CN112767091A - Method, device and medium for processing supervisable bid and privacy based on block chain - Google Patents

Method, device and medium for processing supervisable bid and privacy based on block chain Download PDF

Info

Publication number
CN112767091A
CN112767091A CN202110125856.1A CN202110125856A CN112767091A CN 112767091 A CN112767091 A CN 112767091A CN 202110125856 A CN202110125856 A CN 202110125856A CN 112767091 A CN112767091 A CN 112767091A
Authority
CN
China
Prior art keywords
node
bidding
tenderer
bidder
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110125856.1A
Other languages
Chinese (zh)
Other versions
CN112767091B (en
Inventor
马超群
匡先华
米先华
周中定
李信儒
兰秋军
万丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University
Original Assignee
Hunan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University filed Critical Hunan University
Priority to CN202110125856.1A priority Critical patent/CN112767091B/en
Publication of CN112767091A publication Critical patent/CN112767091A/en
Application granted granted Critical
Publication of CN112767091B publication Critical patent/CN112767091B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0611Request for offers or quotes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain-based method, equipment and medium for processing supervision bid and privacy, wherein the block chain-based method for processing supervision bid and privacy concentrates all bid information on a chain to be shared, so that the trouble of finding the bid information from various channels by a bidder is eliminated, and the bidder can conveniently find a better bidder from more bidding enterprises. The invention introduces the private database and the monitoring party, can avoid the fraud phenomena of revealing bidding quotation and the like in the bidding process, and the monitoring party has the access right of all bidding process data, can supervise and examine the whole bidding process, better restricts the behaviors of the bidding party and the bidding party, and ensures the fairness of the bidding activities and the privacy of the data of all relevant parties. The whole bidding service process is digital, paper documents are electronic, the bidding efficiency is greatly improved, the cost and the resource waste are reduced, and the verification of various documents is facilitated.

Description

Method, device and medium for processing supervisable bid and privacy based on block chain
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method, an apparatus, and a medium for processing supervised bidding and privacy based on blockchains.
Background
The bid inviting is an action of the bidder (buyer) for preparing a bid document, issuing a purchase demand notice or invitation, explaining the name and address of the bidder, the nature and quantity of a bid inviting item, an implementation place and time, issuing an acquisition bid document, and the like, and inviting a specific or unspecified bidder (seller) to bid at a specified time and place according to a certain program.
The bidding is that the bidder compiles a bid document according to the bid document requirement, responds to the substantial requirement and condition proposed by the bid document, and delivers the bid document to the bidder within the validity period.
As shown in fig. 1, the conventional bidding process generally includes the following stages:
a preparation stage: the whole process of the bidding activity is specifically arranged, and comprises the steps of performing demonstration analysis on the bidding project, determining a purchasing scheme, compiling bidding documents, specifying a bidding evaluation method, a component bidding evaluation mechanism, inviting related personnel and the like.
And (3) issuing a bidding announcement: and issuing a bidding announcement in a specified newspaper or medium, or issuing a bidding invitation to an invitee.
Qualification examination: the tenderer qualifies suppliers for interesting bids.
And (4) bidding: the bidder creates a bid document, seals and marks the bid document, and delivers the bid document to a bid location at a predetermined expiration time.
Opening a label: and (3) holding an opening-tender ceremony, and enabling the tenderer to open the opening-tender ceremony in a public manner at a specified time, place and program according to the invitation to tender (or invitation to bid).
And (4) evaluation of bid: and the bid evaluation committee evaluates the bid documents and forms bid evaluation conclusions.
Calibration: and determining a successful bidder and signing a contract with the successful bidder according to the regulations.
The traditional bidding process has the following disadvantages:
a large amount of paper documents are involved in the bidding process, so that the paper documents are difficult to store and easy to lose, and possible to be tampered;
secondly, the whole bidding process needs multi-party cooperation, and the efficiency of an offline mode is low;
and the tendering process is not transparent, and the possibility of communication between the tenderer and the bidder exists, such as revealing the bidding background to help a specific bidder to bid.
Disclosure of Invention
The invention provides a block chain-based method for supervising bidding and privacy processing, and aims to solve the technical problems of low efficiency, high cost, high risk and easiness in leakage of the existing bidding activities.
The technical scheme adopted by the invention is as follows:
a supervise bidding and privacy processing method based on a block chain comprises the following steps:
calling an intelligent contract ST1(ZT) by a tenderer node, issuing tendering information, wherein endorsements of the tenderer and a supervisor are required in the process, and the tendering information is uploaded to a block chain in a public form;
the bidder node calls an intelligent contract ST1(T) and uploads bidding qualification information, the bidding qualification information is stored in a public account book in a Hash form after being identified, specific contents are stored in a private database PDC (T) of the bidder node, the bidder node then sends the specific contents contained in the Hash data to the tenderer node, and the tenderer node stores the specific contents in a down-link database OFD (Z);
the tenderer node receives the examination data, verifies whether the examination data is in accordance with the Hash of the data uploaded to the block chain by the tenderer, and verifies whether the tenderer node has bidding qualification, if so, the tenderer node is informed to transfer the bidding deposit to a specified bank account;
the bidder node receives the notification, transfers the required deposit to the designated bank account, and notifies the bank node to upload the transfer record to the block chain;
the bank node calls an intelligent contract ST1(B), transfers the transfer information of the bidder node to a block chain, the channel account book retains the Hash of the transfer record, the specific content is stored in a private database PDC (B) of the bank node, and the tenderer node is informed of the account information of the deposit;
when the guarantee fund payment date is up, the tenderer node calls an intelligent contract ST2(z), the examination result is uploaded to a block chain in a Hash mode, whether the block chain has bidding qualification or not is disclosed, and the specific content of the Hash data is stored in a private set PDC (ZJ) shared by the tenderer node and the supervisor node;
after determining that the node has the bidding qualification, the node of the bidder calls an intelligent contract ST1(T), and uploads bidding information (such as quotations, schemes and the like) to a block chain public ledger in a Hash form, and the specific content is stored in a private database PDC (T) of the node of the bidder;
when the bidding date is reached, the tenderer node reads the bidding information of each bidder node and stores the bidding information in the off-link database OFD (Z);
the tenderer node evaluates the tender book of each tenderer node, determines the winning bid result, calls an intelligent contract ST3(Z), and publishes the winning bid result to the block chain in an open form (selectively publishes a part of non-sensitive information);
if each bidder node disagrees with the bidding result, after the publication period is finished, the tenderer node informs the bank node that the deposit of each bidder node will be returned, the bank node calls an intelligent contract ST1(B), the transfer record Hash is uploaded to a block chain, the specific information is stored in a private database PDC (B) of the bank, and the tenderer node and the bidder node are informed to transfer the information;
and the tenderer node signs a contract with the bidder node, calls an intelligent contract to upload the contract and uploads the contract to the block chain public account book in a Hash mode, and the specific content is stored in a public database PDC (ZT) shared by the tenderer node and the bidder node.
Further, the intelligent contract ST1(T) is also used to ensure that after the bid deadline has passed, the tenderer node can read the specific bid information of the bidder node through the intelligent contract ST1 (T).
Further, after the tenderer node publishes the winning bid result to the blockchain in a public form and before the publication period is finished, the method further comprises the following steps:
other bidder nodes not winning the bid look at the bid results and request intervention from the supervisor if the results are objected (the solution itself is considered better than the winning bidder, e.g., lower bid, etc.).
Further, after the column is disclosed whether the bid qualification is provided, the method also comprises the following steps:
and informing the bidder node, checking whether the bidder node has the bidding qualification according to the identity ID when the bidder node registers on the block chain, and inquiring the tenderer node or reflecting the tenderer node to the supervisor node through a line if the result is questioned.
Further, the tenderer node evaluates the tender of each tenderer node, and the determination of the bid-winning result specifically includes the steps of:
establishing an index system: the index system comprises a total target A, a primary index B and a secondary index C, wherein the total target is a credit risk assessment value of a bidding enterprise, and the primary index comprises a non-financial index and a financial index; the secondary indexes comprise enterprise qualification grade indexes of subordinative and non-financial indexes, credit indexes of high management personnel, legal proceedings indexes of nearly three years, poor performance record indexes, and asset liability condition indexes, enterprise operating income condition indexes and enterprise profit rate indexes of subordinative and non-financial indexes;
establishing a judgment matrix: the weight coefficients of the same level factor are obtained from high to low, and the weight coefficients comprise the weight coefficient of the primary index to each factor of the total target and the weight coefficient of the secondary index to each factor of the primary index;
and (3) consistency check, namely after a judgment matrix is obtained, if the judgment of each evaluation expert is inconsistent, checking the consistency of thinking of a decision maker by adopting a common consistency index CI, wherein the CI is expressed as follows:
Figure BDA0002923989280000041
wherein λ ismaxComparing CI with the average random consistency index RI to obtain the random consistency ratio CR:
Figure BDA0002923989280000042
when the random consistency ratio CR is less than or equal to a set threshold, the judgment matrix is considered to have consistency, the evaluation is reliable, otherwise, the expert is required to evaluate again;
calculating a combination weight coefficient: according to the weight coefficient of each factor of the primary index and the weight coefficient of each factor of the primary index by the secondary index, the combined weight coefficient of the influence of each factor of the secondary index on the total target is obtained
Figure BDA0002923989280000051
And (3) risk calculation: according to the obtained combined weight coefficient of the influence of each factor of the secondary index on the total target
Figure BDA0002923989280000052
The assessment committee can obtain the credit risk assessment value of the bidding enterprise by scoring each factor of the secondary indexes:
Figure BDA0002923989280000053
wherein: r represents the credit risk value of the bidding enterprise, C represents the grade of each factor of the secondary indexes by the evaluation committee:
C=(c1,…,c7)T
and (4) determining a winning bid result: according to the obtained credit risk assessment value of the bidder, the credit rating of the bidder is divided into excellent, good, general and poor; combining the bids of the bidders, and selecting the bidder with the lowest bid price from the bidders having credit ratings not lower than "normal" or "good" according to the importance of the item.
Further, the establishing a judgment matrix: the method for solving the weight coefficients of the same level factor from high to low comprises the weight coefficient of a first level index to each factor of a total target and the weight coefficient of a second level index to each factor of the first level index, and specifically comprises the following steps:
firstly, the evaluation committee experts compare every two factors in the first-level index B to obtain a numerical value Bij,BA=(bij)2×2B is a judgment matrix of the first-level index relative to the total target AAHas a maximum characteristic root of
Figure BDA0002923989280000054
Belong to
Figure BDA0002923989280000055
The standard feature vector of (a) is:
Figure BDA0002923989280000056
then omegaB1,ωB2Giving weight coefficients of the primary indexes B1 and B2 to the total target A after the weights are sorted according to the importance degree or preference;
similarly, the judgment matrixes of the secondary indexes C1 … C7 relative to the primary indexes B1 and B2 are respectively expressed as:
Figure BDA0002923989280000061
and the weight coefficient of each factor of the secondary index to each factor of the primary index is respectively expressed as:
Figure BDA0002923989280000062
further, the calculation method for solving the combination weight coefficient of the influence of each factor of the secondary index on the total target is as follows:
Figure BDA0002923989280000063
further, in the consistency check step, the values of the 1-9 th order judgment matrix RI are 0, 0.58, 0.90, 1.12, 1.24, 1.32, 1.41, and 1.45, respectively, and the set threshold value is 0.1.
Another aspect of the present invention provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the block chain-based supervised bidding and privacy processing method when executing the program.
In another aspect, the present invention provides a storage medium, where the storage medium includes a stored program, and when the program runs, the apparatus on which the storage medium is located is controlled to execute the method for processing supervised bidding and privacy based on block chains.
The invention has the following beneficial effects:
the block chain-based method for processing supervision tender and privacy of the invention shares all tender information on the chain in a centralized way, and by utilizing the technical scheme of combining the block chain technology, asymmetric encryption, Hash algorithm, digital signature, intelligent contract, privacy data set and identity authentication, the single data is electronized and the business process is digitized, thus the trouble of finding tender information from various channels by a tender party is saved, and the tender party can conveniently find a better tender party from more tender enterprises. Adopt private database (also be the privacy data set), can guarantee that whole tendering process bid information can not reveal, avoided traditional tendering flow in, the problem of revealing the base bid that the tenderer can exist has guaranteed the fairness of tendering the process. The supervisor has access rights of all bidding process data, can supervise and examine the whole bidding process, and better restricts the behaviors of the tenderer and the bidder. The whole bidding service process is digital, paper documents are electronic, the bidding efficiency is greatly improved, the cost and the resource waste are reduced, and the verification of various documents is facilitated.
In addition to the objects, features and advantages described above, other objects, features and advantages of the present invention are also provided. The present invention will be described in further detail below with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic diagram of a conventional bidding process.
Fig. 2 is a block chain network deployment diagram of a block chain-based supervised bidding and privacy processing method according to a preferred embodiment of the present invention.
Fig. 3 is a flowchart illustrating a method for processing policeable bidding and privacy based on block chains according to a preferred embodiment of the present invention.
Fig. 4 is a timing diagram of a block chain-based supervised bidding and privacy processing method according to another preferred embodiment of the present invention.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
For ease of understanding, the following explains the multi-party nodes and technical terms involved in the blockchain network in the blockchain-based supervised bidding and privacy processing method.
The block chain technology is a distributed book technology which connects blocks in sequence according to a time sequence, combines the blocks into a chain data structure, distributes and uniformly stores the data in each participant, and ensures that the data cannot be falsified and forged in a cryptographic mode. The technology provides a mechanism for the exchange of trusted information with value delivery in an environment without evidence of authority center witness.
The intelligent contract technology is essentially a program written in a certain computing programming language, which is stored in a container provided by a blockchain system and automatically runs under the trigger of a certain external or internal condition. The intelligent contract is reflected in the real world, the rules in the real world are realized by using a computer language, the machine is ensured to automatically execute the preset intelligent contract calculation under certain conditions, and the rules cannot be tampered once fixed.
The private database refers to a set of actual private data and a hash value of the private data (the hash value is protected by a random salt) in a blockchain. The private data is stored on a private database of the authorized organization node, the private data can be accessed by the authorized organization node, and the sequencing node cannot influence the private database and cannot see the private data. The hash value of the private data is endorsed and written into an account book of each node on the chain after being sorted, and the hash value serving as a certificate of transaction can be used for state verification.
The asymmetric encryption technology is different from symmetric encryption, keys used in the encryption and decryption processes of the asymmetric encryption are different and are divided into a public key and a private key, when the public key is used for encrypting data, only the corresponding private key can be used for decrypting the data, when the private key is used for encrypting the data, only the corresponding public key can be used for decrypting the data, and the currently frequently used asymmetric encryption algorithms include an RSA algorithm and an elliptic curve algorithm (ECSDA).
The Hash algorithm is a very basic and important computer algorithm, and can map binary plaintext strings of any length into binary strings (Hash values) of a shorter fixed length, and different plaintext is difficult to map into the same Hash value. An excellent Hash algorithm can implement the following functions: forward fast, reverse difficult, input sensitive, collision avoidance, and therefore, the Hash algorithm is also called fingerprint (fingerprint) or digest (digest).
The identity verification adopts a digital signature technology to realize the reliable identity authentication, the digital signature utilizes the principle of cryptography, has uniqueness relative to a signer during use, and is computationally infeasible to forge a digital signature, so that the real identity of the signer can be identified through the digital signature, and the identity cannot be repudiated.
Aiming at the defects in the prior art, the technical scheme adopted by the invention relates to four roles of a tenderer, a bidder, a supervision mechanism and a bank in service. Corresponding to the block chain network, the expression is as follows: the system comprises a bidding node, a monitoring node, a bank node and a sequencing node, wherein the sequencing node is responsible for transaction sequencing in a block chain network. Wherein:
the bidding party node refers to a legal person or other organization who puts forward bidding items and bids with the goal of preferentially selecting a winning party in the bidding activity;
the bidder node refers to an enterprise responding to bidding and participating in bidding competition;
a supervisor node refers to an organization or organization that supervises bidding activity;
the bank node refers to a financial institution which is established by law and operates monetary credit business, and is particularly referred to as a legal financial institution which provides financial services for bidding activities.
The sequencing node is only responsible for sequencing and packaging the transaction and then sending the transaction to each node in the block chain, and does not participate in verifying the transaction.
Before the implementation of the present invention, it is first necessary to construct a bidding network, as shown in fig. 2, which includes a bidding party, a supervisor, a bidding party, and a bank. In this network, each node needs to define its own private database, install the corresponding chain code (i.e. intelligent contract), and the network structure and the private databases owned by each node are described as follows:
private database and linked database description
Private database PDC (ZJ) which is a private database shared by the tenderer node and the supervisor node and used for storing the examination result;
the private database PDC (ZT) is a private database shared by the tenderer node and the bidder node and used for storing contract information after bid winning;
private database PDC (T) for storing the examination data and bidding information of the bidder node; (Only the bidder node can write in the private database, and the tenderer node can read specific information under certain conditions)
The private database PDC (B) is a private database owned by the bank node and used for storing the transfer information;
and the private database OFD (Z) is a linked database owned by the tendering party node, and the supervisor node has the reading authority of the private database.
Intelligent contract function specification
Intelligent contracts ST1(ZJ), wherein the chain code used by the bidding party node to issue the bidding information, and Z, J in brackets indicates that calling the chain code requires endorsement through the bidding party node and the supervisor node;
intelligent contract ST2(Z), chain code used by the tenderer node to issue the examination result;
the intelligent contract ST1(T) is used for uploading the bidding qualification file and the chain code of the bidding file by the bidder and the chain code can be called by the tenderer to access the information of the bidding file after the bidding deadline;
the intelligent contract ST3(ZT) is used for signing the chain code of contract uploading contract information after the tenderer node and the bidder node are calibrated;
intelligent contract ST1(B) the chain code used by the bank node to issue transfer information.
The blockchain ledger of the present invention comprises two components, a world state and a blockchain. The world state is a database used for storing a set of current states of the accounts, namely the condition that all accounts hold accounts receivable; the blockchain is a transaction log that records all changes that contribute to the current world state, i.e., the flow records between all accounts. Transactions recorded in the blockchain change the state of certain accounts, and thus change the world state of the ledger.
The present invention will be described in detail with reference to specific examples.
As shown in fig. 3, a method for processing policeable bid and privacy based on block chain includes the following steps:
s1, calling an intelligent contract ST1(ZT) by a bidding party node, issuing bidding information, wherein endorsements of the bidding party and a supervisor are required in the process, and the bidding information is uploaded to a block chain in a public form;
s2, the bidder node calls an intelligent contract ST1(T), the bidding qualification information is uploaded, the bidding qualification information is stored in a public account book in a Hash form after being identified, specific contents are stored in a private database PDC (T) of the bidder node, the bidder node then sends the specific contents contained in the Hash data to the tenderer node, and the tenderer node stores the specific contents in a down-link database OFD (Z);
s3, the tenderer node receives the review data, verifies whether the review data conforms to the Hash of the data uploaded to the block chain by the tenderer, and verifies whether the tenderer node has bidding qualification, if so, the tenderer node is informed to transfer the bidding guarantee fund to a specified bank account;
s4, the bidder node receives the notification, transfers the required deposit to the designated bank account, and notifies the bank node to upload the transfer record to the block chain;
s5, the bank node calls an intelligent contract ST1(B), the transfer information of the bidder node is uploaded to a block chain, the Hash of the transfer record is reserved on a channel account book, the specific content is stored in a private database PDC (B) of the bank node, and the tenderer node is informed of the account information of the deposit;
s6, when the deposit payment date is up, the tenderer node calls an intelligent contract ST2(z), the examination result is uploaded to a block chain in a Hash form, whether the block chain has a bidding qualification or not is disclosed, and the specific content of the Hash data is stored in a public set PDC (ZJ) shared by the tenderer node and the supervisor node;
s7, after determining that the node has the bidding qualification, the node of the bidder calls an intelligent contract ST1(T), the bidding information is uploaded to a block chain public account book in a Hash mode, and the specific content is stored in a private database PDC (T) of the node of the bidder;
s8, when the bidding date is reached, the tenderer node reads the bidding information of each tenderer node and stores the bidding information in the off-link database OFD (Z);
s9, the tenderer node evaluates the tender of each tenderer node, determines the result of winning a bid, and calls an intelligent contract ST3(Z) to release the result of winning a bid to a block chain in a public form (selectively publishing a part of non-sensitive information);
s10, if each bidder node disagrees with the bidding result, after the publication period is over, the tenderer node informs the bank node that the bank node will refund the deposit of each bidder node, the bank node calls an intelligent contract ST1(B), the transfer record Hash is uploaded to a block chain, the specific information is stored in a private database PDC (B) of the bank, and the tenderer node and the bidder node are informed of the transfer information;
s11, the tenderer node and the bidder node sign a contract, an intelligent contract is called to upload the contract and the contract is uploaded to a block chain public account book in a Hash mode, and the specific content is stored in a public database PDC (ZT) shared by the tenderer node and the bidder node.
According to the method for processing supervision tendering and privacy based on the block chain, all tendering information is concentrated on the chain through the block chain to be shared, and by means of the technical scheme combining the block chain technology, asymmetric encryption, a Hash algorithm, a digital signature, an intelligent contract, a privacy data set and identity authentication, single data are electronized and business processes are digitized, so that the trouble that tenderers find the tendering information from various channels is eliminated, and the tenderers can conveniently find better bidders from more bidding enterprises. Adopt private database (also be the privacy data set), can guarantee that whole tendering process bid information can not reveal, avoided traditional tendering flow in, the problem of revealing the base bid that the tenderer can exist has guaranteed the fairness of tendering the process. The supervisor has access rights of all bidding process data, can supervise and examine the whole bidding process, and better restricts the behaviors of the tenderer and the bidder. The whole bidding service process is digital, paper documents are electronic, the bidding efficiency is greatly improved, the cost and the resource waste are reduced, and the verification of various documents is facilitated.
Specifically, the intelligent contract ST1(T) is also used to ensure that after the bid deadline has passed, the tenderer node can read the specific bid information of the bidder node through the intelligent contract ST1 (T).
In another preferred embodiment of the present invention, after the tenderer node publishes the winning bid result to the blockchain in a public form and before the publication period is over, the method further includes the following steps:
s9a, other bidding party nodes not winning the bid check the bid-winning result, if the result is objected (the scheme of the node is considered to be superior to that of the winning bid party, such as lower quotation, etc.), the monitoring party is requested to intervene, so that the monitoring effect is played on the bid-winning process, and the fairness of the bid-winning process is ensured.
In a preferred embodiment of the present invention, after the column of whether the bid qualifiers is disclosed, the method further comprises the following steps:
and S6a, informing the bidder node, checking whether the bidder node has bidding qualification according to the identity ID when the bidder node registers on the block chain, and inquiring the tenderer node or reflecting the tenderer node to the supervisor node through a wire-down mode if the result is questioned, so that a supervision effect is exerted on the tendering process, and fairness of the tendering process is ensured.
In a preferred embodiment of the present invention, the tenderer node evaluates the tender book of each tenderer node, and the determination of the bid-winning result specifically includes the steps of:
s91, establishing an index system: the index system comprises a total target A, a primary index B and a secondary index C, wherein the total target is a credit risk assessment value of a bidding enterprise, and the primary index comprises a non-financial index and a financial index; the secondary indexes include enterprise qualification grade indexes of subordination and non-financial indexes, credit indexes of high management personnel, legal proceedings indexes of nearly three years, poor performance record indexes, and asset liability condition indexes, enterprise operating income condition indexes and enterprise profit rate indexes of subordination and non-financial indexes, which are shown in table 1:
TABLE 1
Figure BDA0002923989280000131
S92, establishing a judgment matrix: the weight coefficients of the same level factor are obtained from high to low, and the weight coefficients comprise the weight coefficient of the primary index to each factor of the total target and the weight coefficient of the secondary index to each factor of the primary index;
and S93, consistency check, namely after the judgment matrix is obtained, if the judgment of each evaluation expert is inconsistent, checking the consistency of thinking of a decision maker by adopting a common consistency index CI, wherein the CI is expressed as follows:
Figure BDA0002923989280000141
wherein λ ismaxComparing CI with the average random consistency index RI to obtain the random consistency ratio CR:
Figure BDA0002923989280000142
when the random consistency ratio CR is less than or equal to a set threshold, the judgment matrix is considered to have consistency, the evaluation is reliable, otherwise, the expert is required to evaluate again;
s94, calculating a combination weight coefficient: according to the weight coefficient of each factor of the primary index and the weight coefficient of each factor of the primary index by the secondary index, the combined weight coefficient of the influence of each factor of the secondary index on the total target is obtained
Figure BDA0002923989280000143
S95, risk calculation: according to the obtained combined weight coefficient of the influence of each factor of the secondary index on the total target
Figure BDA0002923989280000144
The assessment committee can obtain the credit risk assessment value of the bidding enterprise by scoring each factor of the secondary indexes:
Figure BDA0002923989280000145
wherein: r represents the credit risk value of the bidding enterprise, C represents the grade of each factor of the secondary indexes by the evaluation committee:
C=(c1,…,c7)T
s96, determining a winning bid result: according to the obtained credit risk assessment value of the bidder, the credit rating of the bidder is divided into excellent, good, general and poor; combining the bids of the bidders, and selecting the bidder with the lowest bid price from the bidders having credit ratings not lower than "normal" or "good" according to the importance of the item.
Specifically, the establishing of the judgment matrix: the method for solving the weight coefficients of the same level factor from high to low comprises the weight coefficient of a first level index to each factor of a total target and the weight coefficient of a second level index to each factor of the first level index, and specifically comprises the following steps:
s921, comparing every two of all factors in the first-level index B by the expert of the Bidding Committee to obtain a numerical value BijThe definitions and explanations are given in table 2; b isA=(bij)2×2Recording a judgment matrix B for a judgment matrix of the first-level index relative to the total target AAHas a maximum characteristic root of
Figure BDA0002923989280000151
Belong to
Figure BDA0002923989280000152
The standard feature vector of (a) is:
Figure BDA0002923989280000153
then omegaB1,ωB2Giving weight coefficients of the primary indexes B1 and B2 to the total target A after the weights are sorted according to the importance degree or preference;
table 2:
relative degree of importance bij cij Definition of Explanation of the invention
1 Of equal importance Object i and object j are equally important
3 Of slight importance Target i is slightly more important than target j
5 Of considerable importance Object i and object j are important
7 Of obvious importance Object i and object j are clearly important
9 Of absolute importance Object i and object j are absolutely important
2,4,6,8 Between two adjacent levels of importance
S922, similarly, the judgment matrixes of the secondary index C1 … C7 relative to the primary indexes B1 and B2 are obtained and respectively expressed as:
Figure BDA0002923989280000154
and the weight coefficient of each factor of the secondary index to each factor of the primary index is respectively expressed as:
Figure BDA0002923989280000155
specifically, the calculation method for calculating the combination weight coefficient of the influence of each factor of the secondary index on the total target is as follows:
Figure BDA0002923989280000156
specifically, in the consistency check step, as shown in table 3, the values of the 1-9 th order decision matrices RI are 0, 0.58, 0.90, 1.12, 1.24, 1.32, 1.41, and 1.45, respectively, and the set threshold is 0.1, that is, if CR is less than or equal to 0.1, the decision matrices are considered to have consistency, and the evaluation is reliable, otherwise, the expert is required to re-evaluate.
TABLE 3
1 2 3 4 5 6 7 8 9
0.00 0.00 0.58 0.90 1.12 1.24 1.32 1.41 1.45
As shown in fig. 4, in another preferred embodiment of the present invention, there is provided a block chain-based supervised bidding and privacy processing method, including the steps of:
s1, calling an intelligent contract ST1(ZT) by a bidding party node, issuing bidding information, wherein endorsements of the bidding party and a supervisor are required in the process, and the bidding information is uploaded to a block chain in a public form;
s2, the bidder node calls an intelligent contract ST1(T), the bidding qualification information is uploaded, the bidding qualification information is stored in a public account book in a Hash form after being identified, specific contents are stored in a private database PDC (T) of the bidder node, the bidder node then sends the specific contents contained in the Hash data to the tenderer node, and the tenderer node stores the specific contents in a down-link database OFD (Z);
s3, the tenderer node receives the review data, verifies whether the review data conforms to the Hash of the data uploaded to the block chain by the tenderer, and verifies whether the tenderer node has bidding qualification, if so, the tenderer node is informed to transfer the bidding guarantee fund to a specified bank account;
s4, the bidder node receives the notification, transfers the required deposit to the designated bank account, and notifies the bank node to upload the transfer record to the block chain;
s5, the bank node calls an intelligent contract ST1(B), the transfer information of the bidder node is uploaded to a block chain, the Hash of the transfer record is reserved on a channel account book, the specific content is stored in a private database PDC (B) of the bank node, and the tenderer node is informed of the account information of the deposit;
s6, when the deposit payment date is up, the tenderer node calls an intelligent contract ST2(z), the examination result is uploaded to a block chain in a Hash form, whether the block chain has a bidding qualification or not is disclosed, and the specific content of the Hash data is stored in a public set PDC (ZJ) shared by the tenderer node and the supervisor node;
s7, after determining that the node has the bidding qualification, the node of the bidder calls an intelligent contract ST1(T), the bidding information is uploaded to a block chain public account book in a Hash mode, and the specific content is stored in a private database PDC (T) of the node of the bidder;
s8, when the bidding date is reached, the tenderer node reads the bidding information of each tenderer node and stores the bidding information in the off-link database OFD (Z);
s9, the tenderer node evaluates the tender of each tenderer node, determines the result of winning a bid, and calls an intelligent contract ST3(Z) to release the result of winning a bid to a block chain in a public form (selectively publishing a part of non-sensitive information);
s10, other bidders not winning the bid check the winning bid result, and if the result shows that the tenderer feels that the fraud phenomenon exists (the scheme of the tenderer is considered to be superior to that of the winning bid party, such as lower quotation, etc.), the tenderer is requested to intervene;
s11, if each bidder node disagrees with the bidding result, after the publication period is over, the tenderer node informs the bank node that the bank node will refund the deposit of each bidder node, the bank node calls an intelligent contract ST1(B), the transfer record Hash is uploaded to a block chain, the specific information is stored in a private database PDC (B) of the bank, and the tenderer node and the bidder node are informed of the transfer information;
s12, the tenderer node and the bidder node sign a contract, an intelligent contract is called to upload the contract and the contract is uploaded to a block chain public account book in a Hash mode, and the specific content is stored in a public database PDC (ZT) shared by the tenderer node and the bidder node.
Another preferred embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the program, the processor implements the method for processing supervised bidding and privacy based on block chains as described in the above embodiments.
Another preferred embodiment of the present invention provides a storage medium, which includes a stored program, and when the program runs, the storage medium controls a device in which the storage medium is located to execute the method for supervised bidding and privacy processing based on block chains as described in the foregoing embodiments.
It can be seen that the block chain-based supervised bidding and privacy processing method provided by the above embodiments has the following characteristics:
a system for tendering and bidding is designed by utilizing a block chain technology, tenderers of all organizations or places can conveniently acquire corresponding tendering information, and meanwhile, a tenderer is helped to screen out more suitable tenderers.
By using asymmetric encryption, a Hash algorithm, a digital identity, a digital signature and a private data set technology, the method realizes that the bidding information cannot be tampered, the bidding process can be verified, and the method is convenient for post supervision and audit.
And adding a supervision node, examining bid inviting information and final bid winning information, and solving the problem of supervision loss in the traditional bid inviting process.
In summary, the invention utilizes the technical scheme of combining the block chain technology, asymmetric encryption, Hash algorithm, digital signature, intelligent contract, privacy data set and identity authentication, thereby digitalizing the single data and the service flow, improving the bidding efficiency and reducing the cost. The bidding information is integrated into the block chain, so that the problem that bidders are difficult to acquire the bidding information is solved, and the bidders are helped to screen out better bidders from more bidding enterprises. Meanwhile, a supervisor is introduced, and a privacy data set is added, so that the phenomena of cheating such as exposure of bidding bases and the like in the bidding process can be effectively avoided, and the fairness of bidding activities and the privacy of data of all relevant parties are ensured.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The functions of the method of the present embodiment, if implemented in the form of software functional units and sold or used as independent products, may be stored in one or more storage media readable by a computing device. Based on such understanding, part of the contribution of the embodiments of the present invention to the prior art or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device, a network device, or the like) to execute all or part of the steps of the method described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A supervise bidding and privacy processing method based on a block chain is characterized by comprising the following steps:
calling an intelligent contract ST1(ZT) by a tenderer node, issuing tendering information, wherein endorsements of the tenderer and a supervisor are required in the process, and the tendering information is uploaded to a block chain in a public form;
the bidder node calls an intelligent contract ST1(T) and uploads bidding qualification information, the bidding qualification information is stored in a public account book in a Hash form after being identified, specific contents are stored in a private database PDC (T) of the bidder node, the bidder node then sends the specific contents contained in the Hash data to the tenderer node, and the tenderer node stores the specific contents in a down-link database OFD (Z);
the tenderer node receives the examination data, verifies whether the examination data is in accordance with the Hash of the data uploaded to the block chain by the tenderer, and verifies whether the tenderer node has bidding qualification, if so, the tenderer node is informed to transfer the bidding deposit to a specified bank account;
the bidder node receives the notification, transfers the required deposit to the designated bank account, and notifies the bank node to upload the transfer record to the block chain;
the bank node calls an intelligent contract ST1(B), transfers the transfer information of the bidder node to a block chain, the channel account book retains the Hash of the transfer record, the specific content is stored in a private database PDC (B) of the bank node, and the tenderer node is informed of the account information of the deposit;
when the guarantee fund payment date is up, the tenderer node calls an intelligent contract ST2(z), the examination result is uploaded to a block chain in a Hash mode, whether the block chain has bidding qualification or not is disclosed, and the specific content of the Hash data is stored in a private set PDC (ZJ) shared by the tenderer node and the supervisor node;
after determining that the node has the bidding qualification, the node of the bidder calls an intelligent contract ST1(T), uploads bidding information to a block chain public account book in a Hash mode, and the specific content is stored in a private database PDC (T) of the node of the bidder;
when the bidding date is reached, the tenderer node reads the bidding information of each bidder node and stores the bidding information in the off-link database OFD (Z);
the tenderer node evaluates the tender book of each tenderer node, determines the winning result, calls an intelligent contract ST3(Z), and publishes the winning result to the block chain in a public form;
if each bidder node disagrees with the bidding result, after the publication period is finished, the tenderer node informs the bank node that the deposit of each bidder node will be returned, the bank node calls an intelligent contract ST1(B), the transfer record Hash is uploaded to a block chain, the specific information is stored in a private database PDC (B) of the bank, and the tenderer node and the bidder node are informed to transfer the information;
and the tenderer node signs a contract with the bidder node, calls an intelligent contract to upload the contract and uploads the contract to the block chain public account book in a Hash mode, and the specific content is stored in a public database PDC (ZT) shared by the tenderer node and the bidder node.
2. The method of claim 1, wherein the intelligent contract ST1(T) is further used to ensure that after a bid deadline has passed, a tenderer node can read specific bid information of the bidder node via the intelligent contract ST1 (T).
3. The method of claim 1, wherein the tenderer node publishes the winning bid result to the blockchain in a public manner before the publication period is over, and further comprising the steps of:
other bidder nodes not winning the bid look at the bid-winning result, and if the result is objected, the other bidder nodes request for the intervention of the supervisor.
4. The method for supervised bidding and privacy handling based on block chain as claimed in claim 1, wherein said post-publication of bid qualification to a column further comprises the steps of:
and informing the bidder node, checking whether the bidder node has the bidding qualification according to the identity ID when the bidder node registers on the block chain, and inquiring the tenderer node or reflecting the tenderer node to the supervisor node through a line if the result is questioned.
5. The method for policeable bid-tendering and privacy processing based on block chains according to claim 1, wherein the bid-tenderer node evaluates the bid statement of each bidder node, and determining the bid-winning result specifically comprises the steps of:
establishing an index system: the index system comprises a total target A, a primary index B and a secondary index C, wherein the total target is a credit risk assessment value of a bidding enterprise, and the primary index comprises a non-financial index and a financial index; the secondary indexes comprise enterprise qualification grade indexes of subordinative and non-financial indexes, credit indexes of high management personnel, legal proceedings indexes of nearly three years, poor performance record indexes, and asset liability condition indexes, enterprise operating income condition indexes and enterprise profit rate indexes of subordinative and non-financial indexes;
establishing a judgment matrix: the weight coefficients of the same level factor are obtained from high to low, and the weight coefficients comprise the weight coefficient of the primary index to each factor of the total target and the weight coefficient of the secondary index to each factor of the primary index;
and (3) consistency check, namely after a judgment matrix is obtained, if the judgment of each evaluation expert is inconsistent, checking the consistency of thinking of a decision maker by adopting a common consistency index CI, wherein the CI is expressed as follows:
Figure FDA0002923989270000031
wherein λ ismaxComparing CI with the average random consistency index RI to obtain the random consistency ratio CR:
Figure FDA0002923989270000032
when the random consistency ratio CR is less than or equal to a set threshold, the judgment matrix is considered to have consistency, the evaluation is reliable, otherwise, the expert is required to evaluate again;
calculating a combination weight coefficient: according to the weight coefficient of each factor of the first-level index and the second-level index to oneThe weight coefficient of each factor of the level index, and the combined weight coefficient of the influence of each factor of the level index on the total target
Figure FDA0002923989270000033
And (3) risk calculation: according to the obtained combined weight coefficient of the influence of each factor of the secondary index on the total target
Figure FDA0002923989270000034
The assessment committee can obtain the credit risk assessment value of the bidding enterprise by scoring each factor of the secondary indexes:
Figure FDA0002923989270000041
wherein: r represents the credit risk value of the bidding enterprise, C represents the grade of each factor of the secondary indexes by the evaluation committee:
C=(c1,…,c7)T
and (4) determining a winning bid result: according to the obtained credit risk assessment value of the bidder, the credit rating of the bidder is divided into excellent, good, general and poor; combining the bids of the bidders, and selecting the bidder with the lowest bid price from the bidders having credit ratings not lower than "normal" or "good" according to the importance of the item.
6. The method of claim 5, wherein the establishing a decision matrix comprises: the method for solving the weight coefficients of the same level factor from high to low comprises the weight coefficient of a first level index to each factor of a total target and the weight coefficient of a second level index to each factor of the first level index, and specifically comprises the following steps:
firstly, the evaluation committee experts compare every two factors in the first-level index B to obtain a numerical value Bij,BA=(bij)2×2Recording a judgment matrix B for a judgment matrix of the first-level index relative to the total target AAIs the most important ofRoot of large character is
Figure FDA0002923989270000042
Belong to
Figure FDA0002923989270000043
The standard feature vector of (a) is:
Figure FDA0002923989270000044
then omegaB1,ωB2Giving weight coefficients of the primary indexes B1 and B2 to the total target A after the weights are sorted according to the importance degree or preference;
similarly, the judgment matrixes of the secondary indexes C1 … C7 relative to the primary indexes B1 and B2 are respectively expressed as:
Figure FDA0002923989270000045
and the weight coefficient of each factor of the secondary index to each factor of the primary index is respectively expressed as:
Figure FDA0002923989270000046
7. the method of claim 6, wherein the combined weight coefficients of the factors of the secondary indicators on the total target are calculated as follows:
Figure FDA0002923989270000051
8. the method for supervised bidding and privacy processing based on blockchain as claimed in claim 5, wherein in the step of consistency check, the values of the 1-9 th order decision matrix RI are 0, 0.58, 0.90, 1.12, 1.24, 1.32, 1.41 and 1.45, respectively, and the set threshold is 0.1.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the block chain based supervised bidding and privacy processing method of any of claims 1 to 8.
10. A storage medium comprising a stored program, wherein the program, when executed, controls a device on which the storage medium resides to perform the block chain-based supervised bidding and privacy handling method according to any one of claims 1 to 8.
CN202110125856.1A 2021-01-29 2021-01-29 Block chain-based method, device and medium for processing supervision bidding and privacy Active CN112767091B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110125856.1A CN112767091B (en) 2021-01-29 2021-01-29 Block chain-based method, device and medium for processing supervision bidding and privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110125856.1A CN112767091B (en) 2021-01-29 2021-01-29 Block chain-based method, device and medium for processing supervision bidding and privacy

Publications (2)

Publication Number Publication Date
CN112767091A true CN112767091A (en) 2021-05-07
CN112767091B CN112767091B (en) 2024-03-01

Family

ID=75703734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110125856.1A Active CN112767091B (en) 2021-01-29 2021-01-29 Block chain-based method, device and medium for processing supervision bidding and privacy

Country Status (1)

Country Link
CN (1) CN112767091B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113706056A (en) * 2021-09-23 2021-11-26 常州市公共资源交易中心 Bidding unit performance identification early warning method, device, equipment and storage medium
CN113837558A (en) * 2021-08-31 2021-12-24 远光软件股份有限公司 Bidding evaluation method and related device
CN114626078A (en) * 2022-03-21 2022-06-14 江苏仪化信息技术有限公司 Data security management method and system for material purchasing
CN114707997A (en) * 2021-07-23 2022-07-05 山东浪潮爱购云链信息科技有限公司 Method and storage medium for preventing malicious competition of tendering and bidding
CN117592458A (en) * 2024-01-19 2024-02-23 辽宁省网联数字科技产业有限公司 Digital bidding document blind box analysis method and system based on artificial intelligence

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684287A (en) * 2018-12-29 2019-04-26 厦门链平方科技有限公司 Gateway information sharing query method and system based on block chain
CN109858893A (en) * 2019-03-12 2019-06-07 黑龙江世纪精彩科技有限公司 A kind of bidding contract administration method based on block chain
CN110020927A (en) * 2018-12-11 2019-07-16 浙江工商大学 A kind of open Bidding Methods based on block chain
CN110503523A (en) * 2019-08-23 2019-11-26 宁夏神州好易信息发展股份有限公司 A kind of e-bidding purchasing system based on block chain technology
CN110971656A (en) * 2018-10-01 2020-04-07 施耐德电器工业公司 Secure storage of data in blockchains
CN111461486A (en) * 2020-03-02 2020-07-28 广州高新工程顾问有限公司 Project bidding agent information management system based on project management
CN111639361A (en) * 2020-05-15 2020-09-08 中国科学院信息工程研究所 Block chain key management method, multi-person common signature method and electronic device
CN111681015A (en) * 2020-06-10 2020-09-18 复旦大学 Product tracing method, system and equipment based on alliance chain
CN111797415A (en) * 2020-06-30 2020-10-20 远光软件股份有限公司 Block chain based data sharing method, electronic device and storage medium
CN112134923A (en) * 2020-08-14 2020-12-25 广州大学 Bidding information processing method, system, device and medium based on block chain

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971656A (en) * 2018-10-01 2020-04-07 施耐德电器工业公司 Secure storage of data in blockchains
CN110020927A (en) * 2018-12-11 2019-07-16 浙江工商大学 A kind of open Bidding Methods based on block chain
CN109684287A (en) * 2018-12-29 2019-04-26 厦门链平方科技有限公司 Gateway information sharing query method and system based on block chain
CN109858893A (en) * 2019-03-12 2019-06-07 黑龙江世纪精彩科技有限公司 A kind of bidding contract administration method based on block chain
CN110503523A (en) * 2019-08-23 2019-11-26 宁夏神州好易信息发展股份有限公司 A kind of e-bidding purchasing system based on block chain technology
CN111461486A (en) * 2020-03-02 2020-07-28 广州高新工程顾问有限公司 Project bidding agent information management system based on project management
CN111639361A (en) * 2020-05-15 2020-09-08 中国科学院信息工程研究所 Block chain key management method, multi-person common signature method and electronic device
CN111681015A (en) * 2020-06-10 2020-09-18 复旦大学 Product tracing method, system and equipment based on alliance chain
CN111797415A (en) * 2020-06-30 2020-10-20 远光软件股份有限公司 Block chain based data sharing method, electronic device and storage medium
CN112134923A (en) * 2020-08-14 2020-12-25 广州大学 Bidding information processing method, system, device and medium based on block chain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114707997A (en) * 2021-07-23 2022-07-05 山东浪潮爱购云链信息科技有限公司 Method and storage medium for preventing malicious competition of tendering and bidding
CN113837558A (en) * 2021-08-31 2021-12-24 远光软件股份有限公司 Bidding evaluation method and related device
CN113706056A (en) * 2021-09-23 2021-11-26 常州市公共资源交易中心 Bidding unit performance identification early warning method, device, equipment and storage medium
CN114626078A (en) * 2022-03-21 2022-06-14 江苏仪化信息技术有限公司 Data security management method and system for material purchasing
CN117592458A (en) * 2024-01-19 2024-02-23 辽宁省网联数字科技产业有限公司 Digital bidding document blind box analysis method and system based on artificial intelligence
CN117592458B (en) * 2024-01-19 2024-04-05 辽宁省网联数字科技产业有限公司 Digital bidding document blind box analysis method and system based on artificial intelligence

Also Published As

Publication number Publication date
CN112767091B (en) 2024-03-01

Similar Documents

Publication Publication Date Title
CN112767091B (en) Block chain-based method, device and medium for processing supervision bidding and privacy
US11170376B2 (en) Informational and analytical system and method for ensuring the level of trust, control and secure interaction of counterparties when using electronic currencies and contracts
CN108737361B (en) Data verification method based on block chain
TWI389046B (en) Trusted third party clearing house for lead tracking
Duh et al. Control and assurance in e-commerce: Privacy, integrity, and security at eBay
WO2019242285A1 (en) Blockchain-based equity asset value token money creating method and system, and blockchain-based equity asset value token money transaction method and system
US20210224759A1 (en) Method and System for Implementing a Currency Guaranteed By An Investment Vehicle
CN112632186A (en) Block chain consensus method, computer equipment and block chain system
US20210319510A1 (en) Blockchain-based system for providing mergers and acquisitions service, and operation method therefor
CN112862475A (en) Block chain-based order financing method and system, equipment and storage medium
CN112801778A (en) Federated bad asset blockchain
WO2020242550A1 (en) Ensuring trust levels when using electronic currencies
Lewtan et al. Blockchain: Opportunity to improve financial reporting and corporate governance
Önkan et al. The Impact of Blockchain Technology on Tax and Accounting Practices
CN112862469A (en) Block chain-based digital asset transaction method, system, equipment and storage medium
Swanson Watermarked tokens and pseudonymity on public blockchains
Blythe The tiger on the peninsula is digitized: Korean e-commerce law as a driving force in the world's most computer-savvy nation
KR102319496B1 (en) Financial products trading computer, financial products trading system, and financial products trading method
KR102274935B1 (en) open market system for ship supplies providing a transaction recommendation function through web log analysis
Duric et al. New Regulation of Digital Assets for Future Business-Case of Serbia
Lánský Cryptocurrencies and Corruption
Leimgruber et al. Bloom protocol
KR20200093483A (en) System Providing Mergers and Acquisitions Service based on Block Chain using multi-chain layer and Method for operating the same
Sherlock Bitcoin: The case against strict regulation
Hammer The Blockchain Ecosystem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant