CN105574435A - On-line electronic contract signing and verifying methods, device and system - Google Patents

On-line electronic contract signing and verifying methods, device and system Download PDF

Info

Publication number
CN105574435A
CN105574435A CN201510977080.0A CN201510977080A CN105574435A CN 105574435 A CN105574435 A CN 105574435A CN 201510977080 A CN201510977080 A CN 201510977080A CN 105574435 A CN105574435 A CN 105574435A
Authority
CN
China
Prior art keywords
contract
test value
proof test
party
take over
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510977080.0A
Other languages
Chinese (zh)
Other versions
CN105574435B (en
Inventor
王琪
徐单恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang aizhang Digital Technology Co.,Ltd.
Original Assignee
HANGZHOU ANCUN NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU ANCUN NETWORK TECHNOLOGY Co Ltd filed Critical HANGZHOU ANCUN NETWORK TECHNOLOGY Co Ltd
Priority to CN201510977080.0A priority Critical patent/CN105574435B/en
Publication of CN105574435A publication Critical patent/CN105574435A/en
Application granted granted Critical
Publication of CN105574435B publication Critical patent/CN105574435B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses on-line electronic contract signing and verifying methods, a device and a system. According to the technical scheme, a third party does not acquire actual electronic contract content and only acquires a proof test value obtained through Hash calculation performed on contract files by both parties to the contract in an on-line signing process of the electronic contract, and the third party determines integrity and accuracy of the contract according to the proof test value, that is, the third party determines that the electronic contract is not amended in the signing process. Besides, secret key sequences sent by the both parties after digital signing is performed on the contract are verified according to digital certificates assigned to the both parties to the contract in advance, and accordingly, contract signing is determined to be completed; therefore, the third party only verifies no amendment of the contract content as well as identity of the both parties to the contract and the contract signing process, the contract is not needed to be stored, the use privacy leakage is avoided, meanwhile, data security is improved, and reliability and safety of signing of the electronic contract are effectively guaranteed.

Description

Electronic contract on-line signing, verification method, Apparatus and system
Technical field
The present invention relates to technical field of data processing, particularly relate to electronic contract on-line signing, verification method, Apparatus and system.
Background technology
Along with the development of Internet technology, ecommerce presents the situation of explosive growth, increasing transaction is by networks sign electronic contract, and the trouble avoid the signature of traditionally on paper contract, exchanging, preserve, becomes e-commerce field important innovations field.The promulgation of Electronic Signature Law and " contract law ", for Fundamentals of Law have been established in the widespread use of electronic contract in ecommerce.But the intrinsic insecurity of network is given and is carried out safe and reliable electronic contract signature by network and bring new challenge.People is that maloperation, deliberately destruction, computer virus, the multifactor safety to electronic data such as the hardware/software/system failure, network interruption etc. cause serious harm.Electronic contract as the one of electronic data, have equally mutability, easily change seamless, not easily solidify the feature that presents and file.
Summary of the invention
For overcoming Problems existing in correlation technique, the embodiment of the present invention provides a kind of electronic contract on-line signing, verification method, Apparatus and system.
A verification method for electronic contract on-line signing, be applied to and sign to electronic contract the third party verified, described method comprises:
Obtain the first proof test value of treaty documents sent, described proof test value is that contract initiator adopts default hash algorithm to carry out Hash calculation to described treaty documents to obtain;
Described first proof test value is sent to contract take over party;
Receive described contract take over party send described contract transmission success information described in contract transmission success information be send after described contract take over party determines described treaty documents transmission success;
Described contract transmission success information is sent to described contract initiator;
Receive the first key sequence of described contract initiator transmission and the second key sequence of described contract take over party transmission, to be described contract initiator preset private key with first to described first key sequence to be encrypted described first proof test value and to obtain, and described second key sequence obtains for described contract take over party is encrypted with the second proof test value described in the second default private key;
Obtain the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party;
With described first PKI, described first key sequence is decrypted, obtains the first decrypted sequences, with described second PKI, described second key sequence is decrypted, obtains the second decrypted sequences;
Described first decrypted sequences and described first proof test value are compared, described second decrypted sequences and described second proof test value are compared;
When described first decrypted sequences is identical with described first proof test value, and when described second decrypted sequences is identical with described second proof test value, determine that electronic contract has been signed.
Optionally, described method also comprises:
Obtain first signature information of described contract initiator and second signature information of described contract take over party;
Described first signature information is sent to described contract take over party, described second signature information is sent to described contract initiator, makes described contract take over party and described contract initiator adopt described first signature information and described second signature information to carry out stamped signature to described treaty documents.
Optionally, described method also comprises:
Receive the 3rd proof test value of described contract initiator transmission and the 4th proof test value of described contract take over party transmission, described 3rd proof test value is that described contract initiator adopts described default hash algorithm to calculate the treaty documents after stamped signature, and described 4th proof test value is that described contract take over party adopts described default hash algorithm to calculate the treaty documents after stamped signature;
Described 3rd proof test value and described 4th proof test value are compared;
When described 3rd proof test value is consistent with described 4th proof test value, determine that described electronic contract stamped signature completes.
A demo plant for electronic contract on-line signing, be applied to and sign to electronic contract the third party verified, described device comprises:
First acquisition module, for obtaining the first proof test value of the treaty documents of transmission, described proof test value is that contract initiator adopts default hash algorithm to carry out Hash calculation to described treaty documents to obtain;
Sending module, for being sent to contract take over party by described first proof test value;
Receiver module, for receiving the described contract transmission success information that described contract take over party sends, described contract transmission success information is send after described contract take over party determines described treaty documents transmission success;
Described sending module, for being sent to described contract initiator by described contract transmission success information;
Described receiver module, for the second key sequence that the first key sequence and described contract take over party that receive described contract initiator transmission send, to be described contract initiator preset private key with first to described first key sequence to be encrypted described first proof test value and to obtain, and described second key sequence obtains for described contract take over party is encrypted with the second proof test value described in the second default private key;
Described first acquisition module, for obtaining the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party;
Deciphering module, for being decrypted described first key sequence with described first PKI, obtaining the first decrypted sequences, being decrypted, obtaining the second decrypted sequences with described second PKI to described second key sequence;
First comparing module, for described first decrypted sequences and described first proof test value being compared, compares described second decrypted sequences and described second proof test value;
First determination module, identical with described first proof test value for working as described first decrypted sequences, and when described second decrypted sequences is identical with described second proof test value, determine that electronic contract has been signed.
Optionally, described device also comprises: the second acquisition module,
Described second acquisition module, for the second signature information of the first signature information and described contract take over party that obtain described contract initiator;
Described sending module, for described first signature information is sent to described contract take over party, described second signature information is sent to described contract initiator, makes described contract take over party and described contract initiator adopt described first signature information and described second signature information to carry out stamped signature to described treaty documents.
Optionally, described device also comprises: the second comparing module and the second determination module,
Described receiver module, for the 4th proof test value that the 3rd proof test value and described contract take over party that receive described contract initiator transmission send, described 3rd proof test value is that described contract initiator adopts described default hash algorithm to calculate the treaty documents after stamped signature, and described 4th proof test value is that described contract take over party adopts described default hash algorithm to calculate the treaty documents after stamped signature;
Described second comparing module, for comparing described 3rd proof test value and described 4th proof test value;
Described second determination module, for when described 3rd proof test value is consistent with described 4th proof test value, determines that described electronic contract stamped signature completes.
A kind of electronic contract on-line signing method, be applied to contract initiator, contract take over party and third party, described method comprises:
Contract initiator adopts default hash algorithm to carry out Hash calculation to described treaty documents, obtains the first proof test value of described treaty documents;
Described first proof test value is sent to third party by described contract initiator, and described treaty documents is sent to contract take over party;
Described contract take over party adopts described default hash algorithm to carry out Hash calculation to the described treaty documents received, and obtains the second proof test value of described treaty documents;
Described contract take over party obtains described first proof test value from described third party, described first proof test value and described second proof test value are compared, when described first proof test value is identical with described second proof test value, determine described treaty documents transmission success, and contract transmission success information is sent to described third party;
Described contract transmission success information is sent to described contract initiator by described third party;
Described contract initiator presets private key with first and is encrypted described first proof test value, obtains the first key sequence, and described first key sequence is sent to described third party;
Described contract take over party presets the second proof test value described in private key with second and is encrypted, and obtains the second key sequence, and described second key sequence is sent to described third party;
Described third party obtains the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party, with described first PKI, described first key sequence is decrypted, obtain the first decrypted sequences, with described second PKI, described second key sequence is decrypted, obtains the second decrypted sequences;
Described first decrypted sequences and described first proof test value are compared by described third party, described second decrypted sequences and described second proof test value are compared;
When described first decrypted sequences is identical with described first proof test value, and when described second decrypted sequences is identical with described second proof test value, described third party determines that electronic contract has been signed.
Optionally, described method also comprises:
Described third party obtains first signature information of described contract initiator and second signature information of described contract take over party;
Described first signature information is sent to described contract take over party by described third party, and described second signature information is sent to described contract initiator;
Described contract take over party adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents;
Described contract initiator adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents.
Optionally, described method also comprises:
Described contract initiator adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 3rd proof test value, and described 3rd proof test value is sent to described third party;
Described contract take over party adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 4th proof test value, and described 4th proof test value is sent to described third party;
Described 3rd proof test value and described 4th proof test value are compared by described third party, when described 3rd proof test value is consistent with described 4th proof test value, determine the success of described electronic contract stamped signature.
A kind of electronic contract on-line signing system, comprises contract initiator, contract take over party and third party,
Described contract initiator, adopts default hash algorithm to carry out Hash calculation to described treaty documents, obtains the first proof test value of described treaty documents; Described first proof test value is sent to third party, described treaty documents is sent to contract take over party; Preset private key with first to be encrypted described first proof test value, obtain the first key sequence, and described first key sequence is sent to described third party;
Described contract take over party, adopts described default hash algorithm to carry out Hash calculation to the described treaty documents received, obtains the second proof test value of described treaty documents; Described first proof test value is obtained from described third party, described first proof test value and described second proof test value are compared, when described first proof test value is identical with described second proof test value, determine described treaty documents transmission success, and contract transmission success information is sent to described third party; Preset the second proof test value described in private key with second to be encrypted, obtain the second key sequence, and described second key sequence is sent to described third party;
Described third party, is sent to described contract initiator by described contract transmission success information; Obtain the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party, with described first PKI, described first key sequence is decrypted, obtain the first decrypted sequences, with described second PKI, described second key sequence is decrypted, obtains the second decrypted sequences; Described first decrypted sequences and described first proof test value are compared, described second decrypted sequences and described second proof test value are compared; When described first decrypted sequences is identical with described first proof test value, and when described second decrypted sequences is identical with described second proof test value, determine that electronic contract has been signed.
Optionally, described third party, obtains first signature information of described contract initiator and second signature information of described contract take over party; Described first signature information is sent to described contract take over party, described second signature information is sent to described contract initiator;
Described contract take over party, adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents;
Described contract initiator, adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents.
Optionally, described contract initiator, adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 3rd proof test value, and described 3rd proof test value is sent to described third party;
Described contract take over party, adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 4th proof test value, and described 4th proof test value is sent to described third party;
Described third party, compares described 3rd proof test value and described 4th proof test value, when described 3rd proof test value is consistent with described 4th proof test value, determines the success of described electronic contract stamped signature.
A verification method for electronic contract, is applied to the third party verified electronic contract, and described method comprises:
Obtain the electronic contract with signature information;
Adopt default hash algorithm to carry out Hash calculation to described electronic contract, obtain the first validation value of described electronic contract;
From contract database, search described first validation value, described contract database comprises and carries out the stamped signature process verification of on-line signing by having the proof test value of the electronic contract of signature information described in rear storage to described electronic contract;
When finding described first validation value from contract database, determine that described electronic contract was not modified.
A demo plant for electronic contract, is applied to the third party verified electronic contract, and described device comprises:
Acquisition module, for obtaining the electronic contract with signature information;
Computing module, for adopting default hash algorithm to carry out Hash calculation to described electronic contract, obtains the first validation value of described electronic contract;
Search module, for searching described first validation value from contract database, described contract database comprises and carries out the stamped signature process verification of on-line signing by having the proof test value of the electronic contract of signature information described in rear storage to described electronic contract;
Determination module, for when finding described first validation value from contract database, determines that described electronic contract was not modified.
A verification method for electronic contract, is applied to the third party verified electronic contract, and described method comprises:
Obtain the electronic contract with signature information;
Described electronic contract is separated into signature information and treaty documents;
Adopt default hash algorithm to calculate described treaty documents, obtain the second validation value of described treaty documents;
From contract database, search described second validation value, described contract database comprises the proof test value being verified the described treaty documents of rear storage described electronic contract being carried out to on-line signing;
When finding described second validation value from contract database, determine that described treaty documents was not modified.
A demo plant for electronic contract, is applied to the third party verified electronic contract, and described device comprises:
Acquisition module, for obtaining the electronic contract with signature information;
Separation module, for being separated into signature information and treaty documents by described electronic contract;
Computing module, for adopting default hash algorithm to calculate described treaty documents, obtains the second validation value of described treaty documents;
Search module, for searching described second validation value from contract database, described contract database comprises the proof test value being verified the described treaty documents of rear storage described electronic contract being carried out to on-line signing;
Determination module, for when finding described second validation value from contract database, determines that described treaty documents was not modified.
The technical scheme that embodiments of the invention provide can comprise following beneficial effect:
In one embodiment, in the on-line signing process of electronic contract, third party does not obtain actual electronic contract content, only obtain the proof test value obtained after contract parties carries out Hash calculation to treaty documents, third party, according to the integrality of this proof test value determination contract itself and accuracy, namely confirms that electronic contract was not modified in signature process.In addition, according to allocating in advance to the digital certificate of contract parties, the key sequence sent after carrying out digital signature to contract parties to contract is verified, to have determined the signature of contract.Like this, third party only verifies that the particulars of a contract are not modified, the identity of the both sides that sign a contract and contract signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
In another embodiment, the signature information of contract parties also forwards by third party, with the stamped signature process making both sides complete contract, guarantees the validity of contract, improves data security, effectively ensures reliability and the security of electronic contract signature.
In another embodiment, third party also based on contract both sides the good proof test value of Hash calculation is carried out to the contract after stamped signature contract stamped signature completed verify.Third party does not store the contract specification after stamped signature, only verify that the particulars of a contract are not modified, the identity of contract parties and contract stamped signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, and forms a part for instructions, together with embodiments of the present invention for explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of a kind of electronic contract on-line signing method according to an exemplary embodiment;
Fig. 2 is the process flow diagram of a kind of electronic contract on-line signing method according to another exemplary embodiment;
Fig. 3 is the process flow diagram of a kind of electronic contract on-line signing method according to another exemplary embodiment;
Fig. 4 is the process flow diagram of the verification method of a kind of electronic contract on-line signing according to an exemplary embodiment;
Fig. 5 is the process flow diagram of the verification method of a kind of electronic contract on-line signing according to another exemplary embodiment;
Fig. 6 is the process flow diagram of the verification method of a kind of electronic contract on-line signing according to another exemplary embodiment;
Fig. 7 is the process flow diagram of a kind of electronic contract verification method according to an exemplary embodiment;
Fig. 8 is the process flow diagram of a kind of electronic contract verification method according to an exemplary embodiment;
Fig. 9 is the block diagram of a kind of electronic contract on-line signing system according to an exemplary embodiment;
Figure 10 is the block diagram of the demo plant of a kind of electronic contract on-line signing according to an exemplary embodiment;
Figure 11 is the block diagram of the demo plant of a kind of electronic contract on-line signing according to another exemplary embodiment;
Figure 12 is the block diagram of the demo plant of a kind of electronic contract on-line signing according to another exemplary embodiment;
Figure 13 is the block diagram of the demo plant of a kind of electronic contract according to an exemplary embodiment;
Figure 14 is the block diagram of the demo plant of a kind of electronic contract according to an exemplary embodiment.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the present invention, is not intended to limit the present invention.
Fig. 1 is the process flow diagram of a kind of electronic contract on-line signing method according to an exemplary embodiment, and as shown in Figure 1, this electronic contract on-line signing method, is applied to contract initiator, contract take over party and third party, comprises the following steps:
Step S101, contract initiator adopts default hash algorithm to carry out Hash calculation to treaty documents, obtains the first proof test value of treaty documents;
Step S102, the first proof test value is sent to third party by contract initiator;
Step S103, treaty documents is sent to contract take over party by contract initiator;
Step S104, contract take over party adopts default hash algorithm to carry out Hash calculation to the treaty documents received, and obtains the second proof test value of treaty documents;
Step S105, contract take over party obtains the first proof test value from third party;
Step S106, the first proof test value and the second proof test value are compared by contract take over party, when the first proof test value is identical with the second proof test value, determine treaty documents transmission success;
Step S107, contract transmission success information is sent to third party by contract take over party;
Step S108, contract transmission success information is sent to contract initiator by third party;
Step S109, contract initiator presets private key with first and is encrypted the first proof test value, obtains the first key sequence;
Step S110, the first key sequence is sent to third party by contract initiator;
Step S111, contract take over party presets private key second proof test value with second and is encrypted, and obtains the second key sequence;
Step S112, the second key sequence is sent to third party by contract take over party;
Step S113, third party obtains the first PKI corresponding to contract initiator and the second PKI corresponding to contract take over party, is decrypted, obtains the first decrypted sequences with the first PKI to the first key sequence, with the second PKI, the second key sequence is decrypted, obtains the second decrypted sequences;
Step S114, the first decrypted sequences and the first proof test value are compared by third party, the second decrypted sequences and the second proof test value are compared;
Step S115, when the first decrypted sequences is identical with the first proof test value, and when the second decrypted sequences is identical with the second proof test value, third party determines that electronic contract has been signed.
In the present embodiment, in the on-line signing process of electronic contract, third party does not obtain actual electronic contract content, only obtain the proof test value obtained after contract parties carries out Hash calculation to treaty documents, third party, according to the integrality of this proof test value determination contract itself and accuracy, namely confirms that electronic contract was not modified in signature process.In addition, according to allocating in advance to the digital certificate of contract parties, the key sequence sent after carrying out digital signature to contract parties to contract is verified, to have determined the signature of contract.
Like this, third party only verifies that the particulars of a contract are not modified, the identity of the both sides that sign a contract and contract signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
Fig. 2 is the process flow diagram of a kind of electronic contract on-line signing method according to another exemplary embodiment, and as shown in Figure 2, optionally, the method also comprises:
Step S201, the first signature information is sent to third party by contract initiator;
Step S202, the second signature information is sent to third party by contract take over party;
Step S203, the first signature information is sent to contract take over party by third party;
Step S204, the second signature information is sent to contract initiator by third party;
Step S205, contract take over party adopts the first signature information and the second signature information to carry out stamped signature to treaty documents;
Step S206, contract initiator adopts the first signature information and the second signature information to carry out stamped signature to treaty documents.
In possibility, the signature information of contract parties also forwards by third party, with the stamped signature process making both sides complete contract, guarantees the validity of contract, improves data security, effectively ensures reliability and the security of electronic contract signature.
Fig. 3 is the process flow diagram of a kind of electronic contract on-line signing method according to another exemplary embodiment, and as shown in Figure 3, optionally, the method also comprises:
Step S301, contract initiator adopts default hash algorithm to calculate the treaty documents after stamped signature, obtains the 3rd proof test value;
Step S302, the 3rd proof test value is sent to third party by contract initiator;
Step S303, contract take over party adopts default hash algorithm to calculate the treaty documents after stamped signature, obtains the 4th proof test value;
Step S304, the 4th proof test value is sent to third party by contract take over party;
Step S305, the 3rd proof test value and the 4th proof test value are compared by third party, when the 3rd proof test value is consistent with the 4th proof test value, determine the success of electronic contract stamped signature.
In possibility, third party also based on contract both sides the good proof test value of Hash calculation is carried out to the contract after stamped signature contract stamped signature completed verify.Third party does not store the contract specification after stamped signature, only verify that the particulars of a contract are not modified, the identity of contract parties and contract stamped signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
Fig. 4 is the process flow diagram of the verification method of a kind of electronic contract on-line signing according to an exemplary embodiment, as shown in Figure 4, the verification method of this electronic contract on-line signing, be applied to and the third party verified is signed to electronic contract, third party is positioned at network side server, comprises the following steps:
Step S401, obtains the first proof test value of treaty documents sent, and proof test value is that contract initiator adopts default hash algorithm to carry out Hash calculation to treaty documents to obtain;
Step S402, is sent to contract take over party by the first proof test value;
Step S403, the contract transmission success information contract transmission success information that receipt of contract take over party sends is send after contract take over party determines treaty documents transmission success;
Step S404, is sent to contract initiator by contract transmission success information;
Step S405, the first key sequence that receipt of contract initiator sends and the second key sequence that contract take over party sends, to be contract initiator preset private key with first to first key sequence to be encrypted the first proof test value and to obtain, and the second key sequence is that contract take over party is encrypted with the second default private key second proof test value and obtains;
Step S406, obtains the first PKI corresponding to contract initiator and the second PKI corresponding to contract take over party;
Step S407, is decrypted the first key sequence with the first PKI, obtains the first decrypted sequences, is decrypted the second key sequence with the second PKI, obtains the second decrypted sequences;
Step S408, compares the first decrypted sequences and the first proof test value, the second decrypted sequences and the second proof test value is compared;
Step S409, when the first decrypted sequences is identical with the first proof test value, and when the second decrypted sequences is identical with the second proof test value, determines that electronic contract has been signed.
In the present embodiment, in the on-line signing process of electronic contract, third party does not obtain actual electronic contract content, only obtain the proof test value obtained after contract parties carries out Hash calculation to treaty documents, third party, according to the integrality of this proof test value determination contract itself and accuracy, namely confirms that electronic contract was not modified in signature process.In addition, according to allocating in advance to the digital certificate of contract parties, the key sequence sent after carrying out digital signature to contract parties to contract is verified, to have determined the signature of contract.
Like this, third party only verifies that the particulars of a contract are not modified, the identity of the both sides that sign a contract and contract signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature
Fig. 5 is the process flow diagram of the verification method of a kind of electronic contract on-line signing according to another exemplary embodiment, and as shown in Figure 5, optionally, the method also comprises:
Step S501, obtains first signature information of contract initiator and second signature information of contract take over party;
Step S502, is sent to contract take over party by the first signature information, and the second signature information is sent to contract initiator, makes contract take over party and contract initiator adopt the first signature information and the second signature information to carry out stamped signature to treaty documents.
In possibility, the signature information of contract parties also forwards by third party, with the stamped signature process making both sides complete contract, guarantees the validity of contract, improves data security, effectively ensures reliability and the security of electronic contract signature.
Fig. 6 is the process flow diagram of the verification method of a kind of electronic contract on-line signing according to another exemplary embodiment, and as shown in Figure 6, optionally, the method also comprises:
Step S601, the 3rd proof test value that receipt of contract initiator sends and the 4th proof test value that contract take over party sends, 3rd proof test value is that contract initiator adopts default hash algorithm to calculate the treaty documents after stamped signature, and the 4th proof test value is that contract take over party adopts default hash algorithm to calculate the treaty documents after stamped signature;
Step S602, compares the 3rd proof test value and the 4th proof test value;
Step S603, when the 3rd proof test value is consistent with the 4th proof test value, determines that electronic contract stamped signature completes.
In possibility, third party also based on contract both sides the good proof test value of Hash calculation is carried out to the contract after stamped signature contract stamped signature completed verify.Third party does not store the contract specification after stamped signature, only verify that the particulars of a contract are not modified, the identity of contract parties and contract stamped signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
Fig. 7 is the process flow diagram of a kind of electronic contract verification method according to an exemplary embodiment, as shown in Figure 7, the verification method of this electronic contract, be applied to the third party verified electronic contract, third party is positioned at network side server, and the method comprises:
Step S701, obtains the electronic contract with signature information;
Step S702, adopts default hash algorithm to carry out Hash calculation to electronic contract, obtains the first validation value of electronic contract;
Step S703, searches the first validation value from contract database, and described contract database comprises and carries out the stamped signature process verification of on-line signing by having the proof test value of the electronic contract of signature information described in rear storage to described electronic contract;
Step S704, when finding the first validation value from contract database, determines that electronic contract was not modified.
In the present embodiment, in the on-line signing process of electronic contract, third party does not obtain actual electronic contract content, only obtain the proof test value obtained after contract parties carries out Hash calculation to treaty documents, third party, according to the integrality of this proof test value determination contract itself and accuracy, namely confirms that electronic contract was not modified in signature process.In addition, according to allocating in advance to the digital certificate of contract parties, the key sequence sent after carrying out digital signature to contract parties to contract is verified, to have determined the signature of contract.
Like this, third party only verifies that the particulars of a contract are not modified, the identity of the both sides that sign a contract and contract signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
Fig. 8 is the process flow diagram of a kind of electronic contract verification method according to an exemplary embodiment, as shown in Figure 8, the verification method of this electronic contract, be applied to the third party verified electronic contract, third party is positioned at network side server, and the method comprises:
Step S801, obtains the electronic contract with signature information;
Step S802, is separated into signature information and treaty documents by electronic contract;
Step S803, adopts default hash algorithm to calculate treaty documents, obtains the second validation value of treaty documents;
Step S804, searches the second validation value from contract database, and contract database comprises the verification being verified the described treaty documents of rear storage described electronic contract being carried out to on-line signing;
Step S805, when finding the second validation value from contract database, determines that treaty documents was not modified.
In the present embodiment, third party also based on contract both sides the good proof test value of Hash calculation is carried out to the contract after stamped signature contract stamped signature completed verify.Third party does not store the contract specification after stamped signature, only verify that the particulars of a contract are not modified, the identity of contract parties and contract stamped signature process, without the need to storing contract itself, avoid the leakage of privacy of user, improve data security simultaneously, effectively ensure reliability and the security of electronic contract signature.
Fig. 9 is the block diagram of a kind of electronic contract on-line signing system according to an exemplary embodiment, as shown in Figure 9, the present invention also provides a kind of electronic contract on-line signing system 900, comprising: contract initiator 901, contract take over party 902 and third party 903.
Contract initiator 901, adopts default hash algorithm to carry out Hash calculation to treaty documents, obtains the first proof test value of treaty documents; First proof test value is sent to third party, treaty documents is sent to contract take over party; Preset private key with first to be encrypted the first proof test value, obtain the first key sequence, and the first key sequence is sent to third party;
Contract take over party 902, adopts default hash algorithm to carry out Hash calculation to the treaty documents received, obtains the second proof test value of treaty documents; Obtain the first proof test value from third party, the first proof test value and the second proof test value are compared, when the first proof test value is identical with the second proof test value, determine treaty documents transmission success, and contract transmission success information is sent to third party; Preset private key second proof test value with second to be encrypted, obtain the second key sequence, and the second key sequence is sent to third party;
Third party 903, and contract transmission success information is sent to contract initiator; The first PKI that acquisition contract initiator is corresponding and the second PKI corresponding to contract take over party, be decrypted the first key sequence with the first PKI, obtain the first decrypted sequences, be decrypted with the second PKI to the second key sequence, obtain the second decrypted sequences; First decrypted sequences and the first proof test value are compared, the second decrypted sequences and the second proof test value are compared; When the first decrypted sequences is identical with the first proof test value, and when the second decrypted sequences is identical with the second proof test value, determine that electronic contract has been signed.
Optionally, third party 903, obtain first signature information of contract initiator and second signature information of contract take over party; First signature information is sent to contract take over party, the second signature information is sent to contract initiator;
Contract take over party 902, adopts the first signature information and the second signature information to carry out stamped signature to treaty documents;
Contract initiator 901, adopts the first signature information and the second signature information to carry out stamped signature to treaty documents.
Optionally, contract initiator 901, adopts default hash algorithm to calculate the treaty documents after stamped signature, obtains the 3rd proof test value, and the 3rd proof test value is sent to third party;
Contract take over party 902, adopts default hash algorithm to calculate the treaty documents after stamped signature, obtains the 4th proof test value, and the 4th proof test value is sent to third party;
Third party 903, the 3rd proof test value and the 4th proof test value compared, and when the 3rd proof test value is consistent with the 4th proof test value, determine the success of electronic contract stamped signature.
Figure 10 is the block diagram of the demo plant of a kind of electronic contract on-line signing according to an exemplary embodiment, as shown in Figure 10, the present invention also provides a kind of demo plant of electronic contract on-line signing, is applied to and signs to electronic contract the third party verified, this device 1000 comprises:
First acquisition module 1011, for obtaining the first proof test value of the treaty documents of transmission, proof test value is that contract initiator adopts default hash algorithm to carry out Hash calculation to treaty documents to obtain;
Sending module 1012, for being sent to contract take over party by the first proof test value;
Receiver module 1013, for the contract transmission success information that receipt of contract take over party sends, contract transmission success information is send after contract take over party determines treaty documents transmission success;
Sending module 1012, for being sent to contract initiator by contract transmission success information;
Receiver module 1013, the second key sequence that the first key sequence sent for receipt of contract initiator and contract take over party send, to be contract initiator preset private key with first to first key sequence to be encrypted the first proof test value and to obtain, and the second key sequence is that contract take over party is encrypted with the second default private key second proof test value and obtains;
First acquisition module 1011, for obtaining the first PKI corresponding to contract initiator and the second PKI corresponding to contract take over party;
Deciphering module 1014, for being decrypted the first key sequence with the first PKI, obtaining the first decrypted sequences, being decrypted with the second PKI to the second key sequence, obtain the second decrypted sequences;
First comparing module 1015, for the first decrypted sequences and the first proof test value being compared, compares the second decrypted sequences and the second proof test value;
First determination module 1016, identical with the first proof test value for working as the first decrypted sequences, and when the second decrypted sequences is identical with the second proof test value, determine that electronic contract has been signed.
Figure 11 is the block diagram of the demo plant of a kind of electronic contract on-line signing according to another exemplary embodiment, and as shown in figure 11, optionally, device also comprises: the second acquisition module 1017,
Second acquisition module 1017, for the second signature information of the first signature information and contract take over party that obtain contract initiator;
Sending module 1012, for the first signature information is sent to contract take over party, is sent to contract initiator by the second signature information, makes contract take over party and contract initiator adopt the first signature information and the second signature information to carry out stamped signature to treaty documents.
Figure 12 is the block diagram of the demo plant of a kind of electronic contract on-line signing according to another exemplary embodiment, and as shown in figure 12, optionally, device also comprises: the second comparing module 1018 and the second determination module 1019,
Receiver module 1013, the 4th proof test value that the 3rd proof test value sent for receipt of contract initiator and contract take over party send, 3rd proof test value is that contract initiator adopts default hash algorithm to calculate the treaty documents after stamped signature, and the 4th proof test value is that contract take over party adopts default hash algorithm to calculate the treaty documents after stamped signature;
Second comparing module 1018, for comparing the 3rd proof test value and the 4th proof test value;
Second determination module 1019, for when the 3rd proof test value is consistent with the 4th proof test value, determines that electronic contract stamped signature completes.
Figure 13 is the block diagram of the demo plant of a kind of electronic contract according to an exemplary embodiment, and as shown in figure 13, the present invention also provides a kind of demo plant of electronic contract, is applied to the third party verified electronic contract, and this device 1100 comprises:
Acquisition module 1301, for obtaining the electronic contract with signature information;
Computing module 1302, for adopting default hash algorithm to carry out Hash calculation to electronic contract, obtains the first validation value of electronic contract;
Search module 1303, for searching the first validation value from contract database, described contract database comprises and carries out the stamped signature process verification of on-line signing by having the proof test value of the electronic contract of signature information described in rear storage to described electronic contract;
Determination module 1304, for when finding the first validation value from contract database, determines that electronic contract was not modified.
Figure 14 is the block diagram of the demo plant of a kind of electronic contract according to an exemplary embodiment, and as shown in figure 14, the present invention also provides a kind of demo plant of electronic contract, is applied to the third party verified electronic contract, and this device 1400 comprises:
Acquisition module 1401, for obtaining the electronic contract with signature information;
Separation module 1402, for being separated into signature information and treaty documents by electronic contract;
Computing module 1403, for adopting default hash algorithm to calculate treaty documents, obtains the second validation value of treaty documents;
Search module 1404, for searching the second validation value from contract database, described contract database comprises the proof test value being verified the described treaty documents of rear storage described electronic contract being carried out to on-line signing;
Determination module 1405, for when finding the second validation value from contract database, determines that treaty documents was not modified.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (16)

1. a verification method for electronic contract on-line signing, is characterized in that, be applied to and sign to electronic contract the third party verified, described method comprises:
Obtain the first proof test value of treaty documents sent, described proof test value is that contract initiator adopts default hash algorithm to carry out Hash calculation to described treaty documents to obtain;
Described first proof test value is sent to contract take over party;
Receive described contract take over party send described contract transmission success information described in contract transmission success information be send after described contract take over party determines described treaty documents transmission success;
Described contract transmission success information is sent to described contract initiator;
Receive the first key sequence of described contract initiator transmission and the second key sequence of described contract take over party transmission, to be described contract initiator preset private key with first to described first key sequence to be encrypted described first proof test value and to obtain, and described second key sequence obtains for described contract take over party is encrypted with the second proof test value described in the second default private key;
Obtain the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party;
With described first PKI, described first key sequence is decrypted, obtains the first decrypted sequences, with described second PKI, described second key sequence is decrypted, obtains the second decrypted sequences;
Described first decrypted sequences and described first proof test value are compared, described second decrypted sequences and described second proof test value are compared;
When described first decrypted sequences is identical with described first proof test value, and when described second decrypted sequences is identical with described second proof test value, determine that electronic contract has been signed.
2. method according to claim 1, is characterized in that, described method also comprises:
Obtain first signature information of described contract initiator and second signature information of described contract take over party;
Described first signature information is sent to described contract take over party, described second signature information is sent to described contract initiator, makes described contract take over party and described contract initiator adopt described first signature information and described second signature information to carry out stamped signature to described treaty documents.
3. method according to claim 2, is characterized in that, described method also comprises:
Receive the 3rd proof test value of described contract initiator transmission and the 4th proof test value of described contract take over party transmission, described 3rd proof test value is that described contract initiator adopts described default hash algorithm to calculate the treaty documents after stamped signature, and described 4th proof test value is that described contract take over party adopts described default hash algorithm to calculate the treaty documents after stamped signature;
Described 3rd proof test value and described 4th proof test value are compared;
When described 3rd proof test value is consistent with described 4th proof test value, determine that described electronic contract stamped signature completes.
4. an electronic contract on-line signing method, is characterized in that, be applied to contract initiator, contract take over party and third party, described method comprises:
Contract initiator adopts default hash algorithm to carry out Hash calculation to described treaty documents, obtains the first proof test value of described treaty documents;
Described first proof test value is sent to third party by described contract initiator, and described treaty documents is sent to contract take over party;
Described contract take over party adopts described default hash algorithm to carry out Hash calculation to the described treaty documents received, and obtains the second proof test value of described treaty documents;
Described contract take over party obtains described first proof test value from described third party, described first proof test value and described second proof test value are compared, when described first proof test value is identical with described second proof test value, determine described treaty documents transmission success, and contract transmission success information is sent to described third party;
Described contract transmission success information is sent to described contract initiator by described third party;
Described contract initiator presets private key with first and is encrypted described first proof test value, obtains the first key sequence, and described first key sequence is sent to described third party;
Described contract take over party presets the second proof test value described in private key with second and is encrypted, and obtains the second key sequence, and described second key sequence is sent to described third party;
Described third party obtains the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party, with described first PKI, described first key sequence is decrypted, obtain the first decrypted sequences, with described second PKI, described second key sequence is decrypted, obtains the second decrypted sequences;
Described first decrypted sequences and described first proof test value are compared by described third party, described second decrypted sequences and described second proof test value are compared;
When described first decrypted sequences is identical with described first proof test value, and when described second decrypted sequences is identical with described second proof test value, described third party determines that electronic contract has been signed.
5. method according to claim 4, is characterized in that, described method also comprises:
Described third party obtains first signature information of described contract initiator and second signature information of described contract take over party;
Described first signature information is sent to described contract take over party by described third party, and described second signature information is sent to described contract initiator;
Described contract take over party adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents;
Described contract initiator adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents.
6. method according to claim 5, is characterized in that, described method also comprises:
Described contract initiator adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 3rd proof test value, and described 3rd proof test value is sent to described third party;
Described contract take over party adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 4th proof test value, and described 4th proof test value is sent to described third party;
Described 3rd proof test value and described 4th proof test value are compared by described third party, when described 3rd proof test value is consistent with described 4th proof test value, determine the success of described electronic contract stamped signature.
7. a verification method for electronic contract, is characterized in that, is applied to the third party verified electronic contract, and described method comprises:
Obtain the electronic contract with signature information;
Adopt default hash algorithm to carry out Hash calculation to described electronic contract, obtain the first validation value of described electronic contract;
From contract database, search described first validation value, described contract database comprises: described electronic contract is carried out to the stamped signature process verification of on-line signing by having the proof test value of the electronic contract of signature information described in rear storage;
When finding described first validation value from contract database, determine that described electronic contract was not modified.
8. a verification method for electronic contract, is characterized in that, is applied to the third party verified electronic contract, and described method comprises:
Obtain the electronic contract with signature information;
Described electronic contract is separated into signature information and treaty documents;
Adopt default hash algorithm to calculate described treaty documents, obtain the second validation value of described treaty documents;
From contract database, search described second validation value, described contract database comprises: the proof test value being verified the described treaty documents of rear storage described electronic contract being carried out to on-line signing;
When finding described second validation value from contract database, determine that described treaty documents was not modified.
9. a demo plant for electronic contract on-line signing, is characterized in that, be applied to and sign to electronic contract the third party verified, described device comprises:
First acquisition module, for obtaining the first proof test value of the treaty documents of transmission, described proof test value is that contract initiator adopts default hash algorithm to carry out Hash calculation to described treaty documents to obtain;
Sending module, for being sent to contract take over party by described first proof test value;
Receiver module, for receiving the described contract transmission success information that described contract take over party sends, described contract transmission success information is send after described contract take over party determines described treaty documents transmission success;
Described sending module, for being sent to described contract initiator by described contract transmission success information;
Described receiver module, for the second key sequence that the first key sequence and described contract take over party that receive described contract initiator transmission send, to be described contract initiator preset private key with first to described first key sequence to be encrypted described first proof test value and to obtain, and described second key sequence obtains for described contract take over party is encrypted with the second proof test value described in the second default private key;
Described first acquisition module, for obtaining the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party;
Deciphering module, for being decrypted described first key sequence with described first PKI, obtaining the first decrypted sequences, being decrypted, obtaining the second decrypted sequences with described second PKI to described second key sequence;
First comparing module, for described first decrypted sequences and described first proof test value being compared, compares described second decrypted sequences and described second proof test value;
First determination module, identical with described first proof test value for working as described first decrypted sequences, and when described second decrypted sequences is identical with described second proof test value, determine that electronic contract has been signed.
10. device according to claim 9, is characterized in that, described device also comprises: the second acquisition module,
Described second acquisition module, for the second signature information of the first signature information and described contract take over party that obtain described contract initiator;
Described sending module, for described first signature information is sent to described contract take over party, described second signature information is sent to described contract initiator, makes described contract take over party and described contract initiator adopt described first signature information and described second signature information to carry out stamped signature to described treaty documents.
11. devices according to claim 10, is characterized in that, described device also comprises: the second comparing module and the second determination module,
Described receiver module, for the 4th proof test value that the 3rd proof test value and described contract take over party that receive described contract initiator transmission send, described 3rd proof test value is that described contract initiator adopts described default hash algorithm to calculate the treaty documents after stamped signature, and described 4th proof test value is that described contract take over party adopts described default hash algorithm to calculate the treaty documents after stamped signature;
Described second comparing module, for comparing described 3rd proof test value and described 4th proof test value;
Described second determination module, for when described 3rd proof test value is consistent with described 4th proof test value, determines that described electronic contract stamped signature completes.
12. 1 kinds of electronic contract on-line signing systems, is characterized in that, comprise contract initiator, contract take over party and third party,
Described contract initiator, adopts default hash algorithm to carry out Hash calculation to described treaty documents, obtains the first proof test value of described treaty documents; Described first proof test value is sent to third party, described treaty documents is sent to contract take over party; Preset private key with first to be encrypted described first proof test value, obtain the first key sequence, and described first key sequence is sent to described third party;
Described contract take over party, adopts described default hash algorithm to carry out Hash calculation to the described treaty documents received, obtains the second proof test value of described treaty documents; Described first proof test value is obtained from described third party, described first proof test value and described second proof test value are compared, when described first proof test value is identical with described second proof test value, determine described treaty documents transmission success, and contract transmission success information is sent to described third party; Preset the second proof test value described in private key with second to be encrypted, obtain the second key sequence, and described second key sequence is sent to described third party;
Described third party, is sent to described contract initiator by described contract transmission success information; Obtain the first PKI corresponding to described contract initiator and the second PKI corresponding to described contract take over party, with described first PKI, described first key sequence is decrypted, obtain the first decrypted sequences, with described second PKI, described second key sequence is decrypted, obtains the second decrypted sequences; Described first decrypted sequences and described first proof test value are compared, described second decrypted sequences and described second proof test value are compared; When described first decrypted sequences is identical with described first proof test value, and when described second decrypted sequences is identical with described second proof test value, determine that electronic contract has been signed.
13. systems according to claim 12, is characterized in that,
Described third party, obtains first signature information of described contract initiator and second signature information of described contract take over party; Described first signature information is sent to described contract take over party, described second signature information is sent to described contract initiator;
Described contract take over party, adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents;
Described contract initiator, adopts described first signature information and described second signature information to carry out stamped signature to described treaty documents.
14. systems according to claim 13, is characterized in that,
Described contract initiator, adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 3rd proof test value, and described 3rd proof test value is sent to described third party;
Described contract take over party, adopts described default hash algorithm to calculate the treaty documents after stamped signature, obtains the 4th proof test value, and described 4th proof test value is sent to described third party;
Described third party, compares described 3rd proof test value and described 4th proof test value, when described 3rd proof test value is consistent with described 4th proof test value, determines the success of described electronic contract stamped signature.
The demo plant of 15. 1 kinds of electronic contracts, is characterized in that, is applied to the third party verified electronic contract, and described device comprises:
Acquisition module, for obtaining the electronic contract with signature information;
Computing module, for adopting default hash algorithm to carry out Hash calculation to described electronic contract, obtains the first validation value of described electronic contract;
Search module, for searching described first validation value from contract database, described contract database comprises: described electronic contract is carried out to the stamped signature process verification of on-line signing by having the proof test value of the electronic contract of signature information described in rear storage;
Determination module, for when finding described first validation value from contract database, determines that described electronic contract was not modified.
The demo plant of 16. 1 kinds of electronic contracts, is characterized in that, is applied to the third party verified electronic contract, and described device comprises:
Acquisition module, for obtaining the electronic contract with signature information;
Separation module, for being separated into signature information and treaty documents by described electronic contract;
Computing module, for adopting default hash algorithm to calculate described treaty documents, obtains the second validation value of described treaty documents;
Search module, for searching described second validation value from contract database, described contract database comprises: the proof test value being verified the described treaty documents of rear storage described electronic contract being carried out to on-line signing;
Determination module, for when finding described second validation value from contract database, determines that described treaty documents was not modified.
CN201510977080.0A 2015-12-22 2015-12-22 Electronic contract on-line signing, verification method, apparatus and system Active CN105574435B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510977080.0A CN105574435B (en) 2015-12-22 2015-12-22 Electronic contract on-line signing, verification method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510977080.0A CN105574435B (en) 2015-12-22 2015-12-22 Electronic contract on-line signing, verification method, apparatus and system

Publications (2)

Publication Number Publication Date
CN105574435A true CN105574435A (en) 2016-05-11
CN105574435B CN105574435B (en) 2018-07-20

Family

ID=55884549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510977080.0A Active CN105574435B (en) 2015-12-22 2015-12-22 Electronic contract on-line signing, verification method, apparatus and system

Country Status (1)

Country Link
CN (1) CN105574435B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595938A (en) * 2018-03-15 2018-09-28 兴业数字金融服务(上海)股份有限公司 Electronic contract application range expanding method and system based on structuring control
CN108920976A (en) * 2018-06-14 2018-11-30 张绪宝 A kind of contract signing method, apparatus and system
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN109658041A (en) * 2018-09-28 2019-04-19 平安科技(深圳)有限公司 Generating means and its generation method, the equipment and readable storage medium storing program for executing of file
CN110046524A (en) * 2019-04-16 2019-07-23 昆山丘钛微电子科技有限公司 A kind of processing method of data, device, electronic equipment and medium
CN110084072A (en) * 2019-04-30 2019-08-02 北京智签科技有限公司 A kind of electronic contract online verification method based on block chain network
CN110084461A (en) * 2018-01-26 2019-08-02 林国平 Design engineering supervisory systems and method
CN110096903A (en) * 2019-03-26 2019-08-06 罗克佳华科技集团股份有限公司 Assets verification method and block chain network system based on block chain
CN110135807A (en) * 2019-05-14 2019-08-16 极智(上海)企业管理咨询有限公司 Electronic contract signs method, system, medium and electronic equipment
CN110837634A (en) * 2019-10-24 2020-02-25 杭州安存网络科技有限公司 Electronic signature method based on hardware encryption machine
CN111080295A (en) * 2019-12-04 2020-04-28 腾讯科技(深圳)有限公司 Block chain-based electronic contract processing method and equipment
CN111435385A (en) * 2019-01-15 2020-07-21 上海堃通网络科技有限公司 Electronic document cloud maintenance system based on watermark modification
CN111724155A (en) * 2019-03-22 2020-09-29 北京沃东天骏信息技术有限公司 Electronic contract management method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013002735A1 (en) * 2011-06-30 2013-01-03 Trusted Hub Ltd Method and system for digitally signing a document
CN103152182A (en) * 2013-03-08 2013-06-12 新疆君盾信息技术有限公司 Method for authenticating and validating electronic data
CN103873255A (en) * 2014-03-03 2014-06-18 杭州电子科技大学 Electronic contract off-line signing method based on trusted third party

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013002735A1 (en) * 2011-06-30 2013-01-03 Trusted Hub Ltd Method and system for digitally signing a document
CN103152182A (en) * 2013-03-08 2013-06-12 新疆君盾信息技术有限公司 Method for authenticating and validating electronic data
CN103873255A (en) * 2014-03-03 2014-06-18 杭州电子科技大学 Electronic contract off-line signing method based on trusted third party

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084461A (en) * 2018-01-26 2019-08-02 林国平 Design engineering supervisory systems and method
CN108595938A (en) * 2018-03-15 2018-09-28 兴业数字金融服务(上海)股份有限公司 Electronic contract application range expanding method and system based on structuring control
CN108595938B (en) * 2018-03-15 2020-08-25 兴业数字金融服务(上海)股份有限公司 Electronic contract application range expanding method and system based on structured control
CN108920976A (en) * 2018-06-14 2018-11-30 张绪宝 A kind of contract signing method, apparatus and system
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN108985364B (en) * 2018-07-05 2020-12-08 招银云创(深圳)信息技术有限公司 Verification method and device for stamped file, computer equipment and storage medium
CN109658041A (en) * 2018-09-28 2019-04-19 平安科技(深圳)有限公司 Generating means and its generation method, the equipment and readable storage medium storing program for executing of file
CN109658041B (en) * 2018-09-28 2023-07-28 平安科技(深圳)有限公司 File generation device, file generation method, file generation device, and readable storage medium
CN111435385A (en) * 2019-01-15 2020-07-21 上海堃通网络科技有限公司 Electronic document cloud maintenance system based on watermark modification
CN111724155A (en) * 2019-03-22 2020-09-29 北京沃东天骏信息技术有限公司 Electronic contract management method and device
CN110096903A (en) * 2019-03-26 2019-08-06 罗克佳华科技集团股份有限公司 Assets verification method and block chain network system based on block chain
CN110046524A (en) * 2019-04-16 2019-07-23 昆山丘钛微电子科技有限公司 A kind of processing method of data, device, electronic equipment and medium
CN110084072A (en) * 2019-04-30 2019-08-02 北京智签科技有限公司 A kind of electronic contract online verification method based on block chain network
CN110135807A (en) * 2019-05-14 2019-08-16 极智(上海)企业管理咨询有限公司 Electronic contract signs method, system, medium and electronic equipment
CN110837634A (en) * 2019-10-24 2020-02-25 杭州安存网络科技有限公司 Electronic signature method based on hardware encryption machine
CN110837634B (en) * 2019-10-24 2023-10-27 杭州安存网络科技有限公司 Electronic signature method based on hardware encryption machine
CN111080295A (en) * 2019-12-04 2020-04-28 腾讯科技(深圳)有限公司 Block chain-based electronic contract processing method and equipment
CN111080295B (en) * 2019-12-04 2024-04-09 腾讯科技(深圳)有限公司 Electronic contract processing method and device based on blockchain

Also Published As

Publication number Publication date
CN105574435B (en) 2018-07-20

Similar Documents

Publication Publication Date Title
CN105574435A (en) On-line electronic contract signing and verifying methods, device and system
EP3780543A1 (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
CN110519260B (en) Information processing method and information processing device
CN109714168B (en) Trusted remote attestation method, device and system
CN103067402B (en) The generation method and system of digital certificate
KR101744747B1 (en) Mobile terminal, terminal and method for authentication using security cookie
CN108134789B (en) Method for synchronizing data between devices through cloud and cloud server
EP3001598B1 (en) Method and system for backing up private key in electronic signature token
US9531540B2 (en) Secure token-based signature schemes using look-up tables
CN105701372A (en) Block chain identity construction and verification method
US10601590B1 (en) Secure secrets in hardware security module for use by protected function in trusted execution environment
CN106453196B (en) Key writing device, system and method for trusted execution environment
CN108805571B (en) Data protection method, platform, block chain node, system and storage medium
CN105162599A (en) Data transmission system and data transmission method
CN109905877B (en) Message verification method of communication network system, communication method and communication network system
CN110247884B (en) Method, device and system for updating certificate and computer readable storage medium
CN104735065A (en) Data processing method, electronic device and server
CN108234450B (en) Identity authentication method, terminal registration method, server and terminal
CN102790678B (en) Authentication method and system
EP3206329A1 (en) Security check method, device, terminal and server
CN105429945A (en) Data transmission method, device and system
CN106209730B (en) Method and device for managing application identifier
CN114710298B (en) Chameleon hash-based document batch signing method, device, equipment and medium
CN106022145A (en) Cryptograph index-based data query method
CN105553667A (en) Dynamic password generating method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211208

Address after: 310000 room 6068, building 6, No. 970-1, Gaojiao Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee after: Zhejiang aizhang Digital Technology Co.,Ltd.

Address before: Room 1502, 15 / F, building 10, 972 Moganshan Road, Gongshu District, Hangzhou City, Zhejiang Province, 310015

Patentee before: HANGZHOU ANCUN NETWORK TECHNOLOGY Co.,Ltd.

CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 311100 room 1806, 18 / F, building 1, No. 99, Wangzhou Road, Liangzhu street, Yuhang District, Hangzhou, Zhejiang Province

Patentee after: Zhejiang aizhang Digital Technology Co.,Ltd.

Address before: 310000 room 6068, building 6, No. 970-1, Gaojiao Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee before: Zhejiang aizhang Digital Technology Co.,Ltd.