CN115311061B - Electronic transaction management method, device, equipment and storage medium based on digital authentication - Google Patents

Electronic transaction management method, device, equipment and storage medium based on digital authentication Download PDF

Info

Publication number
CN115311061B
CN115311061B CN202210942062.9A CN202210942062A CN115311061B CN 115311061 B CN115311061 B CN 115311061B CN 202210942062 A CN202210942062 A CN 202210942062A CN 115311061 B CN115311061 B CN 115311061B
Authority
CN
China
Prior art keywords
bidding
signature
feedback
module
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210942062.9A
Other languages
Chinese (zh)
Other versions
CN115311061A (en
Inventor
陈志红
庄少群
洪鹰群
戚琳
苏洪威
李涛
刘伟胜
赖丙乐
郭自贵
冯聪
汪朦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gongcheng Management Consulting Co ltd
Original Assignee
Gongcheng Management Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gongcheng Management Consulting Co ltd filed Critical Gongcheng Management Consulting Co ltd
Priority to CN202210942062.9A priority Critical patent/CN115311061B/en
Publication of CN115311061A publication Critical patent/CN115311061A/en
Application granted granted Critical
Publication of CN115311061B publication Critical patent/CN115311061B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Real estate management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of electronic transaction, and discloses an electronic transaction management method based on digital authentication. The method comprises the following steps: generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information; extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to independent requirements in the bidding requirements, and carrying out joint authentication on the public module and the private module; signing and marking the acquired bidding feedback according to the bidding signature; carrying out verification screening on the bid feedback to obtain a verification label; and visually displaying the verification labels, and tracing and verifying eliminated labels in the verification labels according to the signature marks to finish unified management. The invention also provides an electronic transaction management device, equipment and a storage medium based on digital authentication. The invention can improve the data processing efficiency of bid management.

