Quotation file privacy protection method and system

A privacy protection and file technology, applied in the field of data encryption and decryption, can solve the problems of easy cracking and poor data security, and achieve the effect of improving user experience, improving confidentiality performance, and overcoming easy cracking.

Active Publication Date: 2022-07-08
北京信锚网络有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, using encryption methods such as CA digital certificates and U-shields is to packa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quotation file privacy protection method and system
  • Quotation file privacy protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0020] For a better understanding of the present application, various aspects of the present application will be described in more detail with reference to the accompanying drawings. It should be understood that these detailed descriptions are merely illustrative of exemplary embodiments of the present application and are not intended to limit the scope of the present application in any way. Throughout the specification, the same reference numerals refer to the same elements. The expression "and / or" includes any and all combinations of one or more of the associated listed items.

[0021] In the drawings, the size, size, and shape of elements have been slightly adjusted for ease of illustration. The drawings are examples only and are not drawn strictly to scale. As used herein, the terms "approximately," "approximately," and similar terms are used as terms of approximation, not of degree, and are intended to describe measurements that would be recognized by those of ordinary ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The quotation file privacy protection method comprises the following steps: encrypting file content and address content of a storage address of a quotation file by using a public key, and setting decryption time; after the decryption time is up, starting a private key to obtain a storage path of a bidding item corresponding to the quotation file, and assigning the storage path of the bidding item to a storage address; and calling the storage path, obtaining the quotation file, and obtaining the file content by using the private key. Double encryption of addresses and contents is carried out on the quotation file, so that the secrecy performance of quotation data of a bidder is improved; besides, the address content in the storage address is a dynamic address and is assigned after decryption, so that the defect of easy cracking in the prior art is overcome, and the use experience of the user is further improved.

Description

technical field [0001] The present application belongs to the technical field of data encryption and decryption, and in particular relates to a method and system for privacy protection of quotation files. Background technique [0002] Electronic bidding is a new bidding method based on network technology, which realizes the digitalization, networking and high integration of traditional bidding, bidding, bid evaluation and other business processes. In the prior art, the quotation file is made by using Word or EXCE1, and after the quotation file is made, the data security is poor, so that the problem of malicious tampering is likely to occur. In order to solve the security problem of the quotation file, the encryption of the quotation file is usually performed by means of U-shield encryption, or by applying the CA digital certificate. That is, each bidding company holds a unique CA digital certificate for hardware encryption equipment management. The bidding company encrypts ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06Q30/08G06Q30/06
CPCG06F21/6209G06F21/602G06Q30/08G06Q30/0611
Inventor 王廷严孙玉田
Owner 北京信锚网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products