CN111415278A - Management method for registration and authentication of electronic contract platform user - Google Patents

Management method for registration and authentication of electronic contract platform user Download PDF

Info

Publication number
CN111415278A
CN111415278A CN202010189676.5A CN202010189676A CN111415278A CN 111415278 A CN111415278 A CN 111415278A CN 202010189676 A CN202010189676 A CN 202010189676A CN 111415278 A CN111415278 A CN 111415278A
Authority
CN
China
Prior art keywords
user
registration
authentication
information
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010189676.5A
Other languages
Chinese (zh)
Inventor
刘戊洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010189676.5A priority Critical patent/CN111415278A/en
Publication of CN111415278A publication Critical patent/CN111415278A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Abstract

The invention belongs to the technical field of information technology, and particularly relates to a management method for user registration and authentication of an electronic contract platform. The key information, any question and any update in the user identity information verification process can remind the contracting person of the electronic contract in time to carry out notification and user acceptance confirmation. The adjustment of the logic of user authentication and the face comparison parameters is enhanced, and the human intervention is gradually reduced.

Description

Management method for registration and authentication of electronic contract platform user
Technical Field
The invention relates to the technical field of information technology, in particular to a management method for registration and authentication of users of an electronic contract platform.
Background
Global informatization has been a history for 60 years, and the digitization process of enterprises is faster than what we want. Contracts are important assets of enterprise information and data, and the interest in electronic management of enterprise or personal contracts is increasing. The electronic contract management system comprises a contract law of the people's republic of China, an electronic signature law of the people's republic of China, a GB/T36298 plus 2018 electronic contract establishment flow specification, a GBT 36320 plus 2018 third-party electronic contract service platform function construction specification and a GBT 36319 plus 2018 electronic contract basic information description specification, wherein the contract law foundation and the standard specification are laid for electronic, networking, digitalization and intelligent application of electronic contracts in electronic commerce, natural people and legal people. Based on the requirements of protection and constraint of civil responsibility between contract signing and contract contracting contractors, the invention constructs a system for digitalizing user registration and identity verification of personal and enterprise electronic contract management and online signing in the real world.
Compared with paper contract signing, when a party signs on site in a certain place, the corresponding contract contractor, the contract document and the signing place can be perceived in the real world. When the electronic contract is signed on a subscription platform, referring to the electronic signature law of the people's republic of China, the main operation sites of an electronic contract initiator and a receiver are sites for sending and receiving the electronic contract. Therefore, the electronic contract-making platform is very important for the management method of user identity registration and identity verification. The managed content comprises registration information, authentication process data, user data modification, authentication results, background audit records and acceptance of contracting relatives to the face images, wherein the registration information, the authentication information and the authentication process data are submitted by users.
However, in the existing electronic contract, the platform is contracted, the identity information of the platform user cannot be effectively ensured to be accurate and credible, and the accuracy of identity verification cannot be continuously improved, so that the problem of safety is caused.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above and/or other problems occurring in user management in the existing electronic contract platform.
Therefore, the present invention aims to provide a management method for user registration and authentication on an electronic contract platform, which can ensure that user identity information on the electronic contract platform is accurate and reliable, and can continuously improve the accuracy of identity verification. Meanwhile, reasonable utilization and protection of user privacy data are enhanced, and a public and transparent use mode method is advocated. The matching degree of face comparison and the accuracy degree of user perception and acceptance in a real scene are detected in the mode.
To solve the above technical problem, according to an aspect of the present invention, the present invention provides the following technical solutions:
a management method for registration and authentication of users of an electronic contract platform comprises the following steps:
the method comprises the following steps: the user submits a name and a mobile phone number for registration, the mobile phone number of the user is confirmed to be all registered users in a short message verification code mode during registration, and information submitted by the user and a verification result are written into a registration authentication log of the user;
step two: the user submits an identity card number, photos of the front side and the back side of the identity card, a living body face video or the photos, OCR extracts the identity card number, the name of the identity card and the head image of the identity card, the name and the identity card number of a registered user are compared, and corresponding verification information is written into a registration authentication log of the user;
step three: the user modifies personal information, including name, mobile phone number, ID card number, photo and living body image on the front and back of ID card, repeats OCR identification and ID information comparison in step two, writes the corresponding modification and verification information into the user's registration authentication log;
step four: after all the first three steps are verified, sending the front and back data of the identity card to an identity information base of a public security place, inquiring whether the identity information exists, and if not, terminating the registration authentication of the user;
step five: extracting a head portrait and a living body image face of the identity card, comparing the faces, and writing corresponding background face recognition and face comparison into a registration authentication log of a user;
step six: if the face comparison is lower than the similarity preset by the system, the user can modify the live face video or photo, and the corresponding modification event is written into the registration authentication log of the user;
step seven: if the face comparison fails for the second time, the user can initiate background audit, and a corresponding background audit submission event is written into a registration authentication log of the user;
step eight: the background operator checks the face check application submitted by the user, and corresponding background personnel check records are written into the registration authentication log of the user;
step nine: after the above steps are successful, the authentication state of the user is authenticated, and the corresponding authentication state log is written into the registration authentication log of the user;
step ten: the contracting person can confirm the acceptance of the living body image of the contracting opposite person before signing;
step eleven: after desensitization, the registration authentication log of the user is synchronously updated to the front-end user and the background operator, and desensitization information comprises names, telephones, mobile phone numbers, IP (Internet protocol), MAC (media access control) addresses, ID (identity) card picture display and living body images.
Compared with the prior art: in the existing electronic contract, the identity information of the platform user cannot be effectively ensured to be accurate and credible aiming at the contract establishment platform, the accuracy of identity verification cannot be continuously improved, and the problem of safety is caused. By the method, the user can have consistent knowledge on the identity information protection, the user data desensitization management and the identity information management modes of other users. And with the innovation and the progress of science and technology, the corresponding updating can synchronously strengthen the management of identity verification and contract security.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the present invention will be described in detail with reference to the accompanying drawings and detailed embodiments, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without inventive efforts. Wherein:
fig. 1 is a schematic flow structure diagram of a management method for user registration and authentication of an electronic contract platform according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described herein, and it will be apparent to those of ordinary skill in the art that the present invention may be practiced without departing from the spirit and scope of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Next, the present invention is described in detail with reference to the schematic drawings, and in the detailed description of the embodiments of the present invention, the modules representing the model structure are not further detailed for convenience of explanation, and the schematic drawings are only examples, which should not limit the scope of the present invention.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides a management method for user registration and authentication of an electronic contract platform, which comprises the following operation steps:
the method comprises the following steps: the user submits the registration information, and the system verifies the short message verification code. After the user is registered, the default authentication state is not authenticated.
Registration log 2019 month day 19: 03: 01, user A: leaf three in web end/MAC F3-8C-50-7/IP-172.124.
System log 2019 month day 19: 03: F3-8C-50-7/IP-172.124. the said 2. the said mobile phone short message and the result: success and failure.
System log 2019 month day 19: 03: F3-8C-50- × 7/IP-172.124.× 2& user authentication status &/user name: mobile phone number: authentication result: and (4) not authenticating.
Step two: and (4) identity authentication, wherein a user submits an identity card number, a positive and negative image of the identity card and a living body image. And reading the identity card information by OCR and comparing the identity card information with the identity registration information.
Authentication log 2019 month day 19: 03: 01, user A: leaf three on web end/MAC F3-8C-50-x-7/IP-172.124. And the reverse side of the ID card is shown as the following: ****.
Authentication log 2019 month day 19: 03: 01, user A: leaf three on web end/MAC F3-8C-50-x-7/IP-172.124. ****.
Authentication log 2019 month day 19: 03: 01, user A: leaf three in web end/MAC F3-8C-50-7/IP-172.124.
Authentication log 2019 month day 19: 03: 01, user A: leaf three on web end/MAC F3-8C-50-x-7/IP-172.124. x 2& authentication &/authentication identification number: success, failure/authentication name: success and failure.
Step three: the user modifies personal information, including name, mobile phone number, email, ID card number, ID card front picture, ID card back picture and living body image. The relevant authentication actions are reactivated, step 4 and step 5 if the modification related to the identification card picture is performed, and step 5 if the modification related to the live body image is performed.
Authentication log 2019 month day 19: 03: 01, user A: leaf three on web end/MAC F3-8C-50-7/IP-172.124. x 2. modified personal information &/name: the mark/the ID number: number of identification card: positive of the card: and the reverse side of the ID card is shown as the following: ****.
Authentication log 2019 month day 19: 03: 01, user A: leaf three on web end/MAC F3-8C-50-x-7/IP-172.124. ****.
Authentication log 2019 month day 19: 03: 01, user A: leaf three in web end/MAC F3-8C-50-7/IP-172.124.
Authentication log 2019 month day 19: 03: 01, user A: leaf three on web end/MAC F3-8C-50-x-7/IP-172.124. x 2& authentication &/authentication identification number: success, failure/authentication name: success and failure.
Step four: and after the basic identity information verification in the first 3 steps is passed, the system background sends the front and back data of the identity card to an identity information base of a public security place to inquire whether the identity information exists. If not, the registration authentication of the user is terminated.
System log 2019 month day 19: 03: F3-8C-50-7/IP-172.124. x.2. public security-the identity information query &/result: success and failure.
Step five: and (5) comparing the faces.
System log 2019 month day 19: 03: F3-8C-50- × 7/IP-172.124.× 2& face alignment &/result: success and failure.
Step six: when the comparison fails, the user can modify personal information, such as the picture of the front side of the identity card, the living body image, the log and the third step.
Step seven: if the head portrait information of the identity card can not be compared with the recent living body image successfully earlier, the user can submit the background audit.
Authentication log 2019 month day 19: 03: 01, user A: leaf three in web end/MAC F3-8C-50-x-7/IP-172.124. And confirming and canceling.
Step eight: and the background checks and checks the identity card picture and the living body image, and records the checking result.
Authentication log 2019 month day 19: 03: 01, background user B: and C, checking face comparison in background & background and checking in background: pass and fail.
Step nine: and after the corresponding 4 elements (name, mobile phone number, identity card number and face) are approved, the identity authentication of the user is passed.
System log 2019 month day 19: 03: F3-8C-50- × 7/IP-172.124.× 2& user authentication status &/user name: mobile phone number: authentication result: and (4) authentication is carried out.
Step ten: after the user authentication state is authenticated, the user can start to sign the electronic contract online. The in vivo image acceptance of the contracting opposing person can be confirmed by the system prior to signing.
Personal journal of 2019 month day 19: 03: 01 initiator-user a: leave three confirmed recipients-user B/live images at web end/MAC F3-8C-50- × 7/IP-172.124. Confirmation/system transaction number: A0000000000001.
personal journal of 2019 month day 19: 03: 01 initiator-user a: leave three confirmed recipients-user B/live images at web end/MAC F3-8C-50- × 7/IP-172.124. Somewhat/system transaction number: A0000000000001.
personal journal of 2019 month day 19: 03: 01 initiator-user a: leave three confirmed recipients-user B/live images at web end/MAC F3-8C-50- × 7/IP-172.124. Unacceptable/system transaction number: A0000000000001.
personal journal of 2019 month day 19: 03: 01 receiver-user a: tri-web-end/MAC F3-8C-50-0-7/IP-172.124. x 2 confirm initiator-user B/live image results: confirmation/system transaction number: A0000000000001.
personal journal of 2019 month day 19: 03: 01 receiver-user a: tri-web-end/MAC F3-8C-50-0-7/IP-172.124. x 2 confirm initiator-user B/live image results: somewhat/system transaction number: A0000000000001.
contract operation log 2019 month day 19: 03: 01 receiver side-user a: tri-web-end/MAC F3-8C-50-0-7/IP-172.124. x 2 confirm initiator-user B/live image results: unacceptable/system transaction number: A0000000000001.
step eleven: the registration authentication logs of the users are synchronously updated to the front-end users and the background management personnel, so that the management of the users and the platform is facilitated, and the large-scale inquiry and calling of the private data of the users are avoided. When displaying, desensitizing the privacy data of the registration authentication log, including name, telephone, mobile phone number, IP, MAC address, ID card picture display, and living body image.
While the invention has been described above with reference to an embodiment, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In particular, the various features of the disclosed embodiments of the invention may be used in any combination, provided that no structural conflict exists, and the combinations are not exhaustively described in this specification merely for the sake of brevity and resource conservation. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.

Claims (1)

1. A management method for registration and authentication of users of an electronic contract platform is characterized by comprising the following steps: the management steps are as follows:
the method comprises the following steps: the user submits a name and a mobile phone number for registration, the mobile phone number of the user is confirmed to be all registered users in a short message verification code mode during registration, and information submitted by the user and a verification result are written into a registration authentication log of the user;
step two: the user submits an identity card number, photos of the front side and the back side of the identity card, a living body face video or the photos, OCR extracts the identity card number, the name of the identity card and the head image of the identity card, the name and the identity card number of a registered user are compared, and corresponding verification information is written into a registration authentication log of the user;
step three: the user modifies personal information, including name, mobile phone number, ID card number, photo and living body image on the front and back of ID card, repeats OCR identification and ID information comparison in step two, writes the corresponding modification and verification information into the user's registration authentication log;
step four: after all the first three steps are verified, sending the front and back data of the identity card to an identity information base of a public security place, inquiring whether the identity information exists, and if not, terminating the registration authentication of the user;
step five: extracting a head portrait and a living body image face of the identity card, comparing the faces, and writing corresponding background face recognition and face comparison into a registration authentication log of a user;
step six: if the face comparison is lower than the similarity preset by the system, the user can modify the live face video or photo, and the corresponding modification event is written into the registration authentication log of the user;
step seven: if the face comparison fails for the second time, the user can initiate background audit, and a corresponding background audit submission event is written into a registration authentication log of the user;
step eight: the background operator checks the face check application submitted by the user, and corresponding background personnel check records are written into the registration authentication log of the user;
step nine: after the above steps are successful, the authentication state of the user is authenticated, and the corresponding authentication state log is written into the registration authentication log of the user;
step ten: the contracting person can confirm the acceptance of the living body image of the contracting opposite person before signing;
step eleven: after desensitization, the registration authentication log of the user is synchronously updated to the front-end user and the background operator, and desensitization information comprises names, telephones, mobile phone numbers, IP (Internet protocol), MAC (media access control) addresses, ID (identity) card picture display and living body images.
CN202010189676.5A 2020-03-18 2020-03-18 Management method for registration and authentication of electronic contract platform user Pending CN111415278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010189676.5A CN111415278A (en) 2020-03-18 2020-03-18 Management method for registration and authentication of electronic contract platform user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010189676.5A CN111415278A (en) 2020-03-18 2020-03-18 Management method for registration and authentication of electronic contract platform user

Publications (1)

Publication Number Publication Date
CN111415278A true CN111415278A (en) 2020-07-14

Family

ID=71494440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010189676.5A Pending CN111415278A (en) 2020-03-18 2020-03-18 Management method for registration and authentication of electronic contract platform user

Country Status (1)

Country Link
CN (1) CN111415278A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111856276A (en) * 2020-07-27 2020-10-30 淮南万泰电子股份有限公司 Motor running state real-time monitoring system
CN112258163A (en) * 2020-11-13 2021-01-22 泰康保险集团股份有限公司 Endowment management system and method, computer storage medium and electronic equipment
CN113392431A (en) * 2021-06-23 2021-09-14 李若石 Multi-dimensional identity authentication method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140222695A1 (en) * 2011-10-14 2014-08-07 I-On Communications Co., Ltd. Integrated authentication system using electronic contract
CN109639651A (en) * 2018-11-22 2019-04-16 安云印(天津)大数据科技有限公司 Contract based on living body authentication and block chain technology signs authentication method and its system online
CN110245481A (en) * 2019-05-08 2019-09-17 深圳法大大网络科技有限公司 A kind of method, apparatus and terminal device of real-name authentication
CN110392043A (en) * 2019-06-21 2019-10-29 法信公证云(厦门)科技有限公司 A kind of method and system for assigning electronic contract notarization and enforcing effect

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140222695A1 (en) * 2011-10-14 2014-08-07 I-On Communications Co., Ltd. Integrated authentication system using electronic contract
CN109639651A (en) * 2018-11-22 2019-04-16 安云印(天津)大数据科技有限公司 Contract based on living body authentication and block chain technology signs authentication method and its system online
CN110245481A (en) * 2019-05-08 2019-09-17 深圳法大大网络科技有限公司 A kind of method, apparatus and terminal device of real-name authentication
CN110392043A (en) * 2019-06-21 2019-10-29 法信公证云(厦门)科技有限公司 A kind of method and system for assigning electronic contract notarization and enforcing effect

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PEANUT_范: "旷视科技——身份验证、活体检测、人脸比对", 《HTTPS://BLOG.CSDN.NET/U013841196/ARTICLE/DETAILS/81256669》 *
PEANUT_范: "旷视科技——身份验证、活体检测、人脸比对", 《HTTPS://BLOG.CSDN.NET/U013841196/ARTICLE/DETAILS/81256669》, 28 July 2018 (2018-07-28) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111856276A (en) * 2020-07-27 2020-10-30 淮南万泰电子股份有限公司 Motor running state real-time monitoring system
CN112258163A (en) * 2020-11-13 2021-01-22 泰康保险集团股份有限公司 Endowment management system and method, computer storage medium and electronic equipment
CN113392431A (en) * 2021-06-23 2021-09-14 李若石 Multi-dimensional identity authentication method

Similar Documents

Publication Publication Date Title
JP7187532B2 (en) System and method for concluding and delivering electronic documents
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
CN111415278A (en) Management method for registration and authentication of electronic contract platform user
WO2018019187A1 (en) Method for concluding electronic contracts and server
CN110771095B (en) System and method for implementing blockchain-based digital certificates
US20190319948A1 (en) Remote authentication and identification proofing systems and methods
US9698992B2 (en) Method for signing electronic documents with an analog-digital signature with additional verification
CN110800254B (en) System and method for generating digital signature
US11093597B2 (en) Identity credential verification techniques
US10972459B2 (en) Identity credential verification techniques
CN103020746A (en) Method and system for online automatic checking of network user identity of enterprise
US20220368535A1 (en) Blockchain driven embedded video and digital signatures on signed documents
US20240054506A1 (en) Corporate number and corporate code management method, and corporate number and corporate code management terminal apparatus
CN111294547A (en) Remote online inquiry and evidence obtaining system and method
CN109063682A (en) A kind of method of Internet authentication authorization and data survey service
CN111914231A (en) Block chain-based identity authentication method, system, equipment and storage medium
US20220230177A1 (en) Identity verification and service provision platform and method
CN114238998A (en) Information processing apparatus, recording medium, and information processing method
WO2022099909A1 (en) Application method for delegating electronic certificate among multiple roles
CN111429111A (en) Electronic contract performance process management method
US20160344558A1 (en) System and Method for Obtaining Authorization
CN114202840B (en) Authentication control method, device and medium
US20230394179A1 (en) Information processing apparatus, information processing method, and non-transitory computer-readable storage medium
US20240129132A1 (en) Signature generation device, authentication device, and program
Hashim et al. An Efficient Student Attendance Scheme Based On QR Code and Device Identifier

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714

RJ01 Rejection of invention patent application after publication