CN109872233A - Contract signing method, apparatus, computer equipment and storage medium - Google Patents

Contract signing method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN109872233A
CN109872233A CN201910043286.4A CN201910043286A CN109872233A CN 109872233 A CN109872233 A CN 109872233A CN 201910043286 A CN201910043286 A CN 201910043286A CN 109872233 A CN109872233 A CN 109872233A
Authority
CN
China
Prior art keywords
contract
information
authentication
image
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910043286.4A
Other languages
Chinese (zh)
Inventor
李�浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910043286.4A priority Critical patent/CN109872233A/en
Publication of CN109872233A publication Critical patent/CN109872233A/en
Pending legal-status Critical Current

Links

Abstract

The present invention discloses a kind of contract signing method, apparatus, computer equipment and storage medium, the contract signing method includes that target electronic contract is sent to the second client to appraise and decide, if appraising and deciding result is to appraise and decide agreement, the second authentication image of the second client transmission is obtained;Information extraction is carried out to target electronic contract according to default verifying keyword, both parties' information is obtained, the first authentication image and the second authentication image is verified using both parties' information, obtain the first authentication result;Based on the first original speech information and the second original speech information, the second authentication result is obtained;If the first authentication result and the second authentication result are to be proved to be successful, the first electronic signature and the second client that the first client is sent in default signing duration are sent second is then obtained to sign electronically, target electronic contract is signed, contract signing is obtained as a result, this method can effectively ensure the safety of contract signing.

Description

Contract signing method, apparatus, computer equipment and storage medium
Technical field
The present invention relates to Internet technical field more particularly to a kind of contract signing method, apparatus, computer equipment and deposit Storage media.
Background technique
With the rapid development of information age, electronic contract is directly signed by network, avoids papery contract signing, exchange With the trouble of the process of preservation, it is increasingly becoming the attractive developing direction of e-commerce field.The signing of electronic contract needs at present It wants both parties that electronic contract is uploaded to electronic third-party contract signing platform and carries out signing operation, to complete the label of contract It orders, so that the signing of electronic contract has limitation;Also, the signing process of electronic contract is carried out by the network platform at present In, it is unable to ensure the validity and authenticity of contractor's identity, so that not high by the safety that the network platform is signed a contract.
Summary of the invention
The embodiment of the present invention provides a kind of contract signing method, apparatus, computer equipment and storage medium, current to solve It is unable to ensure the validity and authenticity of contractor's identity during network-based electron contract, causes contract signing The not high problem of safety.
A kind of contract signing method, comprising:
Obtain the contract signing request of the first client transmission, contract signing request includes target electronic contract, the One identity authentication image and recipient's information;
The target electronic contract is sent to corresponding second client of recipient's information, obtains second visitor What family end returned appraises and decides as a result, obtaining the second body that second client is sent if the result of appraising and deciding is to appraise and decide agreement Part authentication image;
Information extraction is carried out to target electronic contract according to default verifying keyword, is obtained corresponding with default verifying keyword Both parties' information, using both parties' information to the first authentication image and the second authentication figure As carrying out authentication, the first authentication result is obtained;
Based on default words art, the first original speech information and second client that first client is sent are obtained The second original speech information sent;
Based on first original speech information and second original speech information, the second authentication result is obtained;
If the first authentication result and the second authentication result are to be proved to be successful, default label are obtained Order the first electronic signature that first client in duration is sent and the second electronic signature that second client is sent, base The target electronic contract is signed in first electronic signature and second electronic signature, obtains contract signing knot Fruit.
A kind of contract signing device, comprising:
Contract signing request module, for obtaining the contract signing request of the first client transmission, the contract label Ordering request includes target electronic contract, the first authentication image and recipient's information;
Second authentication image collection module, for the target electronic contract to be sent to recipient's information pair The second client answered obtains appraising and deciding as a result, if the result of appraising and deciding is to appraise and decide agreement for the second client return, obtains The the second authentication image for taking second client to send;
First authentication result obtains module, for carrying out information to target electronic contract according to default verifying keyword It extracts, both parties' information corresponding with default verifying keyword is obtained, using both parties' information to first body Part authentication image and the second authentication image carry out authentication, obtain the first authentication result;
Original speech information obtains module, for it is former to obtain first client is sent first based on default words art The second original speech information that beginning voice messaging and second client are sent;
Second authentication result obtains module, for being based on first original speech information and the second original language Message breath, obtains the second authentication result;
Contract signing result obtains module, if being used for the first authentication result and the second authentication result It is to be proved to be successful, then obtains first client is sent in default signing duration the first electronic signature and second visitor The second electronic signature that family end is sent closes the target electronic based on first electronic signature and second electronic signature With being signed, contract signing result is obtained.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize that said contract signs method when executing the computer program.
A kind of non-volatile memory medium, the non-volatile memory medium are stored with computer program, the computer Realize that said contract signs method when program is executed by processor.
Said contract is signed in method, apparatus, computer equipment and storage medium, the contract sent by obtaining client Request is signed, is carried out so that the target electronic contract in requesting contract signing is sent to the second client to target electronic contract In content appraise and decide, and obtain the appraising and deciding as a result, if appraising and deciding result is to appraise and decide agreements of the second client feedback, it is objective to obtain second The second authentication image that family end is sent.Then, it presets verifying keyword and information extraction is carried out to target electronic contract, and adopt Authentication is carried out to the first authentication image and the second authentication image with the both parties' information got, to ensure It is right in the first authentication image and the second authentication image that both parties' information is uploaded with user in target electronic contract The identity information answered is consistent, the validity that contract of guarantee is signed.Then, based on default words art, the first client hair is obtained The first original speech information sent and the second original speech information of the second client transmission simultaneously verify it, obtain second Authentication is as a result, to ensure to sign the provision content in both sides' agreement contract, the validity of contract of guarantee.Later, according to First authentication result and the second authentication result determine whether authentication succeeds, if being proved to be successful, obtain default The first electronic signature that the first client in duration is sent and the second electronic signature that the second client is sent are signed, to prevent from disliking It anticipates and draws dotted-line time.Finally, target electronic contract is signed based on the first electronic signature and the second electronic signature, Contract signing can be completed, obtain contract signing result.The contract signing process can carry out in same electronic contract platform, nothing It need to be uploaded to third party's signing platform, user can independently contract, and transparent procedures of contracting guarantees the reliable of signing process Property.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of contract signing method in one embodiment of the invention;
Fig. 2 is a flow chart of contract signing method in one embodiment of the invention;
Fig. 3 is a specific flow chart of step S30 in Fig. 2;
Fig. 4 is a specific flow chart of step S33 in Fig. 3;
Fig. 5 is a specific flow chart of step S40 in Fig. 2;
Fig. 6 is a flow chart of contract signing method in one embodiment of the invention;
Fig. 7 is a flow chart of contract signing method in one embodiment of the invention;
Fig. 8 is a flow chart of contract signing method in one embodiment of the invention;
Fig. 9 is a schematic diagram of contract signing device in one embodiment of the invention;
Figure 10 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Contract signing method provided in an embodiment of the present invention can be used in electronic contract platform, using one kind for detecting The validity and authenticity of both parties' identity improve the safety of electron contract independently to complete electron contract. The contract signing method can be applicable in the application environment such as Fig. 1, wherein computer equipment is led to by network and server Letter.Computer equipment can be, but not limited to various personal computers, laptop, smart phone, tablet computer and portable Wearable device.Server can be realized with independent server.
In one embodiment, as shown in Fig. 2, providing a kind of contract signing method, the service in Fig. 1 is applied in this way It is illustrated, includes the following steps: for device
S10: the contract signing request that the first client is sent is obtained, contract signing request includes target electronic contract, the One identity authentication image and recipient's information.
Wherein, contract signing request is that the request of electron contract is carried out for trigger the server.First client is Refer to the client for sending contract signing request, namely proposes the corresponding client in the contract side of drafting of contract offer.First identity Authentication image refers to the authentication image corresponding with the contract side of drafting that the first client uploads.Target electronic contract refers to The electronic contract drafted by the contract side of drafting.Recipient's information refers to the information of contract recipient, specifically includes contract reception The contact method of side, such as phone number.
It specifically, include an information acquisition module and image capture module in electronic contract platform, user can pass through letter It ceases acquisition module and uploads target electronic contract, the first authentication image is uploaded by image capture module, so that server obtains The contract signing request for taking the first client to send, the image capture module include but is not limited to that local upload or shooting upload. It needs to illustrate, the file format of target electronic contract includes but is not limited to word and pdf etc..
S20: being sent to corresponding second client of recipient's information for target electronic contract, obtains the second client and returns Appraise and decide as a result, if appraise and decide result be appraise and decide agreements, obtain the second client send the second authentication image.
Wherein, the second client refers to the corresponding client of contract recipient, when recipient's information is phone number, Corresponding second client is specially the mobile phone of contract recipient.Second authentication image refers to be uploaded by the second client Authentication figure corresponding with contract recipient.Specifically, when signing a contract, both parties is needed to participate in jointly, therefore, Target electronic contract need to be sent to corresponding second client of contract recipient, so that contract recipient appraises and decides, at this point, Second client can show that an electronic contract appraises and decides interface, for appraising and deciding target electronic contract.The electronic contract is appraised and decided in interface Including agreeing to and refusing button, user clicks above-mentioned button feedback and appraises and decides as a result, so that server obtains the second client feedback Appraise and decide result;If appraising and deciding result is to appraise and decide agreement, then it is assumed that contract recipient agrees to all clauses in target electronic contract In content, and prompt contract reciever upload the second authentication image, with obtain the second client send the second identity Authentication image.Understandably, contract, which is drafted, to be Party A or Party B, and correspondingly, contract recipient can be Party B or Party A.? That is, target electronic contract can be created by Party A, and target electronic contract is sent to Party B and is appraised and decided;Alternatively, can be by Party B Target electronic contract is created, and target electronic contract is sent to Party A and is appraised and decided.
S30: carrying out information extraction to target electronic contract according to default verifying keyword, obtains and default verifying keyword Corresponding both parties' information carries out body to the first authentication image and the second authentication image using both parties' information Part verifying, obtains the first authentication result.
Wherein, both parties' information refers to identity information of the both parties in target electronic contract.Default verifying is crucial Word is pre-set for extracting the keyword of both parties' identity information in target electronic contract.The default verifying keyword Including but not limited to Party A's name, Party A's identification card number, Party B's name and Party B's identification card number.Both parties' information include but It is not limited to Party A's name, Party A's identification card number, Party B's name and Party B's identification card number.
Specifically, server is according to default verifying keyword, to identical as default verifying keyword in target electronic contract The corresponding attribute value of field extracts, to obtain both parties' information corresponding with default verifying keyword.Again using transaction Two-sided information carries out authentication to the first authentication image and the second authentication image, obtains the first authentication knot Fruit.Namely according to the both parties' information and the first authentication image and the second authentication extracted in target electronic contract Corresponding identity information compares in image, obtains the first authentication as a result, double to ensure to trade in target electronic contract Square information is consistent with corresponding identity information in the first authentication image and the second authentication image that user uploads, The validity that contract of guarantee is signed.
S40: based on default words art, the first original speech information and the second client for obtaining the transmission of the first client are sent The second original speech information.
Wherein, presetting words art is that the pre-set confirmation signing both sides that are used for sign art if wish, such as " I is XXX, I has known all clauses in XXX contract, and agrees to contract ".First original speech information is the corresponding record of the first client Sound equipment the collected contract side of drafting voice messaging.Second original speech information is that the corresponding recording of the second client is set The voice messaging of other collected contract recipient.Specifically, the corresponding recording of the first client and the second client is set Standby (such as: microphone), when signing a contract, server can prompt user to open sound pick-up outfit and read the content of default words art, So that server obtains corresponding first original speech information of the first client and corresponding second raw tone of the second client Information signs whether both sides voluntarily contract according to the first original speech information and the confirmation of the second original speech information so as to subsequent, The validity of contract of guarantee.
S50: being based on the first original speech information and the second original speech information, obtains the second authentication result.
Specifically, first original speech information and the second original speech information are input to voice respectively and known by server It is matched in other interface, obtains the corresponding first identification text of the first original speech information and the second original speech information is corresponding The second identification text, respectively will the first identification text and the second identification text and default words art progress text Whether comparison, obtain the second authentication as a result, to determine the provision content for signing both sides in agreement contract, contract of guarantee Validity.
S60: if the first authentication result and the second authentication result are to be proved to be successful, when obtaining default sign The second electronic signature that the first electronic signature and the second client that first client is sent in long are sent, is based on the first electronics label Target electronic contract is signed in name and the second electronic signature, obtains contract signing result.
Wherein, preset duration refers to the pre-set effective time signed a contract.Specifically, if the first authentication knot Fruit and the second authentication result are to be proved to be successful, then it is assumed that the identity for signing both sides is authentic and valid, then prompts to sign both sides The operation signed in preset duration to the signature blocks in target electronic contract.Wherein, the label in target electronic contract Name module is configured with a signature plug-in unit, and for signing electronically, user can click in the signature blocks in target electronic contract Signature plug-in unit, that is, can trigger and sign with the associated signature plug-in unit of signature blocks.The signature plug-in unit includes signature area domain and guarantor Button is deposited, user clicks the save button in signature plug-in unit, signature plug-in unit can be made to pass through canvas element when signing completion The method of the acquisition electronic signature of middle open source obtains the electronic signature that user saves.The electronic signature includes that the first client is formed First electronic signature or the second client formed second electronic signature.Server passes through the first electronic signature and second is electric Son signature is filled at the signature blocks in target electronic contract, and contract signing can be completed, and obtains contract signing result.It can manage Solution, to prevent malice from drawing dotted-line time, causes user sharp by the way that the effective time i.e. preset duration signed a contract is arranged Benefit incurs loss.Specifically, it if being more than preset duration, needs to verify the identity of user again, to ensure the person of contracting The authenticity and validity of part.
In the present embodiment, the second client is sent to by the target electronic contract in requesting contract signing and is carried out to mesh Content in mark electronic contract is appraised and decided, and knows the content in target electronic contract with contract of guarantee recipient.Then, using default It verifies keyword and information extraction is carried out to target electronic contract, and using the both parties' information got to the first authentication Image and the second authentication image carry out authentication, to ensure that both parties' information and user upload in target electronic contract The first authentication image and the second authentication image in corresponding identity information be consistent, contract of guarantee sign have Effect property.Then, based on default words art, what the first original speech information and the second client for obtaining the transmission of the first client were sent Second original speech information simultaneously verifies it, obtains the second authentication as a result, agreeing to contract to ensure to sign both sides In provision content, the validity of contract of guarantee.Later, it is verified in the first authentication result and the second authentication result It is electric then to obtain the first electronic signature and the second client that the first client is sent in default signing duration are sent second for success Son signature, to prevent malice from drawing dotted-line time.Finally, based on the first electronic signature and the second electronic signature to target electricity Sub- contract is signed, and contract signing can be completed, and obtains contract signing result.The contract signing process can be closed in same electronics It is carried out in platform, without being uploaded to third party's signing platform, user can independently contract, and transparent procedures of contracting guarantees The reliability for process of contracting.
In one embodiment, as shown in figure 3, in step S30, i.e., using both parties' information to the first authentication image Authentication is carried out with the second authentication image, obtains the first authentication as a result, specifically comprising the following steps:
S31: the corresponding camera of starting the first client and the second client is remotely monitored, and obtains the first monitoring view Frequency and the second monitor video respectively extract the first monitor video and the second monitor video according to default interception rule, obtain The first verifying frame image and second is taken to verify frame image.
Wherein, it presets interception rule and refers to according to the preset time interval the repeatedly rule of interception video.First monitoring view Frequency refers to the video flowing of the corresponding camera real-time recording of the first client.Second monitor video refers to that the second client is corresponding The video flowing of camera real-time recording.First verifying frame image is to intercept according to default interception rule to the first monitor video Acquired frame image.Second verifying frame image be according to default interception it is regular second monitor video intercept it is acquired Frame image.Specifically, after contract signing both sides confirm contract terms content, then the first client and the second client are called Corresponding camera is remotely monitored, corresponding to obtain corresponding first monitor video of the first client and the second client Second monitor video, and the first monitor video and second are monitored respectively according to default interception rule (such as intercepting a frame every 5s) Video is intercepted, and the first verifying frame image and the second verifying frame image are obtained.By repeatedly intercepting video frame images, to ensure The authenticity of contractor.
S32: carrying out Face datection to the first verifying frame image and the second verifying frame image, obtains and the first verifying frame image Corresponding first verifying facial image and the second verifying facial image corresponding with the second verifying frame image.
Specifically, frame image and the second verifying frame image are verified using trained Face datection model inspection first in advance Whether with the presence of face, if the first verifying frame image includes face, using the frame video image as the first verifying facial image. If the second verifying frame image includes face, using the frame video image as the second verifying facial image.Wherein, Face datection mould Type includes but is not limited to use CascadeCNN network to be trained to be detected.CascadeCNN (Face datection) is to classics Violajones method depth convolutional network realize, be it is a kind of detect fast speed method for detecting human face. Violajones is a kind of Face datection frame.Specifically, if not including in the first verifying frame image or the second verifying frame image Next frame in intercepted first verifying frame image or the second verifying frame image is then carried out Face datection, Zhi Daojian by face The image comprising face is measured, includes the frame image of facial image as the first verifying facial image or the second verifying face using this Image.
S33: identifying the first authentication image and the second authentication image using OCR identification technology, obtains And corresponding first subscriber identity information of the first authentication image and second user body corresponding with the second authentication image Part information.
Wherein, the first subscriber identity information refers to user's body corresponding with the first authentication image that the first client uploads Part information.Second user identity information refers to user identity corresponding with the second authentication image letter that the second client uploads Breath.In the present embodiment, the first subscriber identity information and the second identity information can be specially identification card number and name.Certificate OCR knows Other technology is taken pictures by mobile phone or the terminal device with camera to certificate, and verify using OCR character recognition technology Part photo does OCR Text region, extracts the technology of user basic information.This technology is increasingly recognized and is made by vast consumption user With not only having gathered certificate identification further includes driver's license identification, driving license identification, passport identification, Car license recognition, the knowledge of bank's card number Not, the function of the ensembles such as business card recognition and document identification, having at low cost, use environment, conveniently function is easy the excellent of extension Point.Specifically, the first authentication image and the second authentication image are identified using OCR identification technology, to obtain First subscriber identity information and second user identity information are not necessarily to user manual editing identity information, can be directly by uploading the One identity authentication image and the second authentication image, can the first subscriber identity information of quick obtaining and second user identity letter The case where ceasing, effectively manual editing being avoided to make mistakes, it is ensured that the accuracy of both parties' identity.
S34: the first subscriber identity information and second user identity information are matched with both parties' information, acquisition With processing result.
Specifically, by name and identification card number in the first subscriber identity information and the contract side of drafting in both parties' information Name and identification card number matched;It will be in the name and identification card number and both parties' information in second user identity information The name and identification card number of contract recipient matches, and obtains matching treatment result.Understandably, only when the first user identity Information and the success of both parties' information matches and second user identity information and the success of both parties' information matches, can just obtain With successful matching treatment as a result, then proving in the identity information and target electronic contract in the authentication image of user's upload Both parties identity information it is consistent.If the first subscriber identity information and/or second user identity information and both parties believe It fails to match for breath, then obtains the matching treatment that it fails to match as a result, then proving the identity in the authentication image of user's upload Information and the identity information of the both parties in target electronic contract are inconsistent, the authentication image uploaded by verifying user In identity information it is whether consistent with the identity information of the both parties in target electronic contract, to guarantee subsequent contractor's identity Authenticity verification is effective.
S35: if matching treatment result is successful match, by the first verifying facial image and the second verifying facial image hair Third party's public security system is given, the first ID card verification result that third party's public security system returns is obtained.
Wherein, third party's public security system can refer to the verifying system of public security organ.Specifically, server is being got After successful matching treatment result, it can be linked to identification card number of third party's public security system based on contract signing both sides, inquired The first real human face image corresponding with the identification card number of contract signing both sides and the second real human face image in database, and will First verifying facial image is compared with the first real human face image, by the second verifying facial image and the second real human face figure As comparing, to obtain the first authentication as a result, signing the authenticity of both sides' identity with guarantee.Specifically, if first tests Witness's face image and the success of the first real human face images match and the second verifying facial image and the second real human face images match Success, then obtain the first authentication result being proved to be successful;Conversely, if the first verifying facial image and the first real human face figure It fails to match and the second verifying facial image and the second real human face images match fail for picture, then obtains the first body of authentication failed Part verification result.
In the present embodiment, first using OCR identification technology to the first authentication image and the second authentication image into Row identification, to obtain the first subscriber identity information and second user identity information, so as to by both parties' information and the first user Identity information and second user identity information are matched, it is ensured that both parties' information and the first subscriber identity information and second are used Family identity information is consistent, namely ensure user upload authentication image in subscriber identity information and target electronic close With in both parties' information be consistent, prevent from claiming the identity of others fraudulently authentication image the case where, it is ensured that contract signing it is effective Property.Again by the way that the first verifying facial image comprising face and the second verifying facial image and the will be truncated in monitor video The real human face image stored in tripartite's public security system compares, to obtain the first authentication as a result, double to guarantee to sign The authenticity and validity of square identity.
In one embodiment, as shown in figure 4, in step S33, i.e., with OCR identification technology to the first authentication image and Second authentication image identified, obtains the first subscriber identity information corresponding with the first authentication image and with second The corresponding second user identity information of authentication image, specifically comprises the following steps:
S331: processing, gray processing processing are sharpened to the first authentication image and the second authentication image respectively It is handled with perspective transform, obtains corresponding first image to be verified of the first authentication image and the second authentication image is corresponding The second image to be verified.
S332: identifying the first image to be verified and the second image to be verified using OCR identification technology, obtains and the Corresponding first subscriber identity information of one image to be verified and second user identity information corresponding with the second image to be verified.
Wherein, the first image to be verified is to carry out gray proces, Edge contrast and perspective to the first authentication image to become Change the image to be verified of the exclusive PCR obtained after processing.Second image to be verified is to carry out gray scale to the second authentication image The image to be verified of the exclusive PCR obtained after processing, Edge contrast and perspective transform processing.
Specifically, due to that may include multiple color in the first authentication image or the second authentication image, and face Color itself is highly susceptible to the influence of the factors such as illumination, and similar object color has many variations, so color itself is difficult to There is provided key message, it is therefore desirable to gray processing processing be carried out to the first authentication image or the second authentication image, obtained Grayscale image reduces the complexity and information processing capacity of image with exclusive PCR.
Since the first authentication image or the second authentication image may have different degrees of inclination, mould is influenced Therefore type recognition result need to carry out perspective transform (correction) to the first authentication image or the second authentication image, i.e., will First authentication image or the second authentication image projection obtain the figure after correcting to the process of a new view plane Picture.In the present embodiment, the processing method of perspective transform includes but is not limited to use in OpenCv PerspectiveTransform () function carries out perspective transform processing.OpenCV is one and includes a large amount of open sources API (interface) Cross-platform computer vision library, while providing the interface of the language such as Python, Ruby, MATLAB, realize image procossing With many general-purpose algorithms in terms of computer vision.
In order to be apparent from the details of the edge of image, contour line and image, need first to carry out the image after perspective Edge contrast obtains sharpening image, to remove background lines, improves OCR recognition accuracy.In the present embodiment, Edge contrast Method includes but is not limited to use common Laplace operator in currently available technology, sobel (weighted average difference) operator Following formula can be used to contract by taking sobel Operator Method as an example with any one in Prewitt (average difference) operator Corresponding picture element matrix M (i, j) is signed to be converted:
A=| (M (i-1, j-1)+2M (i-1, j)+M (i-1, j+1))-(M (i+1, j-1)+2M (i+1, j)+M (i+1, j+ 1))|
B=| (M (i-1, j-1)+2M (i, j-1)+M (i+1, j-1))-(M (i-1, j+1)+2M (i, j+1)+M (i+1, j+ 1)) S (i, j)=A+B
Wherein, M (i, j) indicates the corresponding picture element matrix of image after perspective.S (i, j) indicates that the image after perspective is corresponding Picture element matrix, A indicate horizontal direction weighted factor, B indicate vertical direction weighted factor.
In the present embodiment, by being sharpened processing, gray scale to the first authentication image and the second authentication image Change processing and perspective transform processing, to realize the purpose denoised to image, improves to be tested to first using OCR identification technology The recognition accuracy that card image and the second image to be verified are identified.
In one embodiment, as shown in figure 5, in step S40, that is, the first original speech information and the second raw tone are based on Information obtains the second authentication as a result, specifically comprising the following steps:
S41: carrying out denoising to the first original speech information and the second original speech information using voice enhancement algorithm, It obtains among the first corresponding intermediate voice information of the first original speech information and the second original speech information corresponding second Voice messaging.
Wherein, the first intermediate voice information is institute after being denoised using voice enhancement algorithm to the first original speech information Obtained purer voice messaging.Second intermediate voice information be using voice enhancement algorithm to the second original speech information into Obtained purer voice messaging after row denoising.
Specifically, since sound pick-up outfit collects raw tone generally all with noise, including the noise in background environment And the noise generated in Recording Process.These carry the voice messaging of noise when carrying out speech recognition, will affect voice knowledge Other accuracy, therefore, it is necessary to carry out denoising to the first original speech information and the second original speech information, with from voice Purer voice (i.e. the first intermediate voice information and the second intermediate voice information) is extracted in information as far as possible, knows voice It is more inaccurate.In the present embodiment, the method denoised to the first original speech information and the second original speech information includes But it is not limited to using spectrum-subtraction, EEMD decomposition algorithm and the unusual value-based algorithm of SVD etc..
S42: feature is carried out to the first intermediate voice information and the second intermediate voice information using speech feature extraction algorithm It extracts, obtains corresponding first phonetic feature of the first intermediate voice information and corresponding second voice of the second intermediate voice information is special Sign.
Wherein, the first phonetic feature and the second phonetic feature include but is not limited to filter characteristic.Filter (Filter- Bank, abbreviation Fbank) it is characterized in common phonetic feature in speech recognition process.Since Meier commonly used in the prior art is special Sign can carry out dimension-reduction treatment to voice messaging in carrying out model identification process, lead to the loss of partial information, above-mentioned to avoid Problem occurs, and in the present embodiment, replaces common Meier feature using filter characteristic.
S43: the first phonetic feature and the second phonetic feature are input in preparatory trained speech recognition modeling respectively It is identified, obtains the corresponding first identification text of the first phonetic feature and the corresponding second identification text of the second phonetic feature.
It is understood that speech recognition modeling includes preparatory trained acoustic model and language model.Wherein, acoustic model is For obtaining the corresponding aligned phoneme sequence of target voice feature.Phoneme is by unit the smallest in voice, it will be appreciated that for inside Chinese character Phonetic.Such as: Chinese syllable ā () only one phoneme, à i (love) is there are two phoneme, and there are three phonemes etc. by d ā i (slow-witted).Sound The training method for learning model includes but is not limited to that GMM-HMM (mixed Gauss model) is used to be trained.Language model is to be used for Aligned phoneme sequence is converted to the model of natural language text.Specifically, server is respectively by the first phonetic feature and the second voice Feature is input in preparatory trained acoustic model and is identified, obtains the corresponding aligned phoneme sequence of target voice feature, then The aligned phoneme sequence that will acquire is input in preparatory trained language model and is identified, obtains corresponding identification text, i.e., and the One identification text and the second identification text.
S44: the first identification text and the second identification text and default words art are subjected to transcription comparison respectively, obtain the second body Part verification result.
Specifically, the first identification text and the second identification text and default words art are carried out transcription comparison respectively by server, Only when the first identification text and default words art transcription comparison success and the second identification text and default words art transcription comparison success, then The second authentication result being proved to be successful.Even first identification text is known with default words art transcription comparison failure and/or second Other text and default words art transcription comparison failure, then obtain the second authentication result of authentication failed.
In the present embodiment, by using voice enhancement algorithm to the first original speech information and the second original speech information into Row denoising is improved using preparatory trained speech recognition modeling with excluding noise jamming to the first original speech information and the The recognition accuracy that two original speech informations are identified.Finally, by the first identification text and the second identification text and default words Art carries out transcription comparison, obtains the second authentication as a result, guaranteeing to ensure to sign the provision content in both sides' agreement contract The validity of contract.
In one embodiment, as shown in fig. 6, before step S60, i.e., based on the first electronic signature and the second electronic signature Target electronic contract is signed, before obtaining contract signing result, which further includes following steps:
S611: obtained by acquisition third party's digital verification platform verifies the first electronic signature and the second electronic signature Signature verification result.
Wherein, third party's digital verification platform is certification authority in addition to the transaction partners, is able to verify that both parties True legal identity, utmostly prevent deceptive information, guarantee the platform of both parties' interests.Specifically, to getting After one electronic signature and the second electronic signature, sends the first electronic signature and the second electronic signature to third party's digital verification and put down Platform, to obtain the signature verification knot that third party's digital verification platform verifies the first electronic signature and the second electronic signature Fruit.
S612: if signature verification result is to be verified, based on the first electronic signature and the second electronic signature to target Electronic contract is signed, and contract signing result is obtained.
Specifically, if signature verification result is to be verified, based on the first electronic signature and the second electronic signature to mesh Mark electronic contract is signed, and contract signing result is obtained;If signature verification result is that verifying does not pass through, signing failure is returned Contract signing as a result, with the validity of contract of guarantee, enhance the legal effect of electronic contract.
In the present embodiment, by be linked to third party's digital verification platform to first electronic signature and second sign electronically into Row verifying enhances the law effect of electronic contract to guarantee the validity of both parties' signature, and then the validity of contract of guarantee Power.
In one embodiment, as shown in fig. 7, after step S60, which further includes following steps:
S71: the timing feedback information that the first client or the second client are sent is obtained.
Wherein, timing feedback information refers to the compact implementation progress of compact implementation side's timing feedback.Specifically, it is successfully signing After making a contract, if sign a contract as implementation of class contract, both parties can activate Schedule monitoring function in Schedule monitoring configuration interface Can, so that platform is timed monitoring to target electronic contract.The active mode includes but is not limited to use to light or choose Mode chooses Schedule monitoring button, to activate Schedule monitoring function.Server is by activation Schedule monitoring function, so that server Monitoring is timed according to the timing feedback information that the first client or the second client are sent.It compact implementation side need to be right according to its Client (i.e. the first client or the second client) timing (as updated a progress of implementation weekly) answered updates progress of implementation, So that server obtains the timing feedback information that the first client or the second client are sent.
S72: keyword extraction is carried out to target electronic contract according to default monitoring keyword, obtains sensitive field.
Wherein, it presets monitoring keyword and refers to the preset keyword for being used to be timed monitoring.Default monitoring is closed Key word includes but is not limited to contract engagement time limit, payment time and Payment Amount etc..Specifically, according to default monitoring keyword pair Attribute value corresponding with default monitoring keyword extracts in target electronic contract, determines sensitive field based on the attribute value. The sensitivity field includes but is not limited to the attribute values such as contract engagement time limit, payment time and Payment Amount.
S73: being based on timing feedback information, monitor in real time according to default violation rule to sensitive field, obtains monitoring As a result.
Wherein, preset violation rule be it is preset according to timing feedback information determine both parties whether as agreed The rule that clause is fulfilled obligations.Specifically, server monitors sensitive field in real time according to following default rule in violation of rules and regulations: clothes Whether business device completes task according to timing feedback information monitoring compact implementation side (i.e. Party B) within the prescribed time-limit, and according to timing Feedback information supervises Party A's (i.e. contract paying party) to pay the bill within payment time.Understandably, if compact implementation side (i.e. Party B) repeatedly timing does not update progress of implementation, then and server can give compact implementation side (i.e. Party B) corresponding client (i.e. first Client or the second client) send information warning;Correspondingly, contract paying party can also voluntarily supervise compact implementation in platform Square contract of novation progress of implementation.
S74: if monitored results are exception, prompting message is sent to the first client or the second client.
Specifically, if it is to complete to appoint not within the prescribed time-limit that monitored results, which are abnormal namely compact implementation side (i.e. Party B), Business, then server can send prompting message to the corresponding client in compact implementation side (i.e. the first client or the second client), It reminds it to complete contracted task according to agreed period, remains unfulfilled task if repeatedly reminding, judicial authority can be transferred It is handled.If contract paying party is not paid the bill within payment time, server can give the corresponding client of contract paying party It holds (i.e. the first client or the second client) to send prompting message, reminds the prompt payment of contract paying party, if repeatedly reminding still It pays the bill not in time, then blacklist can be added in the corresponding authentication information of contract paying party (i.e. identification card number and name), It is forbidden to contract in this platform.
In the present embodiment, by using default violation rule to the timing feedback of the first client or the transmission of the second client Information is timed monitoring, with realize platform back-up surveillance compact implementation into purpose, in time remind both parties as agreed In regulation fulfil obligations, and blacklist mechanism is set, is even reminded repeatedly, violation side does not fulfil obligations according to the rules yet, then Blacklist can be added in violation side, it is forbidden to contract in signing platform.
In one embodiment, as shown in figure 8, before step S10, which further includes following steps:
S111: the electronic contract request to create that the first client is sent is obtained, electronic contract request to create includes contract class Type.
Wherein, electronic contract request to create is the request for triggering terminal equipment making electronic contract.Specifically, in electricity Classification Management is carried out to electronic contract template in the form of grading list on the production interface of sub- contract, for example, insurance contract packet Contract of property insurance and contract of life insurance etc. are included, to facilitate user to select to use, promotes user experience, institute may be selected in user The corresponding electronic contract template of contract type is needed, so that server obtains the electronic contract request to create that the first client is sent.
S112: based on contract type search database obtains contract template to be edited corresponding with contract type, wait compile Collecting contract template includes clause type to be edited.
Specifically, contract template to be edited is the pre-stored electronic contract mould corresponding with contract type of server Plate.The contract template to be edited includes contract terms frame and signature blocks.Wherein, contract terms frame refers to electronic contract mould Need to fill the region of contract terms in plate.Clause type to be edited refers to the item of the clause to be edited in contract template to be edited Money type.The clause type to be edited may include both parties, subject matter of a contract object, contract place, contract term and liability for breach of contract Deng.Signature blocks refer in electronic contract template for signing the region of electronic signature.The electronic module for signing mane is according to electronics The signature blocks of the type setting different number of contract template, for example, the electronic signature of both sides is needed in deal contract, because This need to configure two signature blocks;The contract of gift only needs the electronic signature of a side, therefore need to configure a signature blocks.
S113: according to clause type queries clause database to be edited, item corresponding with clause type to be edited is obtained Money pick list.
Wherein, the content in contract terms frame can be independently arranged in user as needed, that is, it is to be edited to can customize modification Contract template.It is to be appreciated that can store but be not limited to deal contract, the contract of gift, loan contract, lease conjunction in database Electronic contracts template, the user such as same, contract for construction project, contract of transportation and contract of brokerage can be by changing or adding conjunction to be edited With the content of contract terms specific in template, to obtain the treaty content of user's needs.
Specifically, term options table corresponding with clause type is previously stored in database, in the term options table Including N number of standard clause, user, which can click directly on the fund to be modified, can obtain template modification instruction, with trigger the server Instruction is modified according to template and searches database, obtains term options table, the required clause independently selected for user or user The practicability of electronic contract platform can also be improved directly to the clause manual editing of required modification.
S114: selecting at least one object clause from term options table, at least one object clause is filled in wait compile Contract template is collected, target electronic contract is obtained.
Specifically, user can also choose at least one mesh by the way of pulling or clicking selection from term options table Clause is marked, so that at least one object clause is filled in contract template to be edited by server, obtains target electronic contract, operation Simply, it promotes contract and creates efficiency.
Further, it after getting object clause, can also modify to object clause.Specifically, clause is obtained to repair Change instruction, is modified based on clause modification instruction to object clause, obtain target electronic contract, and in target electronic contract Highlight modifier area.
Wherein, clause modification instruction is the instruction modified for trigger the server to object clause.The clause modification It include clause modification content in instruction.Server can modify to object clause based on clause modification instruction, also i.e. by clause Modification content as object clause and is filled into contract template to be edited, to obtain target electronic contract.Specifically, server After obtaining modified object clause, due to not can determine that whether the clause (i.e. object clause) of the customized modification of user meets It is required that or comply with standard, therefore modifier area (i.e. modified object clause) can be highlighted in contract template to be edited, So that contract signing both sides can be visually seen the customized clause of user i.e. object clause in target electronic contract, contract party is ensured Legitimate rights and interests.
In the present embodiment, edited by using contract template to be edited corresponding with contract type, to realize nothing The purpose of electronic contract need to be manually made, the creation efficiency of target electronic contract is improved.And modification function is provided, so as to Institute is chosen in contract terms in the customized change contract template to be edited in family or the term options table according to server offer The object clause needed is modified, and highlights modifier area in target electronic contract, so that contract signing both sides can be straight The customized clause of user i.e. object clause in target electronic contract is watched, ensures the legitimate rights and interests of contract party.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of contract signing device is provided, contract label in the contract signing device and above-described embodiment Binding method corresponds.As shown in figure 9, the contract signing device includes that contract signing request module 10, the second identity are tested Card image collection module 20, the first authentication result obtain module 30, original speech information obtains module 40, the second identity is tested It demonstrate,proves result and obtains module 50 and contract signing result acquisition module 60.Detailed description are as follows for each functional module:
Contract signing request module 10, for obtaining the contract signing request of the first client transmission, the contract Signing request includes target electronic contract, the first authentication image and recipient's information.
Second authentication image collection module 20, for target electronic contract to be sent to recipient's information corresponding Two clients obtain appraising and deciding as a result, if appraising and deciding result is to appraise and decide agreement for the second client return, obtain the second client hair The the second authentication image sent.
First authentication result obtains module 30, for carrying out letter to target electronic contract according to default verifying keyword Breath extracts, and both parties' information corresponding with default verifying keyword is obtained, using both parties' information to the first authentication Image and the second authentication image carry out authentication, obtain the first authentication result.
Original speech information obtains module 40, for it is original to obtain the first client is sent first based on default words art The second original speech information that voice messaging and the second client are sent.
Second authentication result obtains module 50, for being believed based on the first original speech information and the second raw tone Breath obtains the second authentication result.
Contract signing result obtains module 60, if being to test for the first authentication result and the second authentication result It demonstrate,proves successfully, then obtains the first electronic signature and the second client that the first client is sent in default signing duration are sent second Electronic signature signs target electronic contract based on the first electronic signature and the second electronic signature, obtains contract signing knot Fruit.
Specifically, the first authentication result obtains module and obtains including verifying frame image acquisition unit, verifying facial image Take unit, subscriber identity information acquiring unit, matching treatment result acquiring unit and the first ID card verification result acquiring unit.
Frame image acquisition unit is verified, is carried out remotely for starting the corresponding camera of the first client and the second client Monitoring obtains the first monitor video and the second monitor video, according to default interception rule respectively to the first monitor video and second Monitor video extracts, and obtains the first verifying frame image and the second verifying frame image.
Facial image acquiring unit is verified, for carrying out face inspection to the first verifying frame image and the second verifying frame image It surveys, obtains and the corresponding first verifying facial image of the first verifying frame image and the second verifying corresponding with the second verifying frame image Facial image.
Subscriber identity information acquiring unit, for using OCR identification technology to the first authentication image and the second identity Authentication image identified, obtain the first subscriber identity information corresponding with the first authentication image and with the second authentication The corresponding second user identity information of image.
Matching treatment result acquiring unit, for the first subscriber identity information and second user identity information and transaction is double Square information is matched, and matching treatment result is obtained.
First ID card verification result acquiring unit, if being successful match for matching treatment result, by the first verifying Facial image and the second verifying facial image are sent to third party's public security system, obtain the first body that third party's public security system returns Part card verification result.
Specifically, subscriber identity information acquiring unit includes that image to be verified obtains subelement and subscriber identity information acquisition Subelement.
Image to be verified obtains subelement, for carrying out respectively to the first authentication image and the second authentication image Edge contrast, gray processing processing and perspective transform processing, obtain corresponding first image to be verified of the first authentication image and Corresponding second image to be verified of second authentication image.
Subscriber identity information obtains subelement, for be tested to the first image to be verified and second using OCR identification technology Card image identified, obtain first subscriber identity information corresponding with the first image to be verified and with the second image pair to be verified The second user identity information answered.
Specifically, it includes intermediate voice information acquisition unit, phonetic feature acquisition that the second authentication result, which obtains module, Unit, identification text acquiring unit and the second authentication result acquiring unit.
Intermediate voice information acquisition unit, for original to the first original speech information and second using voice enhancement algorithm Voice messaging carries out denoising, obtains the first original speech information corresponding the first intermediate voice information and the second original language Message ceases corresponding second intermediate voice information.
Phonetic feature acquiring unit, for using speech feature extraction algorithm to the first intermediate voice information and second among Voice messaging carries out feature extraction, obtains corresponding first phonetic feature of the first intermediate voice information and the second intermediate voice information Corresponding second phonetic feature.
It identifies text acquiring unit, is trained in advance for being respectively input to the first phonetic feature and the second phonetic feature Speech recognition modeling in identified, obtain the corresponding first identification text of the first phonetic feature and the second phonetic feature be corresponding Second identification text.
Second authentication result acquiring unit, for respectively by the first identification text and the second identification text and default words Art carries out transcription comparison, obtains the second authentication result.
Specifically, which further includes signature verification result acquiring unit and signature verification result treatment list Member.
Signature verification result acquiring unit, for obtaining third party's digital verification platform to the first electronic signature and the second electricity Son signature carries out verifying obtained signature verification result.
Signature verification result treatment unit, if being to be verified for signature verification result, based on the first electronic signature Target electronic contract is signed with the second electronic signature, obtains contract signing result.
Specifically, which further includes timing feedback information acquisition unit, sensitive field acquiring unit, monitoring As a result acquiring unit and monitored results processing unit.
Timing feedback information acquisition unit, the timing feedback letter sent for obtaining the first client or the second client Breath.
Sensitive field acquiring unit, for carrying out keyword extraction to target electronic contract according to default monitoring keyword, Obtain sensitive field.
Monitored results acquiring unit carries out sensitive field according to default violation rule for being based on timing feedback information Real time monitoring obtains monitored results.
Monitored results processing unit is sent if being exception for monitored results to the first client or the second client Prompting message.
Specifically, which further includes that electronic contract request to create acquiring unit, clause type to be edited obtain Take unit, term options table acquiring unit and target electronic contract acquiring unit.
Electronic contract request to create acquiring unit, for obtaining the electronic contract request to create of the first client transmission, electricity Sub- contract request to create includes contract type.
Clause type acquiring unit to be edited obtains opposite with contract type for based on contract type search database The contract template to be edited answered, contract template to be edited include clause type to be edited.
Term options table acquiring unit, for according to clause type queries clause database to be edited, obtain with it is to be edited The corresponding term options table of clause type.
Target electronic contract acquiring unit will at least one for selecting at least one object clause from term options table A object clause is filled in contract template to be edited, obtains target electronic contract.
Specific about contract signing device limits the restriction that may refer to above for contract signing method, herein not It repeats again.The modules that said contract is signed in device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 10.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment, which is used to store, executes the data that contract signing method is generated or obtained in the process, such as target electronic contract. The network interface of the computer equipment is used to communicate with external terminal by network connection.The computer program is held by processor To realize a kind of contract signing method when row.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize the contract label in above-described embodiment when executing computer program The step of binding method, such as step S10-S60 or Fig. 3 shown in Fig. 2 is to step shown in fig. 8.Alternatively, processor is held The function of each module/unit in this embodiment of contract signing device is realized when row computer program, such as shown in Fig. 9 each Module/unit function, to avoid repeating, which is not described herein again.
In one embodiment, a non-volatile memory medium is provided, is stored with computer on the non-volatile memory medium The step of program, which realizes user account number unlocking method in above-described embodiment when being executed by processor, such as Fig. 2 Shown step S10-S60 or Fig. 3 is to step shown in fig. 8, and to avoid repeating, which is not described herein again.Alternatively, the meter Realize that said contract signs the function of each module/unit in this embodiment of device, example when calculation machine program is executed by processor The function of each module/unit as shown in Figure 9, to avoid repeating, which is not described herein again.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of contract signing method characterized by comprising
The contract signing request of the first client transmission is obtained, the contract signing request includes target electronic contract, the first body Part authentication image and recipient's information;
The target electronic contract is sent to corresponding second client of recipient's information, obtains second client What is returned appraises and decides as a result, obtaining the second identity that second client is sent if the result of appraising and deciding is to appraise and decide agreement and testing Demonstrate,prove image;
Information extraction is carried out to target electronic contract according to default verifying keyword, obtains friendship corresponding with default verifying keyword Easy two-sided information, using both parties' information to the first authentication image and the second authentication image into Row authentication obtains the first authentication result;
Based on default words art, the first original speech information and second client transmission that first client is sent are obtained The second original speech information;
Based on first original speech information and second original speech information, the second authentication result is obtained;
If the first authentication result and the second authentication result are to be proved to be successful, when obtaining default sign The second electronic signature that the first electronic signature and second client that first client is sent in long are sent, is based on institute It states the first electronic signature and the target electronic contract is signed in second electronic signature, obtain contract signing result.
2. contract signing method as described in claim 1, which is characterized in that described to use both parties' information to described First authentication image and the second authentication image carry out authentication, obtain the first authentication result, comprising:
Start first client and the corresponding camera of second client is remotely monitored, obtains the first monitoring view Frequency and the second monitor video respectively carry out first monitor video and second monitor video according to default interception rule It extracts, obtains the first verifying frame image and the second verifying frame image;
Face datection is carried out to the first verifying frame image and the second verifying frame image, is obtained and the first verifying frame The corresponding first verifying facial image of image and the second verifying facial image corresponding with the second verifying frame image;
The first authentication image and the second authentication image are identified using OCR identification technology, obtained And corresponding first subscriber identity information of the first authentication image and corresponding with the second authentication image Two subscriber identity informations;
First subscriber identity information and second user identity information are matched with both parties' information, acquisition With processing result;
If the matching treatment result is successful match, by the first verifying facial image and the second verifying face figure As being sent to third party's public security system, the first ID card verification result that third party's public security system returns is obtained.
3. contract signing method as described in claim 1, which is characterized in that described to use OCR identification technology to described first Authentication image and the second authentication image identified, obtains corresponding with the first authentication image the One subscriber identity information and second user identity information corresponding with the second authentication image, comprising:
Respectively to the first authentication image and the second authentication image be sharpened processing, gray processing processing and Perspective transform processing, obtains corresponding first image to be verified of the first authentication image and the second authentication figure As corresponding second image to be verified;
The described first image to be verified and second image to be verified are identified using OCR identification technology, acquisition and institute State corresponding first subscriber identity information of the first image to be verified and second user body corresponding with the described second image to be verified Part information.
4. contract signing method as described in claim 1, which is characterized in that it is described based on first original speech information and Second original speech information obtains the second authentication result, comprising:
Denoising is carried out to first original speech information and second original speech information using voice enhancement algorithm, It obtains the first corresponding intermediate voice information of first original speech information and second original speech information is corresponding Second intermediate voice information;
Feature is carried out to the first intermediate voice information and the second intermediate voice information using speech feature extraction algorithm It extracts, obtains corresponding first phonetic feature of the first intermediate voice information and the second intermediate voice information corresponding the Two phonetic features;
First phonetic feature and second phonetic feature are input in preparatory trained speech recognition modeling respectively It is identified, obtains the corresponding first identification text of first phonetic feature and second phonetic feature corresponding second is known Other text;
The first identification text and the second identification text and the default words art are subjected to transcription comparison respectively, acquisition the Two authentication results.
5. contract signing method as described in claim 1, which is characterized in that described based on first electronic signature and institute The second electronic signature is stated to sign the target electronic contract, it is described to state contract signing before obtaining contract signing result Method further include:
Obtained by acquisition third party's digital verification platform verifies first electronic signature and second electronic signature Signature verification result;
If the signature verification result is to be verified, based on first electronic signature and second electronic signature to institute It states target electronic contract to be signed, obtains contract signing result.
6. contract signing method as described in claim 1, which is characterized in that after the acquisition contract signing result, institute State contract signing method further include:
Obtain the timing feedback information that first client or second client are sent;
Keyword extraction is carried out to the target electronic contract according to default monitoring keyword, obtains sensitive field;
Based on the timing feedback information, the sensitive field is monitored in real time according to default violation rule, obtains monitoring As a result;
If the monitored results are exception, prompting message is sent to first client or second client.
7. contract signing method as described in claim 1, which is characterized in that in the contract that the first client of the acquisition is sent Before signing request, the contract signing method further include:
The electronic contract request to create that first client is sent is obtained, the electronic contract request to create includes contract class Type;
Database is searched according to the contract type, obtains contract template to be edited corresponding with the contract type, it is described Contract template to be edited includes clause type to be edited;
According to the clause type queries clause database to be edited, clause corresponding with the clause type to be edited is obtained Pick list;
Select at least one object clause from the term options table, by least one described object clause be filled in it is described to Contract template is edited, target electronic contract is obtained.
8. a kind of contract signing device characterized by comprising
Contract signing request module, for obtaining the contract signing request of the first client transmission, the contract signing is asked It asks including target electronic contract, the first authentication image and recipient's information;
Second authentication image collection module, it is corresponding for the target electronic contract to be sent to recipient's information Second client obtains appraising and deciding as a result, if the result of appraising and deciding is to appraise and decide agreement for the second client return, obtains institute State the second authentication image of the second client transmission;
First authentication result obtains module, mentions for carrying out information to target electronic contract according to default verifying keyword It takes, both parties' information corresponding with default verifying keyword is obtained, using both parties' information to first identity Authentication image and the second authentication image carry out authentication, obtain the first authentication result;
Original speech information obtains module, for obtaining the first original language that first client is sent based on default words art The second original speech information that message breath and second client are sent;
Second authentication result obtains module, for being believed based on first original speech information and second raw tone Breath obtains the second authentication result;
Contract signing result obtains module, if being for the first authentication result and the second authentication result It is proved to be successful, then obtains default the first electronic signature and second client for signing the first client transmission in duration Send second electronic signature, based on it is described first electronic signature and it is described second electronic signature to the target electronic contract into Row is signed, and contract signing result is obtained.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to Any one of 7 contract signing methods.
10. a kind of non-volatile memory medium, the non-volatile memory medium is stored with computer program, which is characterized in that The contract signing method as described in any one of claim 1 to 7 is realized when the computer program is executed by processor.
CN201910043286.4A 2019-01-17 2019-01-17 Contract signing method, apparatus, computer equipment and storage medium Pending CN109872233A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910043286.4A CN109872233A (en) 2019-01-17 2019-01-17 Contract signing method, apparatus, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910043286.4A CN109872233A (en) 2019-01-17 2019-01-17 Contract signing method, apparatus, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109872233A true CN109872233A (en) 2019-06-11

Family

ID=66917809

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910043286.4A Pending CN109872233A (en) 2019-01-17 2019-01-17 Contract signing method, apparatus, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109872233A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557376A (en) * 2019-08-01 2019-12-10 平安科技(深圳)有限公司 Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN110689459A (en) * 2019-09-27 2020-01-14 北京百度网讯科技有限公司 Contract processing method, contract processing device, contract processing equipment and storage medium
CN110852711A (en) * 2019-11-05 2020-02-28 北京字节跳动网络技术有限公司 Signing method, signing device, storage medium and electronic equipment
CN112367453A (en) * 2020-11-25 2021-02-12 湖南鹏羽信息科技有限公司 Automatic identification device and method for business transaction process used by electronic commerce platform
CN112598064A (en) * 2020-12-25 2021-04-02 中国农业银行股份有限公司 Data processing method and device
CN113627387A (en) * 2021-08-30 2021-11-09 平安国际融资租赁有限公司 Parallel identity authentication method, device, equipment and medium based on face recognition
CN114241459A (en) * 2022-02-24 2022-03-25 深圳壹账通科技服务有限公司 Driver identity verification method and device, computer equipment and storage medium
CN115392913A (en) * 2022-10-27 2022-11-25 杭州钱袋数字科技有限公司 Electronic contract generating method based on user identity recognition and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020016913A1 (en) * 2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip
TW201421388A (en) * 2012-11-23 2014-06-01 jian-sheng Liu Multi-certificate transaction website system and transaction access method thereof
CN105631248A (en) * 2015-12-10 2016-06-01 深圳先进技术研究院 Signing method, forging judgment method and tampering judgment method of electronic contract
CN105844481A (en) * 2016-03-24 2016-08-10 胡金钱 System and method for performing digital signature and anticounterfeiting verification on contract
CN107225874A (en) * 2016-03-24 2017-10-03 胡金钱 Sealing system comprising electronic lock seal and the method for affixing one's seal using electronic lock seal
CN107527215A (en) * 2017-09-28 2017-12-29 山西特信环宇信息技术有限公司 A kind of electronic contract system and operating method based on biological identification technology
CN107977557A (en) * 2017-11-30 2018-05-01 广州势必可赢网络科技有限公司 A kind of electronic contract signature service authentication agreement and server based on Application on Voiceprint Recognition
CN108391020A (en) * 2018-02-26 2018-08-10 出门问问信息科技有限公司 A kind of call control method, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020016913A1 (en) * 2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip
TW201421388A (en) * 2012-11-23 2014-06-01 jian-sheng Liu Multi-certificate transaction website system and transaction access method thereof
CN105631248A (en) * 2015-12-10 2016-06-01 深圳先进技术研究院 Signing method, forging judgment method and tampering judgment method of electronic contract
CN105844481A (en) * 2016-03-24 2016-08-10 胡金钱 System and method for performing digital signature and anticounterfeiting verification on contract
CN107225874A (en) * 2016-03-24 2017-10-03 胡金钱 Sealing system comprising electronic lock seal and the method for affixing one's seal using electronic lock seal
CN107527215A (en) * 2017-09-28 2017-12-29 山西特信环宇信息技术有限公司 A kind of electronic contract system and operating method based on biological identification technology
CN107977557A (en) * 2017-11-30 2018-05-01 广州势必可赢网络科技有限公司 A kind of electronic contract signature service authentication agreement and server based on Application on Voiceprint Recognition
CN108391020A (en) * 2018-02-26 2018-08-10 出门问问信息科技有限公司 A kind of call control method, device, equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
R. RICCI ET AL.: "SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly", 《PROCEEDINGS OF SPIE》, pages 625009 - 1 *
RAHUL VERMA, D.S. RAO: "Offline Signature Verification and Identification Using Angle Feature and Pixel Density Feature And Both Method Together", 《INTERNATIONAL JOURNAL OF SOFT COMPUTING AND ENGINEERING (IJSCE) 》, pages 740 - 746 *
冯学帅: "不可靠通信中的两阶段认证与多接收者隐私保护协议的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 138 - 98 *
吴米兰: "基于电子签章的公文流转系统", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 138 - 1267 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557376A (en) * 2019-08-01 2019-12-10 平安科技(深圳)有限公司 Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN110557376B (en) * 2019-08-01 2022-12-30 平安科技(深圳)有限公司 Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN110689459A (en) * 2019-09-27 2020-01-14 北京百度网讯科技有限公司 Contract processing method, contract processing device, contract processing equipment and storage medium
CN110852711A (en) * 2019-11-05 2020-02-28 北京字节跳动网络技术有限公司 Signing method, signing device, storage medium and electronic equipment
CN112367453A (en) * 2020-11-25 2021-02-12 湖南鹏羽信息科技有限公司 Automatic identification device and method for business transaction process used by electronic commerce platform
CN112598064A (en) * 2020-12-25 2021-04-02 中国农业银行股份有限公司 Data processing method and device
CN113627387A (en) * 2021-08-30 2021-11-09 平安国际融资租赁有限公司 Parallel identity authentication method, device, equipment and medium based on face recognition
CN114241459A (en) * 2022-02-24 2022-03-25 深圳壹账通科技服务有限公司 Driver identity verification method and device, computer equipment and storage medium
CN115392913A (en) * 2022-10-27 2022-11-25 杭州钱袋数字科技有限公司 Electronic contract generating method based on user identity recognition and storage medium
CN115392913B (en) * 2022-10-27 2023-03-10 杭州钱袋数字科技有限公司 Electronic contract generating method based on user identity recognition and storage medium

Similar Documents

Publication Publication Date Title
CN109872233A (en) Contract signing method, apparatus, computer equipment and storage medium
US20210110366A1 (en) Kiosks for remote collection of electronic devices for value, and associated mobile application for enhanced diagnostics and services
JP6934082B2 (en) Device screen damage detection
CN106599772B (en) Living body verification method and device and identity authentication method and device
CN105681316B (en) identity verification method and device
WO2023064601A1 (en) Method and system to autonomously authenticate and validate users using a node server and database
CN105407042B (en) A kind of wechat public platform based remote sim card activating method and system
WO2018233487A1 (en) Identity authentication method, terminal and storage medium
CN109697665A (en) Loan checking method, device, equipment and medium based on artificial intelligence
US20190294900A1 (en) Remote user identity validation with threshold-based matching
CN110689459B (en) Contract processing method, contract processing device, contract processing equipment and storage medium
CN109472918A (en) Invoice validation method, financing checking method, device, equipment and medium
CN112333549B (en) Video processing method and device, electronic equipment and storage medium
US8380626B2 (en) Processing images associated with the remote capture of multiple deposit items
CN103577801A (en) Quality metrics method and system for biometric authentication
CN107025397B (en) Identity information acquisition method and device
CN110163053B (en) Method and device for generating negative sample for face recognition and computer equipment
TW202008197A (en) Identity verification method and device and account information modification method and device
EP3455765A1 (en) Method of remotely identifying a physical person in asynchronous mode, aimed at the release of an advanced electronic signature, qualified electronic signature or digital identity
CN111523109B (en) Method and device for verifying electronic equipment application
CN109409349A (en) Credit certificate discrimination method, device, terminal and computer readable storage medium
CN107038619B (en) Virtual resource management method and device
CN113111330B (en) Enterprise legal identity authentication management method and system based on enterprise chain code
WO2019210575A1 (en) Real estate information enquiry method and apparatus, and computer device and storage medium
AU2020313091A1 (en) Asset verification systems and/or methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination