Movatterモバイル変換


[0]ホーム

URL:


CN111130793A - File encryption method based on block chain bidding system - Google Patents

File encryption method based on block chain bidding system
Download PDF

Info

Publication number
CN111130793A
CN111130793ACN201911269149.9ACN201911269149ACN111130793ACN 111130793 ACN111130793 ACN 111130793ACN 201911269149 ACN201911269149 ACN 201911269149ACN 111130793 ACN111130793 ACN 111130793A
Authority
CN
China
Prior art keywords
client
signature
bidding
intelligent contract
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911269149.9A
Other languages
Chinese (zh)
Inventor
张思成
张启煊
井皓天
郑泽域
王丹阳
董黎刚
蒋献
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang UniversityfiledCriticalZhejiang Gongshang University
Priority to CN201911269149.9ApriorityCriticalpatent/CN111130793A/en
Publication of CN111130793ApublicationCriticalpatent/CN111130793A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a file encryption method based on a block chain bidding system, which comprises the following steps: 1) a bidder imports a bid file F at a client, the client randomly generates an AES key, and the F is encrypted by using an AES algorithm to generate F'; 2) uploading F ' to an IPFS by a client, taking a hash value for the F ' by the client to obtain Hf, adding a random number uuid behind the Hf to obtain m, and blinding the m by using a blind signature algorithm to obtain m '; 3) the client sends m ' to the server for signature, and the server signs m ' by using a private key to obtain s '; 4) the client sends s 'to the intelligent contract, the intelligent contract verifies the validity of the signature of the tenderer, if the signature is valid, the client removes the blindness of s' to obtain s, and if the signature is invalid, the client goes to 3); 5) and the client sends the s and the m to the intelligent contract for verification, and if the verification is successful, the m is stored in the block chain. The invention ensures the safe storage of the bidding document.

