stated otherwise in this application, words defined in commonly used dictionaries should be construed as having meanings consistent with their meanings in the context of the related art, rather than being idealized or excessive. Formal interpretation of meaning.
[0024] It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other if there is no conflict. The present application will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
[0025] figure 1 It is a flowchart of a method for privacy protection of quotation documents according to an exemplary embodiment of the present application.
[0026] like figure 1 As shown, the present application proposes such a method for protecting the privacy of an offer file, which may include: step S1, encrypting the file content and the address content of the storage address respectively for the offer file by using the public key, and setting the decryption time; step S2 , after the decryption time is reached, start the private key to obtain the storage path of the bidding item corresponding to the quotation file, and assign the storage path of the bidding item to the storage address; and step S3, call the storage path, obtain the quotation file, and use the private key to obtain the file content.
[0027] In some embodiments, in order to improve the confidentiality performance of the bidder's quotation data, first double-encrypt the file content and the address content of the storage address on the bidder's quotation file, and set a decryption time, wherein the decryption time can be determined according to the bidding The progress is set, and there is no limit here.
[0028] In some embodiments, the quotation file is stored on the server; and the storage address is stored in the database after the address content is encrypted. Since the database authority and server authority are separated, there are fewer people who can have both authority at the same time, and the security performance of the quotation file is also improved.
[0029] In some embodiments, the storage address is a fixed location. After the address content of the storage address is encrypted, the address content in the storage address is cleared, that is, the built-in content in the storage address is blank, which overcomes the problem of easy cracking in the prior art. disadvantages.
[0030] In some embodiments, when the decryption time arrives, the private key is obtained; the private key is activated to trigger the item code of the bidding item corresponding to the quotation file; and the storage path of the bidding item is searched through the item code, and the storage path is assigned to the storage address. Specifically, each bidding item has a unique item code, and for the bidding item corresponding to the above quotation file, after obtaining the public key and private key, the item code of the bidding item is triggered; further, the item code of the bidding item is searched for The address corresponding to the bidding item is the storage path, and the storage path of the bidding item is assigned to the storage address as the content of the dynamic address. In other words, after the private key is activated, the dynamic address content (ie, the storage path) will overwrite the blank address content of the storage address, so that valid address content exists in the storage address.
[0031] In some implementations, the storage address is called to find the quotation file. Further, since the content of the quotation file is still in an encrypted state at this time, the private key is used to decrypt the content of the file to obtain the content of the file.
[0032] In some implementations, an application programming interface is used to transfer the file content to a backend server. It can be understood that there are multiple bidders who will obtain multiple quotation files, and finally the backend server analyzes and calculates the file contents of the multiple quotation files respectively, and obtains the quotation documents that can maximize the interests of the tenderer, that is, the quotation results are obtained.
[0033] The method for privacy protection of quotation documents of the present application improves the confidentiality performance of bidder's quotation data by double encrypting the storage path and content of quotation documents; in addition, the address content in the storage address is a dynamic address, which is decrypted Assignment overcomes the disadvantage of being easy to crack in the prior art, thereby improving the user experience.
[0034] figure 2 is a system block diagram of quotation document privacy protection according to an exemplary embodiment of the present application.
[0035] like figure 2As shown, the present application also proposes such a system for privacy protection of quotation files, which may include: an encryption module 1 , an address decryption module 2 and a content decryption module 3 . The encryption module 1 is used for encrypting the file content and the address content of the storage address respectively for the quotation file by using the public key, and setting the decryption time. The address decryption module 2 is used to start the private key to obtain the storage path of the bidding item corresponding to the quotation file after the decryption time is reached, and assign the storage path of the bidding item to the storage address. The content decryption module 3 is used to call the storage path, obtain the quotation file, and use the private key to obtain the file content.
[0036] In some embodiments, the address content of the encrypted storage address is blank.
[0037] In some embodiments, the execution steps of the address decryption module 2 may include: after the decryption time is reached, obtaining a private key; starting the private key to trigger the item code of the bidding item corresponding to the quotation file; and searching the bidding item by the item code , and assign the storage path to the storage address.
[0038] In some embodiments, the public key is automatically activated after the decryption time is reached, and the private key is provided by the tenderer who bids on the project.
[0039] In some implementations, the bid item has a unique item code to determine the address of the bid item.
[0040] In some embodiments, it also includes: a backend server 4, configured to receive the file content transmitted by the application programming interface, analyze and calculate the file content, and obtain the bidding result for the bidding project.
[0041] The system for privacy protection of quotation documents of this application improves the confidentiality performance of bidder's quotation data by double encrypting the address and content of quotation documents; in addition, the address content in the storage address is a dynamic address, which is assigned after decryption , which overcomes the drawbacks of the prior art that are easy to crack, thereby improving the user experience.
[0042] The above are only specific embodiments of the present application, but the protection scope of the present application is not limited thereto. Any person skilled in the art who is familiar with the technical field disclosed in the present application can easily think of changes or substitutions. All should be covered within the scope of protection of this application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Classification and recommendation of technical efficacy words

  • Improve security performance
  • Overcoming easy to crack
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products