What is the whole process of electronic bidding?

The whole process of electronic bidding, as its name implies, is to complete the whole process of bidding on computers and networks, that is, to complete all activities such as bidding, bidding, bid opening, bid evaluation and bid selection on the Internet. The bidding documents can be downloaded anonymously online, and the bid can be opened without a meeting, so as to ensure that no unit or individual can illegally obtain the bidding information of potential bidders before the bid opening. In addition, it can greatly improve work efficiency, save labor costs, enhance information transparency, better protect the interests of bidding parties, create an open, fair and just market environment, and realize bidding under the sun.

I. Electronic bidding system

Electronic bidding system is the product of the combination of traditional engineering bidding mode, information technology and electronic technology. It can complete various engineering bidding operations such as compiling electronic bidding documents and computer-aided bid evaluation through the information system, effectively eliminating the influence of human factors on the process and results of engineering bid evaluation, and is essentially a service system with both data support and knowledge support.

Second, the whole process of electronic bidding is mainly designed from the following aspects:

1. Establish a credible and safe physical operation environment to ensure the safety of various entities; The system is equipped with corresponding server certificate products and other software and hardware security facilities to ensure the network security of the system.

2. Ensure the security of host systems such as application servers and database servers; Ensure the safe operation of the system server by configuring firewall and other measures.

3. Establish an effective computer virus protection system.

4. Respond to unauthorized access and malicious attacks in real time.

5. Adopt password (MD5) and authentication technology, and support PKI, SSL, X.509 and other specifications; The setting of information transmission is complete, effective and undeniable. It supports authority setting and confidentiality specification, and has perfect identity authentication mechanism, strict authority control system and key data encryption (MD5) to ensure the security of system information storage and transmission and the security of system transactions.

6, realize the system business operation authority management and access control, establish the system business security management measures; Bidding, bidding, bid evaluation, supervision and procuratorial personnel can only use their authorized user names and passwords (MD5 encryption) to enter the system, and they are not allowed to carry out the core operation of the system without legal authorization. The release of bidding materials, bid evaluation confirmation, supervision and procuratorial opinions are all carried out by specific personnel, including supplement, modification, information content addition, consultation and question-and-answer, all of whom are full-time. Once any information is published, it cannot be modified.

7. Provide effective and detailed operation logging and auditing functions.

For more information about project/service/procurement bidding, and to improve the winning rate, please click on the bottom of official website Customer Service for free consultation:/#/? source=bdzd