Description

File encryption method based on block chain bidding system
Technical Field
The invention relates to the field of block chains, in particular to a file encryption method based on a block chain bidding system.
Background
The electronic bidding is a bidding activity completed in a data telegraph text form. Generally speaking, paper documents are partially or completely abandoned, and bidding activities are completed by means of computers and networks. Electronic bidding brings convenience, quickness and cost reduction benefits, and meanwhile, has a plurality of problems. The main problem is network information security, and network security problems may occur in many links in the whole process of electronic bidding, such as identity authentication of electronic buyers and sellers, host and object of data communication, and secure transmission of information data. At present, in electronic bidding activities, the security of electronic file data is not high enough, and the electronic file data is easy to be tampered.
The randow provides a block chain-based bid inviting and bidding processing method and system, processing steps of bid inviting, bidding, bid opening, bid evaluation, bid winning and the like are stored in each block and a private chain for solving, the openness and fairness of each link are guaranteed, the time sequence of data is guaranteed, and the data can be traced. However, only for the encryption of the bidding document, a symmetric encryption method is used as a main method, and the encryption algorithm is single, so that the absolute security of the bidding document cannot be guaranteed, and therefore, an encryption mode capable of guaranteeing higher security of bidding document information needs to be designed, so that the tenderer and the bidder can complete fair and fair bidding activities on line.
The full-state star proposes encryption distribution based on block chain sensitive information, and introduces how to encrypt and decrypt bidding information by using a secure hash algorithm, an RSA algorithm and the like. The full-armor star uses SHA-256 algorithm to encrypt the single notice attachment information in the notice attachment information to prevent the notice attachment information from being falsified. And adding RSA signature algorithm to carry out signature verification on the notice information. In the public platform for bidding of the block chain, the public platform for bidding indicates that the public platform for bidding of the block chain adjusts the advertisement information field of the block, adds the sensitive information field and encrypts the sensitive field. Although the full-bore star optimizes the encryption and decryption method of the bidding and bidding announcement information, the RSA algorithm key is lower than 1024 bits in the decryption process, and the decomposition of RSA-512 is relatively simple for individual users, so that potential safety hazards exist. In addition, the encryption method only encrypts a single link of the issued announcement in the bidding process, and does not relate to links such as bidding, bid evaluation, bid opening, scaling and the like, so that a block chain technology and a safe encryption algorithm are required to be designed to be applied to more links in the bidding process, and the whole bidding process is more standard and safe.
Plum proposes a block chain technology-based encryption algorithm application study for Liu Shi cloud, points out that the realization of the function of the block chain needs to solve the security problem, and further leads out an RSA encryption algorithm. The method adopts an RSA encryption algorithm to ensure the security of data in a block chain technology network, and obtains the process of RSA encryption and decryption through simulation. However, only the encryption algorithm combined with the block chain technology is proposed, and is not applied to the bidding environment, so that a block chain encryption algorithm adapted to the bidding environment needs to be designed to combine the algorithm with the actual application.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a file encryption method based on a block chaining bidding system.
A file encryption method based on a block chaining bidding system comprises the following steps:
1-1) a bidder imports a bid file F at a client, the client randomly generates an AES key (the key is only held by the bidder), and the F is encrypted by using an AES algorithm to generate F';
1-2) uploading F ' to an IPFS (distributed file storage system) by a client, obtaining Hf by the client by taking a hash value of F ', adding a random number uuid behind the Hf to obtain m, and blinding m by using a blind signature algorithm to obtain m ';
1-3) the client sends m ' to the server for signature, and the server signs m ' by using a private key to obtain s ';
1-4) the client sends s 'to the intelligent contract, the validity of the signature of the tenderer is verified by the intelligent contract, if the signature is valid, the client removes blindness from s' to obtain s, and if the signature is invalid, the client goes to 1-3);
1-5) the client sends s and m to the intelligent contract for verification, and if the verification is successful, m is stored in the block chain.
In the steps 1-5), the implementation process is as follows:
2-1) the client of the tenderer generates a random account number, and s and m are sent to the intelligent contract through the random account number for verification;
2-2) if m is obtained after s is successfully signed, resolving m to obtain Hf and uuid, then checking is successful, and the client side of the tenderer stores m to the block chain; otherwise, the check fails and an error is returned.
The invention has the following beneficial effects:
1. the method and the system realize the complete unknown guarantee between the bidder and the tenderer, and the tenderer can guarantee the validity and the authentication operation of the file under the condition of guaranteeing the complete anonymity of the process file before the tendering.
2. Any link of the bidding document file before the opening of the bidding document is in an anonymous and encrypted state, so that the possibility of tampering and stealing the bidding document is almost zero.
3. The intelligent contract has zero knowledge proof characteristic, each step of operation of the intelligent contract leaves a record on the chain, and both sides can self-prove and clear due to the non-tamper property of the block chain, so that the trust cost between the bidder and the tenderer is reduced.
Detailed Description
The invention will be further illustrated and described with reference to the following examples. The technical features of the embodiments of the present invention can be combined correspondingly without mutual conflict.
A file encryption method based on a block chaining bidding system comprises the following steps:
1-1) a bidder imports a bid file F at a client, the client randomly generates an AES key (the key is only held by the bidder), and the F is encrypted by using an AES algorithm to generate F';
1-2) uploading F ' to an IPFS (distributed file storage system) by a client, obtaining Hf by the client by taking a hash value of F ', adding a random number uuid behind the Hf to obtain m, and blinding m by using a blind signature algorithm to obtain m ';
1-3) the client sends m ' to the server for signature, and the server signs m ' by using a private key to obtain s ';
1-4) the client sends s 'to the intelligent contract, the validity of the signature of the tenderer is verified by the intelligent contract, if the signature is valid, the client removes blindness from s' to obtain s, and if the signature is invalid, the client goes to 1-3);
1-5) the client sends s and m to the intelligent contract for verification, and if the verification is successful, m is stored in the block chain.
A file encryption method based on a block chaining bidding system is characterized in that in the step 1-5), the implementation process is as follows:
2-1) the client of the tenderer generates a random account number, and s and m are sent to the intelligent contract through the random account number for verification;
2-2) if m is obtained after s is successfully signed, resolving m to obtain Hf and uuid, then checking is successful, and the client side of the tenderer stores m to the block chain; otherwise, the check fails and an error is returned.
Examples
To facilitate the understanding and practice of the present invention by those of ordinary skill in the art, a specific embodiment of the method of the present invention will now be presented. The file encryption method based on the block chain bidding system fully utilizes the characteristics and advantages of the block chain, the RSA algorithm, the Hash algorithm and the blind signature algorithm, solves the problem of safety of current bidding data, and provides a more safe and transparent file encryption method.
In this embodiment, a company A intends to purchase a collection of displays by tender. Company a uses the system to issue a bidding announcement. The specific requirements are shown in table 1.
Bidding project name: display procurement
The item guarantee amount: 2000
Item bidding start time: 2018-05-15
Ciphertext submission end time: 2018-05-25
Item bidding end time: 2018-06-10
Minimum bid number for project: 2
TABLE 1 display requirements of company A
Figure RE-DEST_PATH_IMAGE001
The three companies A, B and C know the specific requirements of the company A on bid by inquiring the bid-inviting announcement and successively and online propose bid applications to the company A. After obtaining the application, three companies A, B and C upload bid documents F1, F2 and F3 respectively on the client. The client randomly generates three pairs of AES keys, and F1, F2 and F3 are encrypted respectively by using an AES algorithm to obtain F1 ', F2 ' and F3 '.
TABLE 2 Bidding of three companies
Company ACompany BC Corp Ltd
F1F2F3
TABLE 3 company Bid content
Detailed description of the inventionSize ofResolution ratioDegree of refreshBrightness of lightUnit price of
Bidding content241K602501199
TABLE 4 Bid Contents
Detailed description of the inventionSize ofResolution ratioDegree of refreshBrightness of lightUnit price of
Bidding content274K603503299
TABLE 5C Bidding content
Detailed description of the inventionSize ofResolution ratioDegree of refreshBrightness of lightUnit price of
Bidding content241K60250789
TABLE 6A company Biddings encryption
AES keybj3kHJI2jh41jur93FH
F1’jnpTfJHH+SCtaTgqxpN9fHx/r0BVyzQlx8LD9KFRpkE=
TABLE 7B company Biddings encryption
AES keyihurfqw6574ddw652ed
F2’qTke3/QXjSu1CUZw3DeuUtBt4PdfHHT54f0NDlwwWM8=
TABLE 8C company Biddings encryption
AES keykdsfbjw872kwi8w2jwwe2e2k
F3’sseMtT4PZw80aDHMnMlTn8eCHTuZRkKjuls36mtg2L0=
The client uploads the encrypted files F1 ', F2' and F3 'to the IPFS respectively, and takes hash values of F1', F2 'and F3' to obtain Hf1, Hf2 and Hf3 respectively.
Table 9 encryption Bidding hash value
Hf1a5080104a6d50c8a85262d36cbf74eab9a3eb4a66d56fdd4f7ded44334b7b802
Hf206a8fae940ccabecc6646cd9698358965f47383051d20d77eeef1ddbfd3f7f6d
Hf346415f99320a989325ed063a3aff0d74a4bdc6888d9957c2ed6e2ac23a0de0
The client adds random numbers uuid1, uuid2 and uuid3 after the hash values Hf1, Hf2 and Hf3 respectively to obtain m1, m2 and m 3.
TABLE 10A Cryptographic addition random number
Hf1a5080104a6d50c8a85262d36cbf74eab9a3eb4a66d56fdd4f7ded44334b7b80
uuid1uuid{qvxcewptvotwjbve}
m1a5080104a6d50c8a85262d36cbf74eab9a3eb4a66d56fdd4f7ded44334b7b802uuid{qvxcewptvotwjbve}
TABLE 11B company ciphertext appending random number
Hf206a8fae940ccabecc6646cd9698358965f47383051d20d77eeef1ddbfd3f7f6d
uuid2uuid{edzydbfwpqpqlmfy}
m206a8fae940ccabecc6646cd9698358965f47383051d20d77eeef1ddbfd3f7f6duuid{edzydbfwpqpqlmfy
TABLE 12C ciphertext ADDING RANDOM NUMBER
Hf346415f99320a989e25ed063a3aff0d74a4bdc6888d9957c2ed6e5e2ac23a0de0
uuid3uuid{qasaorhiaomnsfto}
m346415f99320a989e25ed063a3aff0d74a4bdc6888d9957c2ed6e5e2ac23a0de0uuid{qasaorhiaomnsfto}
The client side respectively blinds m1, m2 and m3 by using a blind signature algorithm to obtain m1 ', m2 ' and m3 '; the client side sends m1 ', m2 ' and m3 ' to the server for signature, and the server side signs m1 ', m2 ' and m3 ' by using a private key to obtain s1 ', s2 ' and s3 '.
Watch 13 blinding
Figure RE-DEST_PATH_IMAGE003
TABLE 14 private Key of Bidding
Company(s)Signature private key
A353543768370652810909875977996662029267676041776692723383222626168573263872
B52659416512935271099904227995352748058050342166457930265410964719284359528448
C21395183056351271679224886452430563801672963618705005228507133440019639828480
TABLE 15A company signs each blind label
Company(s)Signature ciphertext
s1’417813214086051801172299761555683317985574960277767116656822037758556214292
s2’997499559078896871756544784060543197596631915054786463217910134590883458540
s3’1134042982415102019994507682132730044542351236954908744302469034432436245225
The client side sends s1 ', s 2' and s3 'to the intelligent contract respectively to check the validity of the signature of the company A, if the signature is valid, s 1', s2 'and s 3' are blinded to obtain s1, s2 and s 3; if not, the signature is reinitiated.
TABLE 16 Blind removal
s1407843721258687185499632414649544394783569158755562858739605128194653842074
s229379553922896757776509293233661646443670127839201157116641156056003689919188
s320885760979870704405422622932318070471408154373845334373482441288410748560662
The client generates random account numbers r1, r2 and r3, and s and m are sent to the intelligent contract through the random account numbers (consisting of Address and Privkey) to be verified; if m is obtained after s is successfully signed, resolving m to obtain Hf and uuid, then checking successfully, and storing m to the block chain by the client; otherwise, the check fails and an error is returned.
TABLE 17 random Account number
AddressPrivkey
r118653952049082981511048260472287118806330957847134381370958740583498599490233319371925023911881294952306806341681926937193409089867448444987860770516447733316221033886075137115213077544289300213993542200343317624474881563696219610941719786993381968380995749843630419082151202556972248661512362529547489259757
r2120214962853234525524124259732258382874402916893583701009502862527439196821048615056121266288776939857550830527819565503129214056563680863532236827725085518691876112864156952680718827884935279352084844592986151063567955295729390047829346022837346003287955557103541065256669735430964275772388758916699167105
r358682693379011285624535828042907304663139748005970772951216729007130080977030770516191784552349162569712590291925453010957755774408602944695177646017213736318219887411804028413902041868898687001383016830816875798234444210401003724847723680361187591792788685496643646180064106083597234616741968690735045
TABLE 18 De-signature s
m1a5080104a6d50c8a85262d36cbf74eab9a3eb4a66d56fdd4f7ded44334b7b802uuid{qvxcewptvotwjbve}
m206a8fae940ccabecc6646cd9698358965f47383051d20d77eeef1ddbfd3f7f6duuid{edzydbfwpqpqlmfy
m346415f99320a989e25ed063a3aff0d74a4bdc6888d9957c2ed6e5e2ac23a0de0uuid{qasaorhiaomnsfto}
TABLE 19 m analysis
Hf1a5080104a6d50c8a85262d36cbf74eab9a3eb4a66d56fdd4f7ded44334b7b80
uuid1uuid{qvxcewptvotwjbve}
Hf206a8fae940ccabecc6646cd9698358965f47383051d20d77eeef1ddbfd3f7f6d
uuid2uuid{edzydbfwpqpqlmfy}
Hf346415f99320a989e25ed063a3aff0d74a4bdc6888d9957c2ed6e5e2ac23a0de0
uuid3uuid{qasaorhiaomnsfto}

Claims (2)

1. A file encryption method based on a block chaining bidding system is characterized in that safe storage of bidding files in the system is guaranteed, and the method comprises the following steps:
a bidder imports a bid file F at a client, the client randomly generates an AES key (the key is only held by the bidder), and the F is encrypted by using an AES algorithm to generate F';
uploading F ' to an IPFS (distributed file storage system) by a client, obtaining Hf by the client by taking a hash value of the F ', adding a random number uuid behind the Hf to obtain m, and blinding the m by using a blind signature algorithm to obtain m ';
the client sends m ' to the server for signature, and the server signs m ' by using a private key to obtain s ';
the client sends s 'to the intelligent contract, the intelligent contract verifies the validity of the signature of the tenderer, if the signature is valid, the client removes the blindness of s' to obtain s, and if the signature is invalid, the client goes to 1-3);
and the client sends the s and the m to the intelligent contract for verification, and if the verification is successful, the m is stored in the block chain.
2. The file encryption method based on the block chaining bidding system according to claim 1, wherein the steps 1-5) are implemented as follows:
2-1) the client of the tenderer generates a random account number, and s and m are sent to the intelligent contract through the random account number for verification;
2-2) if m is obtained after s is successfully signed, resolving m to obtain Hf and uuid, then checking is successful, and the client side of the tenderer stores m to the block chain; otherwise, the check fails and an error is returned.
CN201911269149.9A2019-12-112019-12-11File encryption method based on block chain bidding systemPendingCN111130793A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911269149.9ACN111130793A (en)2019-12-112019-12-11File encryption method based on block chain bidding system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911269149.9ACN111130793A (en)2019-12-112019-12-11File encryption method based on block chain bidding system

Publications (1)

Publication NumberPublication Date
CN111130793Atrue CN111130793A (en)2020-05-08

Family

ID=70499210

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911269149.9APendingCN111130793A (en)2019-12-112019-12-11File encryption method based on block chain bidding system

Country Status (1)

CountryLink
CN (1)CN111130793A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111461851A (en)*2020-05-222020-07-28烟台大学Double-blind bidding system and bidding method based on block chain
CN111934873A (en)*2020-10-122020-11-13江西省精彩纵横采购咨询有限公司Bidding file encryption and decryption method and device
CN112017017A (en)*2020-09-032020-12-01罗官Bidding method and system based on block chain
CN113268750A (en)*2021-05-212021-08-17中国联合网络通信集团有限公司Data processing method, bidding node device and computer readable medium
CN113268777A (en)*2021-05-212021-08-17中国联合网络通信集团有限公司Block chain-based bidding information processing method and module and electronic equipment
CN114422156A (en)*2022-03-312022-04-29北京国电通网络技术有限公司 Blockchain-based compensation and authentication method and system for bidding documents
CN114820147A (en)*2022-06-022022-07-29杭州天谷信息科技有限公司Signing method and signing system for staged electronic contract
CN114896617A (en)*2022-06-092022-08-12上海万向区块链股份公司 Implementation method and system of electronic bidding based on IPFS
CN115242409A (en)*2022-09-212022-10-25环球数科集团有限公司 A privacy computing method and system based on zero-knowledge proof
CN115760324A (en)*2022-11-142023-03-07临沂大学Online bidding method, online bidding equipment and computer storage medium
CN118839362A (en)*2024-09-232024-10-25厦门数字证书管理有限公司Bid file processing system based on block chain
CN119067666A (en)*2024-11-072024-12-03贵州省黔云集中招标采购服务有限公司 An information encryption method, system and medium for transaction cloud platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20190205873A1 (en)*2017-12-292019-07-04Ebay, Inc.Secure control of transactions using blockchain
CN110321734A (en)*2019-07-112019-10-11政采云有限公司A kind of file verification method and device
CN110532806A (en)*2019-07-262019-12-03深圳壹账通智能科技有限公司Bidding documents management method, system and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20190205873A1 (en)*2017-12-292019-07-04Ebay, Inc.Secure control of transactions using blockchain
CN110321734A (en)*2019-07-112019-10-11政采云有限公司A kind of file verification method and device
CN110532806A (en)*2019-07-262019-12-03深圳壹账通智能科技有限公司Bidding documents management method, system and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
于阳等: "一种安全电子招标系统中专家抽取的方法", 《计算机应用研究》, no. 01, 10 January 2007 (2007-01-10)*

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111461851B (en)*2020-05-222023-04-14烟台大学 A blockchain-based double-blind bidding system and bidding method
CN111461851A (en)*2020-05-222020-07-28烟台大学Double-blind bidding system and bidding method based on block chain
CN112017017A (en)*2020-09-032020-12-01罗官Bidding method and system based on block chain
CN111934873A (en)*2020-10-122020-11-13江西省精彩纵横采购咨询有限公司Bidding file encryption and decryption method and device
CN113268777B (en)*2021-05-212023-05-12中国联合网络通信集团有限公司Bid information processing method and module based on block chain and electronic equipment
CN113268777A (en)*2021-05-212021-08-17中国联合网络通信集团有限公司Block chain-based bidding information processing method and module and electronic equipment
CN113268750A (en)*2021-05-212021-08-17中国联合网络通信集团有限公司Data processing method, bidding node device and computer readable medium
CN113268750B (en)*2021-05-212023-05-12中国联合网络通信集团有限公司Data processing method, bidding node apparatus and computer readable medium
CN114422156A (en)*2022-03-312022-04-29北京国电通网络技术有限公司 Blockchain-based compensation and authentication method and system for bidding documents
CN114820147A (en)*2022-06-022022-07-29杭州天谷信息科技有限公司Signing method and signing system for staged electronic contract
CN114820147B (en)*2022-06-022022-11-25杭州天谷信息科技有限公司Signing method and signing system for staged electronic contract
CN114896617A (en)*2022-06-092022-08-12上海万向区块链股份公司 Implementation method and system of electronic bidding based on IPFS
CN115242409A (en)*2022-09-212022-10-25环球数科集团有限公司 A privacy computing method and system based on zero-knowledge proof
CN115760324A (en)*2022-11-142023-03-07临沂大学Online bidding method, online bidding equipment and computer storage medium
CN115760324B (en)*2022-11-142023-09-22临沂大学Online bidding method, online bidding equipment and computer storage medium
CN118839362A (en)*2024-09-232024-10-25厦门数字证书管理有限公司Bid file processing system based on block chain
CN119067666A (en)*2024-11-072024-12-03贵州省黔云集中招标采购服务有限公司 An information encryption method, system and medium for transaction cloud platform

Similar Documents

PublicationPublication DateTitle
CN111130793A (en)File encryption method based on block chain bidding system
US20180308098A1 (en)Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices
KR101833323B1 (en)Method for Confirming Statement by Use of Block Chain Which Guarantees Anonymity and Prevents Sybil Attack
CN107770159B (en)Vehicle accident data recording method and related device and readable storage medium
CN109905360B (en)Data verification method and terminal equipment
JP2018513597A (en) Method and apparatus for providing a universal, deterministic reproducible representation of cryptographic key pairs for all SKUs, shipping cartons and items
CN110597836B (en)Information inquiry request response method and device based on block chain network
CN112738051B (en)Data information encryption method, system and computer readable storage medium
US9600690B2 (en)Secure access for sensitive digital information
CN111342955B (en)Communication method and device and computer storage medium
Malik et al.Novel authentication system using visual cryptography
CN109104271B (en)Digital signature method, device and system
CN112491549B (en)Data information encryption verification method, system and computer readable storage medium
CN111698084B (en)Block chain-based concealed communication method
CN106161472A (en)A kind of method of data encryption, Apparatus and system
CN113961956B (en)Method, device, equipment and medium for generating and applying labeled network information service
CN113114654A (en)Terminal equipment access security authentication method, device and system
CN111079190A (en)Block chain supply chain transaction hiding dynamic supervision system and method
CN107395350B (en)Method and system for generating key and key handle and intelligent key safety equipment
USRE49968E1 (en)Electronic identification verification methods and systems with storage of certification records to a side chain
CN113783690B (en)Authentication-based bidding method and device
US20180309579A1 (en)Secure representation via a format preserving hash function
CN110175471B (en)File storage method and system
CN109547404B (en)Data acquisition method and server
CN111832046B (en)Trusted data certification method based on blockchain technology

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WD01Invention patent application deemed withdrawn after publication
WD01Invention patent application deemed withdrawn after publication

Application publication date:20200508


[8]ページ先頭

©2009-2025 Movatter.jp