Description

Electronic transaction management method, device, equipment and storage medium based on digital authentication
Technical Field
The present invention relates to the field of electronic transaction technologies, and in particular, to a method, an apparatus, a device, and a storage medium for managing an electronic transaction based on digital authentication.
Background
At present, national public resource tendering and bidding, such as tendering and bidding in the property field, gradually form unified requirements, the business is rapidly developed, urgent needs are brought to remote purchasing, remote bid evaluation and the like in the electronic transaction business, particularly the property electronic transaction technical field, however, huge potential safety hazards can be generated in the electronic transaction process along with the increase of tendering and bidding quantity, and in order to reduce the potential safety hazards during tendering and bidding, the tendering and bidding process needs to be managed.
The existing bidding management technology is mostly implemented on the basis of complex encryption technology to encrypt and manage bidding data. For example, in practical application of bidding management based on aes-256-cfb data encryption, data among different bidding parties is difficult to communicate and share due to a complex encryption technology, so that a data island problem is easily caused, information acquisition and feedback are easily caused to be not timely enough, and data processing efficiency for bidding management is possibly low.
Disclosure of Invention
The invention provides an electronic transaction management method, device, equipment and storage medium based on digital authentication, and mainly aims to solve the problem of low data processing efficiency in bidding management.
In order to achieve the above object, the present invention provides an electronic transaction management method based on digital authentication, which includes:
acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing joint authentication on the public module and the private module by using the bidding signature;
acquiring bidding feedback of each bidding party one by one, and performing signature marking on the bidding feedback according to the bidding signature to obtain signature bidding feedback;
verifying and screening the signature bid feedback by using the public module and the private module after combined verification to obtain a verification label;
and visually displaying the verification tags, and tracing and verifying eliminated tags in the verification tags according to the signature marks to finish the unified management.
Optionally, the generating, according to the bidding information, corresponding bidding signatures for each bidding party includes:
converting the bidding information into a bidding information matrix, and performing bit supplementing processing on the bidding information matrix according to a multiplying factor bit length of a preset bit supplementing length to obtain a bit supplementing bidding matrix;
carrying out blocking processing on the supplementary position bidding matrix according to the supplementary position bit length to obtain a supplementary position bidding block set;
and calculating a signature abstract of the bidding information according to the complementary bidding block set by utilizing an XOR compression algorithm as follows:
Figure GDA0004070963800000021
/>
Figure GDA0004070963800000022
wherein H is the signature digest, n is the total number of the complementary place tagging blocks in the complementary place tagging block set, i is the ith place in the complementary place tagging block set,
Figure GDA0004070963800000023
is a characterBitwise XOR sign, h i Is the summary of the ith complement bidding block in the complement bidding block set,% is a modulus symbol, B is the length of the complement bit, R i Is a function of shifting the character bit by bit to the right, which means that the character is cyclically shifted to the right by i bits, M i The number is the ith complement bidding block in the complement bidding block set;
acquiring a preset key of each tenderer, and encrypting the signature digest according to the key by using the following key modular encryption algorithm to obtain a tendering signature:
H 1 =(H p +p)%B
wherein H 1 Is the signing, H is the digest of the signature, p is the secret key, H p The signature digest H and the secret key p are subjected to exponential operation,% is a modulo sign, and B is the complementary bit length.
Optionally, the obtaining the requirement field characteristics corresponding to each of the bidding parties in the bidding requirements one by one includes:
acquiring independent requirements corresponding to each tenderer from the tendering requirements one by one to serve as target requirements;
vectorizing the target demand, and taking the vectorized target demand as the demand field characteristic.
Optionally, the jointly authenticating the public module and the private standing module by using the bidding signature includes:
collecting the bidding signatures of the bidding parties corresponding to the public module into a public signature set;
selecting one bidding signature from the public signature set one by one according to the sequence of signature time as a first target signature, and adding the first target authentication signature behind the public module;
collecting the bidding signatures of the bidding parties corresponding to the private standing module into a private standing signature set;
and selecting one bidding signature from the private signature set one by one according to the sequence of the signature time as a second target signature, and adding the second target authentication signature to the private module to complete the joint authentication.
Optionally, the signing and marking the bid feedback according to the bid signature to obtain a signed bid feedback includes:
generating public bidding feedback and private bidding feedback according to the bidding feedback;
marking the public bidding feedback as public mark feedback by using the tagging name, and marking the private bidding feedback as private mark feedback by using the tagging name;
merging the public sentinel feedback and the private sentinel feedback into the signed bid feedback.
Optionally, the verifying and screening the signature bid feedback by using the public module and the private module after the joint verification to obtain a verification tag includes:
decoding, with the common module, common feedback data from the signed bid feedback;
decoding private feedback data from the signed bid feedback by using the private module;
merging the public feedback data and private feedback data into feedback data;
and marking the qualification degree of the feedback data according to the result of the qualification item in the feedback data to obtain a verification label.
Optionally, the performing source tracing verification on the obsolete tags in the verification tags according to the signature marks includes:
extracting a signature corresponding to the eliminated label as a verification signature;
extracting the bidder corresponding to the eliminated tag as a source-tracing bidder, and acquiring bidding information corresponding to the source-tracing bidder as source-tracing bidding information;
signing the tracing bidding information to obtain a tracing information signature;
judging whether the verification signature is equal to the traceability information signature or not;
when the verification signature is equal to the traceability information signature, determining that the traceability information is authentic, wherein the obsolete label is real data;
and when the verification signature is not equal to the tracing information signature, determining that the tracing information is not true, and the eliminated tag is false data.
In order to solve the above problems, the present invention also provides an electronic transaction management device based on digital authentication, the device comprising:
the bidding signature module is used for acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
the combined authentication module is used for extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing combined authentication on the public module and the private module by using the bidding signature;
the feedback signature module is used for acquiring the bid feedback of each bidder one by one, and performing signature marking on the bid feedback according to the bid signature to obtain signature bid feedback;
the verification tag module is used for verifying and screening the signature bid feedback by using the public module and the private module after combined verification to obtain a verification tag;
and the source tracing verification module is used for visually displaying the verification tags, and performing source tracing verification on eliminated tags in the verification tags according to the signature marks to finish the unified management.
In order to solve the above problem, the present invention also provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the digital authentication-based electronic transaction management method described above.
In order to solve the above problem, the present invention further provides a storage medium having at least one computer program stored therein, the at least one computer program being executed by a processor in a device to implement the above-mentioned digital authentication-based electronic transaction management method.
According to the embodiment of the invention, the bidding signatures corresponding to all the tenderers are generated according to the bidding information, and the bidding signatures corresponding to all the tenderers are generated according to the bidding information, so that the bidding information and the bidding information can be marked, the safety after transmission is ensured, the probing attack of an information security attacker can be effectively prevented, and the key leakage is prevented; by generating a public module according to the bidding requirement in the bidding requirement, the data related to the other field bidding party can be converted into the data of the common target field through the public module, and then the data of the common target field is converted into the data of the field where the bidding party is located through the reverse conversion function of the public module, thereby realizing the intercommunication of the data between different fields, ensuring the timeliness of data transmission and improving the data processing efficiency of the bidding management, and by carrying out the joint authentication on the public module and the private module by using the bidding signature, illegal persons can be prevented from counterfeiting the signature, the security of signature authentication is improved, the data security of the public module and the private module is ensured, and by carrying out the signature marking on the bidding feedback according to the bidding signature, the signature bid feedback is obtained, a data receiving relation in the bid transaction process is realized, subsequent traceability verification can be facilitated, meanwhile, the risk of false bid feedback is reduced, the public module and the private module after combined verification are used for verifying and screening the signature bid feedback to obtain a verification label, the signature bid feedback can be marked according to the qualification or not, subsequent visual display is facilitated, the verification label is visually displayed, a tenderer or a bidder can be conveniently distinguished, a proper transaction object is selected, and the eliminated label in the verification label is subjected to traceability verification according to the signature label, so that the authenticity of data can be ensured, and intelligent market transaction supervision is completed. Therefore, the electronic transaction management method, the electronic transaction management device, the electronic transaction management equipment and the storage medium based on digital authentication can solve the problem of low data processing efficiency in bidding management.
Drawings
Fig. 1 is a schematic flowchart of an electronic transaction management method based on digital authentication according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of generating a common module according to an embodiment of the present invention;
FIG. 3 is a flow diagram illustrating verification of signed bid feedback according to one embodiment of the present invention;
FIG. 4 is a functional block diagram of an electronic transaction management device based on digital authentication according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus for implementing the digital authentication-based electronic transaction management method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the application provides an electronic transaction management method based on digital authentication. The execution subject of the electronic transaction management method based on digital authentication includes, but is not limited to, at least one of a server, a terminal and other devices that can be configured to execute the method provided by the embodiments of the present application. In other words, the digital authentication-based electronic transaction management method may be performed by software or hardware installed in a terminal device or a server device, and the software may be a blockchain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a web service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
Referring to fig. 1, a flowchart of an electronic transaction management method based on digital authentication according to an embodiment of the present invention is shown. In this embodiment, the electronic transaction management method based on digital authentication includes:
s1, acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
in the embodiment of the invention, the bidding information comprises information such as a property management area record number, a field surveyor name, a field surveyor phone number, a bidding person project number and a project name of a bidding party.
Specifically, the bidding information includes information such as credit information, business information, technical information, name of a bidding person in charge, and contact information of the bidder.
In an embodiment of the present invention, the generating a corresponding bidding signature for each bidding party according to the bidding information includes:
converting the bidding information into a bidding information matrix, and performing bit supplementing processing on the bidding information matrix according to a multiplying factor bit length of a preset bit supplementing length to obtain a bit supplementing bidding matrix;
carrying out blocking processing on the supplementary position bidding matrix according to the supplementary position bit length to obtain a supplementary position bidding block set;
and calculating a signature abstract of the bidding information according to the complementary bidding block set by utilizing an XOR compression algorithm as follows:
Figure GDA0004070963800000071
Figure GDA0004070963800000072
wherein H is the signature digest, n is the total number of the complementary tagging blocks in the complementary tagging block set, i is the ith bit in the complementary tagging block set,
Figure GDA0004070963800000073
is the bitwise XOR sign of the characters, h i Is the summary of the ith complement bidding block in the complement bidding block set,% is a modulus symbol, B is the length of the complement bit, R i Is a function of shifting the character bit by bit to the right, which means that the character is cyclically shifted to the right by i bits, M i The number is the ith complement bidding block in the complement bidding block set;
acquiring a preset key of each tenderer, and encrypting the signature digest according to the key by using the following key modular encryption algorithm to obtain a tendering signature:
H 1 =(H p +p)%B
wherein H 1 Means the signup signature, H means the signature digest, p means the secret key, H p The signature digest H and the secret key p are subjected to exponential operation,% is a modulo sign, and B is the complementary bit length.
Specifically, the bidding information may be converted into a bidding information matrix by ASCII encoding or one-hot encoding.
In detail, the bit length of the complement may be a multiple of 64, such as 128, 256, and 512.
In detail, the bit-adding processing is performed on the bid information matrix according to a preset multiplying factor bit length of the bit-adding length to obtain a bit-adding bid matrix, where the bit length of the bid information matrix is a multiple of the bit length of the bit-adding length by adding zero at the end of the bid information matrix.
Specifically, the keys of the tenderers may be randomly generated and distributed through a KeyGen algorithm.
In detail, the method for generating the corresponding bid signature for each bidder according to the bid information is the same as the method for generating the corresponding bid signature for each bidder according to the bid information, and is not repeated here.
In the embodiment of the invention, the signature abstract of the bid inviting information is calculated according to the complementary bid inviting block set through the XOR compression algorithm, the signature of the bid inviting information can be simplified, the bid inviting information can be effectively compressed to obtain a unique signature, the verification before and after transmission is convenient, the signature abstract is encrypted according to the private key through the key modulo encryption algorithm to obtain the bid inviting signature, and the security of the bid inviting information in the transmission process is further improved.
In the embodiment of the invention, the bidding information and the bidding information can be marked by generating the corresponding bidding signature for each bidding party according to the bidding information and generating the corresponding bidding signature for each bidding party according to the bidding information, so that the safety after transmission is ensured, the probing attack of an information safety attacker can be effectively prevented, and the key leakage is prevented.
S2, extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing combined authentication on the public module and the private module by using the bidding signature;
in the embodiment of the invention, the bidding requirements can include the requirements of client category, whether to enter a trading center, whether to purchase by government, whether to need a deposit and the like.
In detail, the common module is a module which converts each independent requirement into the same format and is convenient for trans-provincial and trans-regional data resource sharing.
In an embodiment of the present invention, referring to fig. 2, the generating a common module according to the bidding requirement includes:
s21, acquiring the demand field characteristics corresponding to each tenderer in the tendering demands one by one;
s22, calculating the minimum domain distance between the minimum domain distance and all the required domain characteristics by the following domain distance formula:
Figure GDA0004070963800000081
wherein D is a minimum field distance, min is a minimum function, arccos is an inverse cosine function, m is a total number of demand field features in the bidding demand, A is j J is the jth requirement field characteristic in the bidding requirement, j is the jth bit in the bidding requirement, and k is the kth bit in the bidding requirement;
and S23, converting the data of the tenderer into public data of a common target field one by one, and generating the public template according to the public data.
Specifically, the acquiring the requirement field characteristics corresponding to each bidding party in the bidding requirements one by one includes:
acquiring independent requirements corresponding to each tenderer from the tendering requirements one by one to serve as target requirements;
vectorizing the target demand, and taking the vectorized target demand as the demand field characteristic.
Specifically, the target requirements can be vectorized using One-Hot encoding, i.e., one-Hot encoding, also known as One-bit-efficient encoding, by using an N-bit state register to encode N states, each state having its own independent register bits and only One of which is active at any time.
In detail, the converting the data of the tenderer into the public data of the common target field one by one includes:
converting the data of the tenderer into column vector data one by one;
taking the demand domain feature corresponding to the minimum domain distance as a target domain feature of a common target domain;
and multiplying the column vector data by the target field features to obtain the public data of the common target field.
In the embodiment of the invention, the minimum domain distance between the minimum domain distance formula and all the demand domain characteristics is calculated through the domain distance formula, so that the demand domain characteristics corresponding to the minimum domain distance can be ensured to be the characteristic vectors which are most similar to all the demand domain characteristics, and the calculated amount of common module data conversion is simplified.
In detail, the method for generating the private module according to the independent requirement in the bidding requirement is consistent with the method for acquiring the requirement field characteristics corresponding to each bidding party in the bidding requirement one by one in the step S2, and details are not repeated here.
Specifically, the independent requirement refers to a bidding requirement of each bidding party, for example, a PDF format bidding document uploaded by each bidding party.
In an embodiment of the present invention, the performing, by using the bidding signature, joint authentication on the public module and the private module includes:
collecting the bidding signatures of the bidding parties corresponding to the public module into a public signature set;
selecting one bidding signature from the public signature set one by one according to the sequence of signature time as a first target signature, and adding the first target authentication signature behind the public module;
collecting the bidding signatures of the bidding parties corresponding to the private standing module into a private standing signature set;
and selecting one invitation signature from the private signature set one by one according to the sequence of the signature time as a second target signature, and adding the second target authentication signature to the private module to complete combined authentication.
In the embodiment of the invention, the public module is generated according to the bidding requirement, the data related to the other field bidding party can be converted into the data of the common target field through the public module, and then the data of the common target field is converted into the data of the field where the bidding party is located through the reverse conversion function of the public module, so that the intercommunication of the data among different fields is realized, the timeliness of data transmission is ensured, the data processing efficiency of bidding management is improved, the public module and the private module are jointly authenticated by using the bidding signature, illegal persons can be prevented from counterfeiting the signature, the security of signature authentication is improved, and the data security of the public module and the private module is ensured.
S3, acquiring the bid feedback of each bidder one by one, and signing and marking the bid feedback according to the bid signature to obtain signed bid feedback;
in the embodiment of the invention, the bidding feedback may refer to the credit score of the enterprise, whether the technical information of the enterprise is sufficient, and the like.
In an embodiment of the present invention, the signing and marking the bid feedback according to the bid signature to obtain a signed bid feedback includes:
generating public bidding feedback and private bidding feedback according to the bidding feedback;
marking the public bidding feedback as public mark feedback by using the tagging name, and marking the private bidding feedback as private mark feedback by using the tagging name;
merging the public indicia feedback and the private indicia feedback into the signed bid feedback.
In detail, the method for splitting the bid feedback into the public bid feedback and the private bid feedback is consistent with the method for generating the public module according to the bid inviting requirement and generating the private module according to the independent requirement corresponding to each bid inviting party in the bid inviting requirement in step S2, and is not repeated here.
Specifically, the method for marking the public bidding feedback as public mark feedback by using the tagging name and the method for marking the private bidding feedback as private mark feedback by using the tagging name are the same as the method for performing joint authentication on the public module and the private module by using the bidding signature in the step S2, and details are not repeated here.
In the embodiment of the invention, the signature marking is carried out on the bid feedback according to the bid signature to obtain the signature bid feedback, so that the data carrying relation in the bid transaction process is realized, the subsequent traceability verification can be facilitated, and the risk of false bid feedback is reduced.
S4, verifying and screening the signature bid feedback by using the public module and the private module after combined verification to obtain a verification label;
in an embodiment of the present invention, referring to fig. 3, the obtaining a verification tag by verifying and screening the signature bid feedback by using the public module and the private module after the joint verification includes:
s31, decoding public feedback data from the signed bidding feedback by using the public module;
s32, decoding private feedback data from the signature bidding feedback by using the private module;
s33, combining the public feedback data and the private feedback data into feedback data;
and S34, marking the qualification degree of the feedback data according to the result of the qualified item in the feedback data to obtain a verification label.
In detail, the decoding of the public feedback tag from the signed bid feedback by using the public module means that the public mark feedback of the signed bid feedback is divided by the target field characteristic to obtain public feedback data.
In particular, the amount of the solvent to be used, the method of decoding private feedback data from the signed bid feedback using the private module is consistent with the method of decoding a public feedback tag from the signed bid feedback using the public module, and will not be described in detail herein.
In the embodiment of the invention, the public module and the private module after combined verification are used for verifying and screening the signature bid feedback to obtain the verification label, and the signature bid feedback can be distinguished and marked according to the qualification or not, so that the subsequent visual display is convenient.
And S5, visually displaying the verification labels, and tracing and verifying eliminated labels in the verification labels according to the signature marks to finish unified management.
In the embodiment of the invention, the visually displaying the verification tag means that the verification tag is split into a qualified tag and a rejected tag according to the result of the qualification marking, and the qualified tag and the rejected tag are visually displayed respectively.
In an embodiment of the present invention, the tracing and verifying the obsolete tags in the verification tags according to the signature includes:
extracting a signature corresponding to the eliminated label as a verification signature;
extracting the bidder corresponding to the eliminated tag as a source-tracing bidder, and acquiring bidding information corresponding to the source-tracing bidder as source-tracing bidding information;
signing the tracing bidding information to obtain a tracing information signature;
judging whether the verification signature is equal to the traceability information signature or not;
when the verification signature is equal to the traceability information signature, determining that the traceability information is authentic, wherein the obsolete label is real data;
and when the verification signature is not equal to the tracing information signature, determining that the tracing information is not true, and the eliminated tag is false data.
In detail, the method for signing the traceability bidding information to obtain the traceability signing information is the same as the method for generating the corresponding bidding signature for each bidding party according to the bidding information in step S1, and is not described herein again.
In the embodiment of the invention, the verification tags are visually displayed, so that a tenderer or a bidder can conveniently distinguish, a proper transaction object is selected, and eliminated tags in the verification tags are traced and verified according to the signature marks, so that the authenticity of data can be ensured, and intelligent market transaction supervision is completed.
According to the embodiment of the invention, the bidding signatures corresponding to all the tenderers are generated according to the bidding information, and the bidding signatures corresponding to all the tenderers are generated according to the bidding information, so that the bidding information and the bidding information can be marked, the safety after transmission is ensured, the probing attack of an information security attacker can be effectively prevented, and the key leakage is prevented; the public module is generated according to the bid inviting requirement, the related data of the other field bid inviting party can be converted into the data of the common target field through the public module, the data of the common target field is converted into the data of the field of the bid inviting party through the reverse conversion function of the public module, the intercommunication of the data between different fields is realized, the timeliness of data transmission is ensured, the data processing efficiency of bid inviting management is improved, the public module and the private module are jointly authenticated by utilizing the bid inviting signature, the signature can be prevented from being counterfeited by illegal persons, the security of the signature authentication is improved, the data security of the public module and the private module is ensured, the signature bid feedback is obtained by signing and marking the bid feedback according to the bid signature, the data receiving relation in the bid inviting transaction process is realized, the subsequent source tracing verification can be facilitated, meanwhile, the risk of false bid feedback is reduced, the signature feedback is verified and screened by utilizing the public module and the private module after the joint verification, the signature feedback and the signature verification tag can be verified conveniently, the signature can be displayed, the signature can be verified and the market can be verified and the mark can be verified conveniently, the subsequent market transaction can be verified and the signature can be verified and the mark can be verified visually verified conveniently. Therefore, the electronic transaction management method based on digital authentication provided by the invention can solve the problem of low data processing efficiency of bidding management.
Fig. 4 is a functional block diagram of an electronic transaction management device based on digital authentication according to an embodiment of the present invention.
The digital authentication-based electronic transaction management apparatus 100 according to the present invention may be installed in a device. According to the implemented functions, the digital authentication-based electronic transaction management device 100 may include a bid signature module 101, a joint authentication module 102, a feedback signature module 103, a verification tag module 104, and a traceability verification module 105. The modules of the invention, which may also be referred to as units, are a series of computer program segments capable of being executed by a processor of a device and performing fixed functions, and are stored in a memory of the device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the bid signature module 101 is configured to obtain bid information of each bid inviting party and bid information of each bid inviting party, generate a corresponding bid signature for each bid inviting party according to the bid inviting information, and generate a corresponding bid signature for each bid inviting party according to the bid information;
the joint authentication module 102 is configured to extract bidding requirements from the bidding information, generate a public module according to the bidding requirements, generate a private module according to independent requirements corresponding to each bidding party in the bidding requirements, and perform joint authentication on the public module and the private module by using the bidding signature;
the feedback signature module 103 is configured to obtain bid feedback of each bidder one by one, and sign and mark the bid feedback according to the bid signature to obtain signed bid feedback;
the verification tag module 104 is configured to perform verification and screening on the signature bid feedback by using the public module and the private module after joint verification to obtain a verification tag;
the source tracing and verifying module 105 is configured to visually display the verification tags, and perform source tracing and verifying on eliminated tags in the verification tags according to the signature marks, so as to complete unified management.
In detail, when the modules in the electronic transaction management device 100 based on digital authentication according to the embodiment of the present invention are used, the same technical means as the electronic transaction management method based on digital authentication described in fig. 1 to 3 are adopted, and the same technical effects can be produced, which is not described herein again.
Fig. 5 is a schematic structural diagram of an apparatus for implementing an electronic transaction management method based on digital authentication according to an embodiment of the present invention.
The device 1 may comprise a processor 10, a memory 11, a communication bus 12 and a communication interface 13, and may further comprise a computer program, such as a digitally authenticated electronic transaction management program, stored in the memory 11 and operable on the processor 10.
In some embodiments, the processor 10 may be composed of an integrated circuit, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same function or different functions, and includes one or more Central Processing Units (CPUs), a microprocessor, a digital Processing chip, a graphics processor, a combination of various control chips, and the like. The processor 10 is a Control Unit (Control Unit) of the device, connects various components of the entire device using various interfaces and lines, and executes various functions of the device and processes data by running or executing programs or modules (e.g., an electronic transaction management program that performs digital authentication, etc.) stored in the memory 11 and calling data stored in the memory 11.
The memory 11 includes at least one type of readable storage medium including flash memory, removable hard disks, multimedia cards, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, and the like. The memory 11 may in some embodiments be an internal storage unit of the device, for example a removable hard disk of the device. The memory 11 may also be an external storage device of the device in other embodiments, such as a plug-in removable hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the device. Further, the memory 11 may also include both an internal storage unit of the device and an external storage device. The memory 11 may be used not only to store application software installed in the device and various kinds of data, such as a code of a digital authenticated electronic transaction management program, etc., but also to temporarily store data that has been output or is to be output.
The communication bus 12 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
The communication interface 13 is used for communication between the above-mentioned device and other devices, and includes a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.) that is commonly used to establish a communication connection between the device and other devices. The user interface may be a Display (Display), an input unit, such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the device and for displaying a visualized user interface.
Only devices having components are shown, it will be understood by those skilled in the art that the structures shown in the figures do not constitute limitations on the devices, and may include fewer or more components than shown, or some components in combination, or a different arrangement of components.
For example, although not shown, the apparatus may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that functions such as charge management, discharge management, and power consumption management are implemented through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The device may further include various sensors, a bluetooth module, a Wi-Fi module, etc., which are not described herein again.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The digitally authenticated electronic transaction management program stored in the memory 11 of the device 1 is a combination of instructions that, when executed in the processor 10, enable:
acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing joint authentication on the public module and the private module by using the bidding signature;
acquiring bidding feedback of each bidding party one by one, and performing signature marking on the bidding feedback according to the bidding signature to obtain signature bidding feedback;
verifying and screening the signature bid feedback by using the public module and the private module after combined verification to obtain a verification label;
and visually displaying the verification tags, and tracing and verifying eliminated tags in the verification tags according to the signature marks to finish the unified management.
Specifically, the specific implementation method of the instruction by the processor 10 may refer to the description of the relevant steps in the embodiment corresponding to the drawings, which is not described herein again.
Further, the integrated modules/units of the device 1 may be stored in a storage medium if they are implemented in the form of software functional units and sold or used as separate products. The storage medium may be volatile or non-volatile. For example, the storage medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM).
The invention also provides a storage medium, the readable storage medium storing a computer program which, when executed by a processor of a device, may implement:
acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing joint authentication on the public module and the private module by using the bidding signature;
acquiring bidding feedback of each bidding party one by one, and performing signature marking on the bidding feedback according to the bidding signature to obtain signature bidding feedback;
verifying and screening the signature bid feedback by using the public module and the private module after combined verification to obtain a verification label;
and visually displaying the verification tags, and tracing and verifying eliminated tags in the verification tags according to the signature marks to finish the unified management.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method for electronic transaction management based on digital authentication, the method comprising:
s1: acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
s2: extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing joint authentication on the public module and the private module by using the bidding signature, wherein the generating of the public module according to the bidding requirements comprises:
s21, acquiring the demand field characteristics corresponding to each tenderer in the tendering demands one by one;
s22, calculating the minimum domain distance between the minimum domain distance and all the demand domain characteristics through the following domain distance formula:
Figure FDA0004058159800000011
wherein D is a minimum field distance, min is a minimum function, arccos is an inverse cosine function, m is a total number of demand field characteristics in the bidding demand, A j J is the jth requirement field characteristic in the bidding requirement, j is the jth bit in the bidding requirement, and k is the kth bit in the bidding requirement;
s23, converting the data of the tenderer into public data of a common target field one by one, and generating a public template according to the public data;
s3: acquiring bidding feedback of each bidding party one by one, and performing signature marking on the bidding feedback according to the bidding signature to obtain signature bidding feedback;
s4: verifying and screening the signature bid feedback by using the public module and the private module after combined verification to obtain a verification label;
s5: and visually displaying the verification tags, and tracing and verifying eliminated tags in the verification tags according to the signature marks to finish the unified management.
2. The digital authentication-based electronic transaction management method according to claim 1, wherein the generating a corresponding bidding signature for each tenderer according to the bidding information comprises:
converting the bidding information into a bidding information matrix, and performing bit supplementing processing on the bidding information matrix according to a multiplying factor bit length of a preset bit supplementing length to obtain a bit supplementing bidding matrix;
carrying out blocking processing on the supplementary position bidding matrix according to the supplementary position bit length to obtain a supplementary position bidding block set;
and calculating a signature abstract of the bidding information according to the complementary bidding block set by utilizing an XOR compression algorithm as follows:
Figure FDA0004058159800000021
Figure FDA0004058159800000022
wherein H is the signature digest, n is the total number of the complementary tagging blocks in the complementary tagging block set, i is the ith bit in the complementary tagging block set,
Figure FDA0004058159800000023
is a characterBitwise XOR sign, h i Is the summary of the ith complement bidding block in the complement bidding block set,% is a modulus symbol, B is the length of the complement bit, R i Is a function of shifting the character bit by bit to the right, which means that the character is cyclically shifted to the right by i bits, M i The number is the ith complement bidding block in the complement bidding block set;
acquiring a preset key of each tenderer, and encrypting the signature digest according to the key by using the following key modular encryption algorithm to obtain a tendering signature:
H 1 =(H p +p)%B
wherein H 1 Is the signing, H is the digest of the signature, p is the secret key, H p Means that the signature digest H is exponentially operated with the secret key p,% is a modulo sign, and B means the complementary bit length.
3. The digital authentication-based electronic transaction management method according to claim 1, wherein the step of obtaining the requirement field characteristics corresponding to each tenderer in the tendering requirements one by one comprises the following steps:
acquiring independent requirements corresponding to each tenderer from the tendering requirements one by one to serve as target requirements;
vectorizing the target demand, and taking the vectorized target demand as the demand field characteristic.
4. The digital authentication-based electronic transaction management method of claim 1, wherein the joint authentication of the public module and the private module using the invitation signature comprises:
collecting the bidding signatures of the bidding parties corresponding to the public module into a public signature set;
selecting one bidding signature from the public signature set one by one according to the sequence of signature time as a first target signature, and adding the first target authentication signature behind the public module;
collecting the bidding signatures of the bidding parties corresponding to the private standing module into a private standing signature set;
and selecting one invitation signature from the private signature set one by one according to the sequence of the signature time as a second target signature, and adding the second target authentication signature to the private module to complete combined authentication.
5. The digital authentication-based electronic transaction management method of claim 1, wherein said signing the bid feedback according to the bid signature to obtain a signed bid feedback comprises:
generating public bidding feedback and private bidding feedback according to the bidding feedback;
marking the public bidding feedback as public mark feedback by using the tagging name, and marking the private bidding feedback as private mark feedback by using the tagging name;
merging the public indicia feedback and the private indicia feedback into the signed bid feedback.
6. The electronic transaction management method based on digital authentication as claimed in claim 1, wherein said using the jointly verified public module and the private module to perform verification screening on the signed bid feedback to obtain a verification tag comprises:
decoding public feedback data from the signed bid feedback using the public module;
decoding private feedback data from the signed bid feedback by using the private module;
merging the public feedback data and the private feedback data into feedback data;
and marking the qualification degree of the feedback data according to the result of the qualification item in the feedback data to obtain a verification label.
7. The digital authentication-based electronic transaction management method according to any one of claims 1 to 6, wherein the tracing verification of obsolete tags in the verification tags according to the signature tags comprises:
extracting a signature corresponding to the eliminated label as a verification signature;
extracting the bidder corresponding to the eliminated tag as a source-tracing bidder, and acquiring bidding information corresponding to the source-tracing bidder as source-tracing bidding information;
signing the tracing bidding information to obtain a tracing information signature;
judging whether the verification signature is equal to the traceability information signature or not;
when the verification signature is equal to the traceability information signature, determining that the traceability information is authentic, wherein the obsolete label is real data;
and when the verification signature is not equal to the tracing information signature, determining that the tracing information is not true, and the eliminated tag is false data.
8. An electronic transaction management device based on digital authentication, which implements the electronic transaction management method based on digital authentication according to any one of claims 1 to 7, the device comprising:
the bidding signature module is used for acquiring bidding information of each bidding party and bidding information of each bidding party, generating corresponding bidding signatures for each bidding party according to the bidding information, and generating corresponding bidding signatures for each bidding party according to the bidding information;
the combined authentication module is used for extracting bidding requirements from the bidding information, generating a public module according to the bidding requirements, generating a private module according to the independent requirements corresponding to each bidding party in the bidding requirements, and performing combined authentication on the public module and the private module by using the bidding signature;
the feedback signature module is used for acquiring the bid feedback of each bidder one by one, and performing signature marking on the bid feedback according to the bid signature to obtain signature bid feedback;
the verification tag module is used for verifying and screening the signature bid feedback by using the public module and the private module after joint verification to obtain a verification tag;
and the source tracing verification module is used for visually displaying the verification tags, and performing source tracing verification on eliminated tags in the verification tags according to the signature marks to finish the unified management.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the digital authentication-based electronic transaction management method of any of claims 1 to 7.
10. A storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the digital authentication-based electronic transaction management method according to any one of claims 1 to 7.
CN202210942062.9A 2022-08-08 2022-08-08 Electronic transaction management method, device, equipment and storage medium based on digital authentication Active CN115311061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210942062.9A CN115311061B (en) 2022-08-08 2022-08-08 Electronic transaction management method, device, equipment and storage medium based on digital authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210942062.9A CN115311061B (en) 2022-08-08 2022-08-08 Electronic transaction management method, device, equipment and storage medium based on digital authentication

Publications (2)

Publication Number Publication Date
CN115311061A CN115311061A (en) 2022-11-08
CN115311061B true CN115311061B (en) 2023-04-18

Family

ID=83860921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210942062.9A Active CN115311061B (en) 2022-08-08 2022-08-08 Electronic transaction management method, device, equipment and storage medium based on digital authentication

Country Status (1)

Country Link
CN (1) CN115311061B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373530A (en) * 2007-08-20 2009-02-25 马占祯 Transaction electric platform for calling for tender and bidding of project
CN107392570A (en) * 2017-07-22 2017-11-24 江苏省鸿源招标代理股份有限公司 A kind of whole process e-bidding bid bid evaluation system and its tender Evaluation Method of inviting and submitting bids
CN108011719A (en) * 2017-11-16 2018-05-08 深圳市文鼎创数据科技有限公司 A kind of endorsement method, device and digital signature system
CN110472053A (en) * 2019-08-05 2019-11-19 广联达科技股份有限公司 A kind of automatic classification method and its system towards public resource bidding advertisement data
CN112613956A (en) * 2020-12-31 2021-04-06 中国工商银行股份有限公司 Bidding processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140006201A1 (en) * 2012-06-29 2014-01-02 Accion Group Inc. Method and apparatus for competitive solicitation and bidding

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373530A (en) * 2007-08-20 2009-02-25 马占祯 Transaction electric platform for calling for tender and bidding of project
CN107392570A (en) * 2017-07-22 2017-11-24 江苏省鸿源招标代理股份有限公司 A kind of whole process e-bidding bid bid evaluation system and its tender Evaluation Method of inviting and submitting bids
CN108011719A (en) * 2017-11-16 2018-05-08 深圳市文鼎创数据科技有限公司 A kind of endorsement method, device and digital signature system
CN110472053A (en) * 2019-08-05 2019-11-19 广联达科技股份有限公司 A kind of automatic classification method and its system towards public resource bidding advertisement data
CN112613956A (en) * 2020-12-31 2021-04-06 中国工商银行股份有限公司 Bidding processing method and device

Also Published As

Publication number Publication date
CN115311061A (en) 2022-11-08

Similar Documents

Publication Publication Date Title
CN112396005A (en) Biological characteristic image recognition method and device, electronic equipment and readable storage medium
CN112418798A (en) Information auditing method and device, electronic equipment and storage medium
CN112508145A (en) Electronic seal generation and verification method and device, electronic equipment and storage medium
CN112217642A (en) Data encryption sharing method and device, electronic equipment and computer storage medium
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN109583889A (en) Seal or signature recognition system based on block chain
CN114626102A (en) Block chain-based electronic certificate transfer method, device, equipment and storage medium
CN103218723A (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN115840787A (en) Supply chain data sharing method, device, equipment and medium based on block chain
CN114124502A (en) Message transmission method, device, equipment and medium
CN113868529A (en) Knowledge recommendation method and device, electronic equipment and readable storage medium
CN104899748A (en) Two-dimensional code and scratch-off code composite identifying method based on identity authentication technology
CN114417374A (en) Intelligent contract business card method, device, equipment and storage medium based on block chain
CN111932413B (en) Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium
CN112217639A (en) Data encryption sharing method and device, electronic equipment and computer storage medium
CN115311061B (en) Electronic transaction management method, device, equipment and storage medium based on digital authentication
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN114827354A (en) Identity authentication information display method and device, electronic equipment and readable storage medium
CN115801222A (en) Power consumer authenticity verification system and method based on homomorphic encrypted communication data
CN114157634A (en) Unique account identification method, device, equipment and storage medium
CN113918517A (en) Multi-type file centralized management method, device, equipment and storage medium
CN113343639B (en) Product identification code diagram generation and information query method based on product identification code diagram
CN115955317B (en) Cross-blockchain resource storage method and device
CN113723958A (en) Payment file testing method, device, equipment and medium based on AI encryption
CN113642020B (en) Dynamic encryption method and device for configuration file, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant