CN109087056A - Electronic contract signs method, apparatus and server - Google Patents
Electronic contract signs method, apparatus and server Download PDFInfo
- Publication number
- CN109087056A CN109087056A CN201810618349.XA CN201810618349A CN109087056A CN 109087056 A CN109087056 A CN 109087056A CN 201810618349 A CN201810618349 A CN 201810618349A CN 109087056 A CN109087056 A CN 109087056A
- Authority
- CN
- China
- Prior art keywords
- electronic contract
- user
- signature
- contract
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Abstract
A kind of electronic contract signature method provided in the embodiment of the present invention, comprising the following steps: in response to user instruction, send the electronic contract including signature authentication interface to user;Signature of the user on the signature authentication interface is received, the signature is generated in the electronic contract;Timestamp associated with the electronic contract is obtained, the timestamp and the electronic contract are associated;It is encrypted by predetermined encryption rule to including the signature and with the associated electronic contract of the timestamp.The present invention is applied to house lease field, on electronic signature Contract basis, guarantees the tamper-resistance properties of electronic contract, legal effect of contracting online by the method for timestamp, encryption.
Description
Technical field
The present invention relates to house lease, electronic contract, encryption technology fields, specifically, the present invention relates to a kind of electronics
Contract signs method, apparatus and server.
Background technique
With the development of internet technology, people more and more pursue efficient and convenient method of doing things, however, current room
Room lease field also uses papery contract to sign, and signs due to needing to sign both sides' agreement specific time to scene, from
And need both sides to adjust oneself schedule, individually to contract signature scene signature, cause to sign the convenience of papery contract compared with
Difference reasonable cannot easily be arranged according to the both sides' when and where leased;Meanwhile papery contract is not easy to store, holds
It is easy to damage, and the contractual writing of papery is easy to obscure, it cannot be guaranteed that the validity of contract and the preservation of contract and backup, no
Contractual information can timely be transferred to be transmitted or put on record, while also increasing the cost of labor of inquiry contract.Although
Part industry has electronic contract at present, but electronic contract is contracted online, legal force is not high, is easy to be trapped, be usurped
Change, and the fraudulent there are contract parties in time, does not recognize to sign contract in this time.
Summary of the invention
The purpose of the present invention, which aims to solve at least one of above-mentioned technological deficiency, especially electronic contract law of contracting online, to be had
Effect property is not high, is easy the problem of being trapped, being tampered.
The present invention provides a kind of electronic contracts to sign method, comprising the following steps:
Electronic contract including signature authentication interface is sent to target user end;
Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;
Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
The signed electronic contract is encrypted by predetermined encryption rule.
Preferably, the predetermined encryption rule is based on CA technology secrecy rule.
It is further, described that the electronic contract including signature authentication interface is sent to target user end, comprising:
It receives target user end and acquires the user images including target signature in real time, and obtain and used in the electronic contract
The associated associated images of family information;
It will be compared from the target signature extracted in the associated images and the target signature in the user images, really
Whether the user in the fixed associated images and the user images is same user;
When being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
Further, after being carried out by predetermined encryption rule to the signed electronic contract, which comprises
Critical field in the electronic contract is extracted, by the critical field and the user images in a manner of associated
Storage.
Further, by include signature authentication interface electronic contract be sent to target user end before, the method
Include:
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
Further, after receiving the signing that the first user terminal issues and inviting instruction, the method also includes:
The electronic contract comprising first user information is sent to the first user terminal.
Further, after receiving second user end and receiving the instruction of the invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes institute
State the first user information.
Further, in the pass for receiving the generation electronic contract that second user is filled at the second user end
After key information, which comprises
Sent to the first user terminal include the key message the electronic contract, in order to which the first user is described the
The modification instruction of the electronic contract is modified in the triggering of one user terminal;
The modification instruction that first user terminal is sent is received, sends repairing for the electronic contract to second user end
Change notice, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modification
The electronic contract afterwards.
The present invention provides a kind of electronic contracts to sign device, comprising:
Signature authentication interface sending module, for will include that the electronic contract at signature authentication interface is sent to target user
End;
Electronic contract generation module is directed to the signing messages that the signature authentication interface issues for receiving target user end
With signature timestamp;
Relating module, for generating signed electronics according to the signing messages, signature timestamp and the electronic contract
Contract;
Encrypting module, for being encrypted by predetermined encryption rule to the signed electronic contract.The present invention is implemented
A kind of server provided in example, comprising:
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and quilt
It is configured to be executed by one or more of processors, one or more of application programs are configured to carry out according to any skill
Electronic contract described in art scheme signs the step of method.
Compared with prior art, embodiment provided by the invention has the advantages that
1, a kind of electronic contract signature method provided in the embodiment of the present invention, comprising the following steps: will include that signature is recognized
The electronic contract at card interface is sent to target user end;It receives target user end and is directed to the signature that the signature authentication interface issues
Information and signature timestamp;Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
The signed electronic contract is encrypted by predetermined encryption rule.On electronic signature Contract basis, by timestamp,
The method of encryption guarantees the tamper-resistance properties of electronic contract, legal effect of contracting online.
2, a kind of electronic contract signature method provided in the embodiment of the present invention, the predetermined encryption rule is based on CA skill
Art encryption rule.By the support at Third Party Authentication center, effective method is provided for the online signing legal effect of electronic contract
Restrain effect.
3, a kind of electronic contract signature method provided in the embodiment of the present invention, is applied to house lease field, breaks biography
The limitation that system is rented a house in contract signing model to lease both sides' time, space, the both sides to sign a contract can also be according to personal reason
Directly add supplementary provision in terminal so that electronic contract neat and tidy, and electronic contract save with data mode and
The critical field in electronic contract, the phonotape and videotape during signature will be extracted, convenient for carrying out with government department or other authorized organizations
Put on record or other shared docking, while guaranteeing that the people to sign a contract is corresponding with the information of a side on electronic contract, guarantees that contracts has
Effect property, avoids being swindled.The transmission of contract is facilitated by critical field or is put on record, and cost of labor is reduced.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is that electronic contract of the present invention signs a kind of flow diagram of embodiment in the exemplary embodiments of method;
Fig. 2 is the flow diagram that electronic contract of the present invention signs another embodiment in the exemplary embodiments of method;
Fig. 3 is the structural schematic diagram for the exemplary embodiments that electronic contract of the present invention signs device;
Fig. 4 is an example structure schematic diagram of server of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
A kind of electronic contract signature method provided in the embodiment of the present invention is mainly used in house lease field, will be in room
Room leases field and introduces electronic contract, simplifies landlord and lessee signs the process of electronic contract, forms house lease on line and closes
Ring breaks the limitation in traditional contract signing model of renting a house to lease both sides' time, space.Wherein in the embodiment of the present invention
One user can be landlord/lessor, and second user can be lessee/tenantry, and the first user terminal is what the first user used
Terminal, second user end are the terminal that second user uses, and target user end includes the first user terminal and second user end, and mesh
Mark user terminal includes but is not limited to the application program being installed on the communication equipment that mobile phone, computer, plate etc. can be shot.
A kind of electronic contract signature method provided in the embodiment of the present invention, as shown in Figure 1, a kind of embodiment wherein
In, comprising the following steps:
S100: the electronic contract including signature authentication interface is sent to target user end;
S200: signing messages and signature timestamp that target user end is issued for the signature authentication interface are received;
S300: signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
S400: the signed electronic contract is encrypted by predetermined encryption rule.
The content in Current electronic contract is determined without mistaking in tenantry and lessor, and sending to both sides includes that signature is recognized
The electronic contract for demonstrate,proving interface, i.e., send the electronic contract including signature authentication interface to tenantry and lessor,
In order to which user signs on the signature authentication interface of electronic contract, while user can also check the item in electronic contract
Whether money meets the requirements.It certainly include holding in electronic contract before sending including the electronic contract on signature authentication interface
Rent side and lessor's essential information, houseclearing and lease treaty etc..If essential information includes name, phone, identification card number
Code etc., houseclearing includes house essential information and user's supplemental information, and the basic information in house includes house address, area, court
To etc., user's supplemental information is the house situation (family property information in such as house) of user's supplement, premises perimeter facility;Lease item
It about include: that rent, purposes of renting a house, rent pay information, promise breaking relevant information, supplementary provision etc..Aforementioned information by lessor and/
Or tenantry fills on terminal interface, in the contract of lease of property for the information addition that terminal will fill in.
For the ease of user's signature and increase signature validity, avoid user signature when triggered activity interface its
His control instruction, app sends electron underwriting authentication interface to user first, to enable a customer to sign on the surface,
After user signs in authentication interface before this, at the corresponding position of signature addition electronic contract, if Party A is lessor,
Party B is tenantry, and after lessor signs on electronic contract, which is just added to Party A's signature position of electronic contract
The signature after tenantry signs on electronic contract, is just added at Party B's signature position of electronic contract by place.When user exists
After completing signature on the signature authentication interface, the backstage app receives the signature of the user, and is generated to electronic contract
In.After guaranteeing that the tamper-resistance properties of electronic contract, user complete signature on digital certificate interface, obtains and closed with the electronics
With associated timestamp, the timestamp and the electronic contract are associated.Specifically, user will need to cover the time
The data of stamp are sent to time stamp server after eap-message digest generates timestamp request, when being returned by time stamp server
Between stamp response message give signing and issuing of stabbing of client deadline.Terminal (app) first uses the electronic contract for needing to add timestamp
Hash coding encrypting forms abstract, and timestamp request is generated on the basis of the abstract, i.e., includes the abstract in the request, then
Time stamp server is sent the request to, is stabbed by time stamp server time of return stamp response message to the terminal deadline
It signs and issues, due to including that electronic contract is made a summary in request message, when timestamp returns to terminal, i.e., closes the timestamp and electronics
With being associated, when other users change the electronic contract, timestamp associated there fails, at this point, then explanation should
Electronic contract is modified, and then guarantees the solidification of electronic contract time of signature, prevents electronic contract to be tampered, while also preventing out
A possibility that being cheated in existing user time.It should be noted that time stamp server is mainly authenticated by official and believable third
Square tube reason, and believable timestamp is signed and issued based on the time stamp server, timestamp can prove that electronic message (various electronic documents
And electronic data) a time point be it is already existing, complete, can verify that have the electronic certificate of legal effect.
On the basis of joined timestamp, closed by predetermined encryption rule to including the signature and with the timestamp
The electronic contract of connection encrypts, to ensure that electronic contract is contracted legal effect online.Specifically, due to the shape of electronic contract data
Formula is stored or is transmitted, therefore, in storage transmission process, it usually needs guarantee the confidentiality of electronic contract, integrality,
Availability;Confidentiality is that electronic contract is transmitted by data packet ciphertext, and after being intercepted and captured by people, other people can not understand;Completely
Property prevent someone's malice from distorting electronic contract data message it is (common in conjunction with both timestamp above-mentioned and predetermined encryption rule
It realizes);Availability can allow communicating pair (tenantry and lessor) can proper solution by a kind of general cryptographic protocol
It is close.Specifically, there are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.Symmetric cryptography is to add
It is close and decryption using the common algorithm of the same key include 3DES, AES (key length include 128,192,256,
384 etc.), the symmetric encipherment algorithms such as blowfish, twofish, IDEA, RC6, CAST5.Key is divided into a pair in public key encryption
Public key and private key.It can only be unlocked with private key with the data of public key encryption, all inextricable with public key oneself, vice versa.Public key: can
It to be disclosed to owner, extracts from private key, private key: being generated by particular algorithm, user oneself retains, it is necessary to assure
Its privacy, public key encryption may be implemented digital signature, three key exchange, data encryption functions, digital signature: essentially consist in
Allow the identity of recipient's acknowledged;Key exchange: then sender's one symmetric key of recipient's public key encryption is being sent out
Give recipient;Data encryption: public key is directly to the scene of data encryption and few, because of symmetric cryptography faster than public key encryption 3
A order of magnitude, so usually using symmetric cryptography.Public key encryption algorithms most in use: RSA, DSA, ELGamal.One-Way Encryption predominantly mentions
Take data fingerprint;One-Way Encryption algorithms most in use: MD5: Message Digest 5,5 version numbers, 128 fixed length output;SHA1:
Secure Hash Algorithm, 1 is version number, 160;There are also SHA224, SHA256, SHA384, SHA512.In order to guarantee electronic contract
The integrality and authentication of data aforementioned encryption rule can also be used in combination, detailed process are as follows: 1, use One-Way Encryption
Technology secrecy data generate a condition code, ensure that the integrality of data.2, with the private key of Party A to the condition code of generation into
Row encryption.Only Party A's private key for having oneself, ensure that authentication.3, data and encrypted condition code symmetrically add
It is close.4, with the public key encryption of Party B symmetric cryptography password obtained in the previous step.For decrypting process are as follows: 1, use the private key of Party B
First decrypt symmetric cryptography password.2, the data and condition code for going decryption to encrypt with obtained symmetric cryptography password.Using unidirectional
The data that Encryption Algorithm encryption previous step decrypts.3, decrypting feature code is removed using the public key of Party A, obtains sending in Party A
The condition code of data.4, whether the condition code compared in 3,4 steps is consistent.When consistent, decoding data obtains electronic contract.It is logical
It crosses encryption rule realization above-mentioned to encrypt to including the signature and with the associated electronic contract of the timestamp, guarantees electronics conjunction
With online signing legal force.
Preferably, the predetermined encryption rule is based on CA technology secrecy rule.
Specifically, CA technology be an authoritative Third Party Authentication mechanism, be based on openssl be a multi-functional life
Tool is enabled to realize signing and issuing for certificate.Specifically, the algorithm that opensll is provided includes: symmetric encipherment algorithm, rivest, shamir, adelman
(DHA, RSA, EIGamal, DSA), message digest algorithm (MD5, SHA1, SHA512, CRC-32), key and certificate management.
The CA application program that OpenSSL is provided is exactly a small-sized Certificate Authority (CA), realizes digital signature and signs and issues
Whole flow process and certificate management most of mechanism.Electronic contract digital signature was signed and issued based on the realization of CA platform
Cheng Zhong further includes one and implements and provide the security infrastructure with universality of security service with public key concept and technology
PKI, a complete pki system should include following sections: visa mechanism (CA), registration body (RA), certificate access library
(CB), certificate revocation list (CRL) etc..In application process of the present invention, certificate agency CA is the foundation of trust of PKI, it is managed
The whole life cycle of public key, effect include: to provide certificate, the validity period of regulation certificate and by publication Certificate Revocation Lists
(CRL) ensuring when necessary can be with revocation certificate.Registration body RA provides an interface between user and CA, it obtains and authenticates
The identity of user proposes certificate request to CA.It mainly completes to collect user information and confirms the function of user identity.Certificate is deposited
Library is taken to be responsible for the access of certificate, can be by user oneself, or pass through directory service.LIST SERVER can be a tissue
In it is existing, be also possible to provide in PKI scheme.Certificate revocation list (Certificate revocation lists, again
Certificate blacklist) it is referred to as that application program and other systems provide a kind of mode of inspection certificate validity.Any one certificate
After abolishment, certificate agency CA can be notified by way of issuing CRL each related side (as associated of the present invention terminal,
Lessor, tenantry).
Specifically, registration body is the terminal for carrying out realizing that electronic contract signs process in the present invention in implementation process
(house lease app) provides an interface between user and CA, it obtains and authenticate the identity of user, proposes to demonstrate,prove to CA
Book request.Further, first is filed a request by terminal, and the public key of oneself and some information are submitted to ca authentication, by CA
After certification passes through, the certificate comprising first essential information and first public key can be issued to first.In order to guarantee the safety of electronic contract
Property, the communication between second and first is secure communication, and therefore, first can issue the certificate of oneself second, and second can first be gone in the same CA
Check whether the certificate of first is correct effectively, if inquiry is out of question, second can be securely communicated normally with first.Specifically such as exist
When electronic contract being staggeredly sent to tenantry and lessor, a contract documents are issued other side second by terminal by first,
Entire transmission process is as follows for first: 1. creation symmetric keys (corresponding software generates, and is disposable) are encrypted with it
Contract, and symmetric key is packaged with the public key of second.2. creating digital signature, hashing algorithm (such as MD5 algorithm) is carried out simultaneously to contract
Generate original digest, the first private key encryption of oneself abstract (public/private key pair oneself can both be created or be provided by CA).3. most
Afterwards, first (is signed the digital certificate of key, encrypted abstract and first after encrypted contract, packing by authoritative institution CA
Hair) second is issued together.And after second receives encryption file, it needs to complete following act: after 1. receive, decrypting to obtain with the private key of second
Symmetric key, and the contract of encryption is unlocked with symmetric key, obtain contract in plain text.2. the digital certificate acquisition by first belongs to first
Public key, and unlock abstract (referred to as make a summary 1) with it.3. the contract after pair decryption is come using hashing algorithm same with sender
Creation abstract (referred to as abstract 2).4. comparing abstract 1 and abstract 2, if they are the same, then it represents that information is not tampered with, and from first.
Further, in a kind of wherein embodiment, as shown in Fig. 2, that will include the electronics conjunction at signature authentication interface
It is same to be sent among target user end, which comprises
S110: it receives target user end and acquires the user images including target signature in real time, and obtain and closed with the electronics
With the associated associated images of middle user information;
S120: it will be carried out pair from the target signature in the target signature extracted in the associated images and the user images
Than determining whether the user in the associated images and the user images is same user;
S130: when being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
In order to guarantee that the law on-line signing of the electronic contract of signature has message, it is therefore desirable to ensure to sign electronics and close
Same people artificial same people corresponding with user information on electronic contract.Specifically, including the signature being sent to user
Before the electronic contract of authentication interface, receives target user end and acquire the user images including target signature, i.e. face in real time
Image includes the five features (profile and size of eyes, nose, mouth, ear, face etc.) of user in image, obtain with
The associated associated images of user information in the electronic contract, wherein user information is the official's letter that can prove that user identity
Breath has electronic data in official such as the facial image on user identity card.Therefore, it extracts in user images and associated images
Target signature compare, i.e., the features such as the profile of eyes, nose, mouth, ear, face etc. and size are passed through into recognition of face
Algorithm compares, and determines the user of signature electronic contract and whether the corresponding user of identity information is same people.Specific mistake
Cheng Ru, extracting target signature method can the face identification method by geometrical characteristic, the recognition of face side based on eigenface (PCA)
The recognition of face side of method, the face identification method based on eigenface LBP, the face identification method of neural network, elastic graph matching
Method etc..Such as the face identification method process based on eigenface LBP is as follows, carries out gray processing processing to image, is then mentioned by LBP
Take target signature in face, obtain include target signature face figure, avoid in image other as the comparison of two images of interference.
The facial image including target signature obtained after LBP is handled is subjected to ULBP dimension-reduction treatment, by the figure after dimension-reduction treatment
Each grid is generated into histogram as being divided into multiple grids, and on this basis, histogram and target signature are linked,
So that the feature vector of target signature gathers together, the histogram of same characteristic features in two images is compared,
When the histogram height of same target signature is identical with size, then it can determine that as same user, and then ensure that user signs online
Legal effect about.When being determined as same user, then the institute including the signature authentication interface is sent to the app program of terminal
Electronic contract is stated, in order to which user signs on the signature authentication interface, realizes process as previously described.
Further, it is described the signed electronic contract is encrypted by predetermined encryption rule after, it is described
Method includes:
Critical field in the electronic contract is extracted, by the critical field and the user images in a manner of associated
Storage.
When needing using the electronic contract, is called in order to enable the electronic contract is easy matching, therefore, extract the electricity
Critical field in sub- contract stores the critical field and the user images in a manner of associated.It guarantees that electronics closes
Same confidentiality, safety and authenticity inquires or calls the electronic contract or relevant with electronic contract convenient for the later period
Information, while the electronic contract saves in the form of data, is also less prone to the case where leading to damage due to the factor of environment.It closes
Key field includes the key message (subscriber identity information) filled in, contract number, abstract (such as Hash volume generated with predetermined manner
One or more of code) etc., it is government or other authorization machines based on being arranged in terminal when the later period inquires or calls
The mating interface of structure access, so that one or more of government or other authorized organizations input critical field inquiry or tune
With the electronic contract or with the associated information of electronic contract, convenient for put on record with government department or other authorized organizations or its
Its shared docking.
Further, before the electronic contract including signature authentication interface being sent to target user end, the method packet
It includes:
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
Further, after receiving the signing that the first user terminal issues and inviting instruction, the method also includes:
The electronic contract comprising first user information is sent to the first user terminal.
When user is tenantry, when tenantry sees the suitable source of houses at the terminal, tenantry determines current house
With oneself ideal source of houses it is close or identical when, then issue signing to the lessor for issuing the information of renting a house on app and invite, with
Determine whether the source of houses has a mind to hire out the source of houses to tenantry also in the state of renting a house or lessor.Tenantry is in terminal
Signing is triggered on interface and invites control, if user clicks a certain virtual key at the terminal, when user clicks completion, is generated to out
Rent side, which issues to contract, invites instruction, which invites title, identification card number, telephone number etc. in instruction including tenantry, because
This, after user clicks a certain virtual key at the terminal, needs to be generated to electronics to its displaying in the terminal of tenantry first and closes
Tenantry's information in, it is identical as user information above, in order to receive the signing in lessor it is invited to that electronics is taken to close
When with template, tenantry's information can be directly appended in electronic contract, while tenantry also can confirm that whether the information is correct,
When incorrect, tenantry modifies its information at the terminal.Specifically, pop-up includes holding when tenantry issues signing and invites
The interface of rent side's essential information, tenantry check or fill on the surface the essential information of tenantry, and true in tenantry
Essential information is determined without mistaking, and tenantry clicks determination on interface, after terminal is determined based on user's click, at this time just to lessor
Issue signing invitation notification.Wherein, in inviting instruction, the essential information including contract invitation notification and tenantry.Signing is invited
It please notify according to preset template generation, if template is " * * * issues signing invitation notification to you ", wherein " * * * " is tenantry
Title, which extracts from the user name of tenantry's register account number.After lessor receives signing invitation notification,
The notice interface is popped up at the interface of lessor, after user clicks the determination virtual key for receiving signing invitation on the surface,
It generates and receives signing and invite instruction, include obtaining preset electronic contract template from database in the instruction, and in electronic contract
Have been added the information of tenantry and lessor.
Further, after receiving the second user end and receiving the instruction of the invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes institute
State the first user information.
Further, in the pass for receiving the generation electronic contract that second user is filled at the second user end
After key information, which comprises
Sent to the first user terminal include the key message the electronic contract, in order to which the first user is described the
The modification instruction of the electronic contract is modified in the triggering of one user terminal;
The modification instruction that first user terminal is sent is received, sends repairing for the electronic contract to second user end
Change notice, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modification
The electronic contract afterwards.
After getting electronic contract template, show to include needing to fill in electronic contract key message to lessor one by one
User Interface, i.e., the same User Interface can only be filled in category information, and such as moving in time surface can only fill in or select to move in
The range of lease time can only be filled in or be selected to time, lease time range, other supplementary provisions, rent pay the behaviour such as information
It is identical to make method.It wherein needs at the reserved location of fill message to be interrelated in key message interface and electronic contract template
And it is one-to-one.After filling the key message for generating electronic contract in lessor, terminal receives lessor and selects the generation filled out
The key message of electronic contract generates electronic contract mould to bring key message at the corresponding position of electronic contract template into
Plate, wherein key message includes user information, i.e. tenantry's information and lessor's information.Not bad key message is filled out in lessor's choosing
Afterwards, in conjunction with aforementioned tenantry's information, corresponding electronic contract is generated, which is saved and sends the electronics to tenantry
Contract, in order to tenantry browse check the electronic contract, determine whether do not met in the electronic contract legal provisions and/or
To oneself lossy clause project.If tenantry, which determines to exist in the electronic contract, does not meet legal provisions and/or to oneself
When lossy clause project, tenantry clicks modification on the interface of terminal, and tenantry fills in unsatisfied in terminal interface
Clause and/or project generate the modification instruction for being sent to lessor, wherein include in the instruction after tenantry clicks modification
The unsatisfied clause of tenantry and/or project and the amendment advice for sending it to lessor.Receive what lessor filled in
The key message of electronic contract modification, generates modified electronic contract.After lessor receives the amendment advice, at the terminal
The key message of relevant provision and/or project is modified, modification process is identical with the operation for filling in key message, and modification is completed
Afterwards, the determining virtual key of point solution on lessor's terminal interface, to enable the terminals to obtain and receive the modified key message,
Modified electronic contract is equally generated based on the identical process of aforementioned generation electronic contract.To guarantee the clause in electronic contract
It is fair, between reduction lease later period tenantry and lessor contradiction to lessor and tenantry with project.It needs
Illustrate, aforementioned tenantry and lessor can exchange, and when lessor confirms that tenantry is suitble to the source of houses of oneself, hire out direction
Tenantry issue signing invitation notification, subsequent process with charter direction rent a house sending contract invitation notification it is identical, being only that will be former
Tenantry is converted into lessor, and former lessor is converted to tenantry, in order to which lessor selects suitable tenantry.
Furthermore it is also possible to establish the option of the corresponding modification key message of credit grade of tenantry, lessor.Citing:
The low tenantry of credit grade, it is desirable that pre-pay 4 months cash pledges, the high tenantry of credit grade can pre-pay 1 month cash pledge.Into
One step, credit grade, evaluation or the similar information of other side can be shown to tenantry, lessor, repaired for tenantry, lessor
It is referred to when changing.But these information are simultaneously not written into contract.For example, showing the nearest evaluation in 3 years of tenantry to lessor, make
Tenantry voluntarily assesses modification content.
A kind of electronic contract signature device provided in the embodiment of the present invention, in a kind of wherein embodiment, such as Fig. 3 institute
Show, comprising:
Signature authentication interface sending module 100, for by include signature authentication interface electronic contract be sent to target use
Family end;
Electronic contract generation module 200 is directed to the signature that the signature authentication interface issues for receiving target user end
Information and signature timestamp;
Relating module 300, for generating signed electricity according to the signing messages, signature timestamp and the electronic contract
Sub- contract;
Encrypting module 400, for being encrypted by predetermined encryption rule to the signed electronic contract.
Further, it is also wrapped continuing with a kind of device of electronic contract signature referring to Fig. 3, provided in the embodiment of the present invention
It includes:
Acquisition unit 110 acquires the user images including target signature for receiving target user end in real time, and obtain with
The associated associated images of user information in the electronic contract;Target's feature-extraction unit 120, being used for will be from the associated diagram
The target signature extracted as in is compared with the target signature in the user images, determines the associated images and the use
Whether the user in the image of family is same user;Signature authentication interface transmission unit 130, for when being determined as same user,
Electronic contract including signature authentication interface is sent to target user end.Critical field extraction module 420, it is described for extracting
Critical field in electronic contract stores the critical field and the user images in a manner of associated.Signing is invited logical
Know sending module 101, instruction is invited in the signing for receiving the sending of the first user terminal, is invited to the sending signing of second user end logical
Know;Contract template obtains module 102, and the instruction of the invitation notification is received for receiving the second user end, obtains electronics
Contract template.Display module 103 sends the electronic contract comprising first user information for the first user terminal.Key letter
Receiving module 104 is ceased, for receiving the crucial letter for the generation electronic contract that second user is filled at the second user end
Breath;First electronic contract generation module 105, for according to electronics described in the key message and the electronic contract template generation
Contract, the key message include first user information.Electronic contract display module 106 is sent for the first user terminal
The electronic contract comprising the key message, in order to which the first user modifies the electronics in first user terminal triggering
The modification of contract instructs;Amendment advice sending module 107, the modification instruction sent for receiving first user terminal,
The amendment advice of the electronic contract is sent to second user end, so that second user is based on the amendment advice and modifies the electricity
Sub- contract;Second electronic contract generation module 108, the electronics filled in for receiving second user at the second user end
The key message of change to the contract generates the modified electronic contract.
The side of above-mentioned electronic contract signature may be implemented in a kind of device of electronic contract signature provided in an embodiment of the present invention
The embodiment of method, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.
A kind of computer readable storage medium provided in an embodiment of the present invention stores on the computer readable storage medium
There is computer program, the method for electronic contract signature described in any one technical solution is realized when which is executed by processor.
Wherein, the computer readable storage medium includes but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-
ROM and magneto-optic disk), ROM (Read-Only Memory, read-only memory), RAM (Random AcceSS Memory, immediately
Memory), EPROM (EraSable Programmable Read-Only Memory, Erarable Programmable Read only Memory),
(Electrically EraSable Programmable Read-Only Memory, electric erazable programmable is read-only to be deposited EEPROM
Reservoir), flash memory, magnetic card or light card.It is, storage equipment includes by equipment (for example, computer, mobile phone) with energy
Any medium for the form storage or transmission information enough read can be read-only memory, disk or CD etc..
A kind of computer readable storage medium provided in an embodiment of the present invention, in the base for guaranteeing online signing legal force
On plinth, the embodiment of above-mentioned electronic contract signature is realized, house lease field is introduced into, formed house lease on line and close
Ring breaks the limitation in traditional contract signing model of renting a house to lease both sides' time, space;By the electricity including signature authentication interface
Sub- contract is sent to target user end;It receives target user end and is directed to signing messages and signature that the signature authentication interface issues
Timestamp;Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;Added by default
Close rule encrypts the signed electronic contract.In the embodiment of offer of the invention, in tenantry and lessor
Determine that the content in Current electronic contract without mistaking, sends the electronic contract including signature authentication interface to both sides, i.e.,
The electronic contract including signature authentication interface is sent, to tenantry and lessor in order to which user is in the label of electronic contract
It signs in name authentication interface, while user can also check whether the clause in electronic contract meets the requirements.Certainly it is sending out
It send including including tenantry and lessor's essential information, room before the electronic contract on signature authentication interface, in electronic contract
Room information and lease treaty etc..The information is filled on terminal interface by lessor and/or tenantry, and terminal will fill out
In the contract of lease of property for the information addition write.For the ease of user's signature and increase the validity signed, user is avoided to sign
When triggered activity interface other control instructions, terminal first to user send electron underwriting authentication interface, to enable a customer to
It signs on the surface, after user signs in authentication interface before this, by the corresponding position of signature addition electronic contract
Set place.After guaranteeing that the tamper-resistance properties of electronic contract, user complete signature on digital certificate interface, obtain and the electronics
The associated timestamp of contract, the timestamp and the electronic contract are associated.On the basis of joined timestamp,
It is encrypted by predetermined encryption rule to including the signature and with the associated electronic contract of the timestamp, to ensure electronic contract
Online signing legal effect.There are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.By preceding
The encryption rule stated is realized to be encrypted to including the signature and with the associated electronic contract of the timestamp, guarantees that electronic contract exists
Line signing legal force.
The method of above-mentioned electronic contract signature may be implemented in computer readable storage medium provided in an embodiment of the present invention
Embodiment, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.
In addition, the present invention also provides a kind of servers, as shown in figure 4, the server process in another embodiment
The devices such as device 503, memory 505, input unit 507 and display unit 509.It will be understood by those skilled in the art that Fig. 4 shows
Structure devices out do not constitute the restriction to Servers-all, may include than illustrating more or fewer components or group
Close certain components.Memory 505 can be used for storing application program 501 and each functional module, and the operation of processor 503 is stored in
The application program 501 of reservoir 505, thereby executing the various function application and data processing of equipment.Memory 505 can be interior
Memory or external memory, or including both built-in storage and external memory.Built-in storage may include read-only memory
(ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash
Device or random access memory.External memory may include hard disk, floppy disk, ZIP disk, USB flash disk, tape etc..It is disclosed in this invention to deposit
Reservoir includes but is not limited to the memory of these types.Memory 505 disclosed in this invention is only used as example rather than as limit
It is fixed.
Input unit 507 is used to receive the input of signal, and receives the key message of user's input with the signature of, user
And the operational order of user's input.Input unit 507 may include touch panel and other input equipments.Touch panel can be received
Collecting the touch operation of client on it or nearby, (for example client is being touched using any suitable object or attachment such as finger, stylus
Control on panel or the operation near touch panel), and drive corresponding attachment device according to a pre-set procedure;It is other defeated
Entering equipment can include but is not limited to physical keyboard, function key (such as broadcasting control button, switch key etc.), trace ball, mouse
One of mark, operating stick etc. are a variety of.Display unit 509 can be used for showing the information of client's input or be supplied to the letter of client
The various menus of breath and computer equipment.The forms such as liquid crystal display, Organic Light Emitting Diode can be used in display unit 509.
Processor 503 is the control centre of computer equipment, using the various pieces of various interfaces and the entire computer of connection, is passed through
Operation executes the software program and/or module being stored in memory 503, and calls the data being stored in memory,
Perform various functions and handle data.One or more processors 503 shown in Fig. 4 are able to carry out, realize shown in Fig. 3
The function of signature authentication interface sending module 100, the function of relating module 300, adds the function of electronic contract generation module 200
The function of close module 400, the function of acquisition unit 110, the function of target's feature-extraction unit 120, signature authentication interface are sent
Function, the function of critical field extraction module 420, the function for invitation notification sending module 101 of contracting, contract mould of unit 130
Plate obtains the function of module 102, the function of display module 103, the function of key message receiving module 104, the first electronic contract
The function of generation module 105, the function of electronic contract display module 106, the function of amendment advice sending module 107, the second electricity
The function of sub- contract generation module 108.
In one embodiment, the server includes one or more processors 503, and one or more storages
Device 505, one or more application program 501, wherein one or more of application programs 501 are stored in memory 505
And be configured as being executed by one or more of processors 503, one or more of application programs 301 are configured to carry out
Electronic contract described in above embodiments signs method.
A kind of server provided in an embodiment of the present invention realizes on the basis of guaranteeing online signing legal force
The embodiment of above-mentioned electronic contract signature, is introduced into house lease field, forms house lease closed loop on line, break traditional rent
To the limitation of lease both sides' time, space in room contract signing model;Electronic contract including signature authentication interface is sent to
Target user end;Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;According to
The signing messages, signature timestamp and the electronic contract generate signed electronic contract;By predetermined encryption rule to institute
Signed electronic contract is stated to be encrypted.In the embodiment of offer of the invention, determined in tenantry and lessor current
Content in electronic contract without mistaking, sent to both sides include signature authentication interface the electronic contract, i.e., to tenantry and
Lessor sends the electronic contract including signature authentication interface, in order to which user is at the signature authentication interface of electronic contract
On sign, while user can also check whether the clause in electronic contract meets the requirements.It certainly include signature sending
Include before electronic contract in authentication interface, in electronic contract tenantry and lessor's essential information, houseclearing and
Lease treaty etc..The information is filled on terminal interface by lessor and/or tenantry, and the information that terminal will fill in adds
In the contract of lease of property added.For the ease of user's signature and increase the validity signed, avoids user's triggered activity in signature
Other control instructions at interface, terminal sends electron underwriting authentication interface to user first, to enable a customer on the surface
It signs, after user signs in authentication interface before this, at the corresponding position of signature addition electronic contract.In order to protect
The tamper-resistance properties of electronic contract are demonstrate,proved, after user completes signature on digital certificate interface, are obtained associated with the electronic contract
Timestamp, the timestamp and the electronic contract are associated.On the basis of joined timestamp, added by default
Close rule is to including the signature and encrypt with the associated electronic contract of the timestamp, to ensure that electronic contract is contracted method online
Restrain effect.There are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.It is advised by encryption above-mentioned
It then realizes to including the signature and encrypted with the associated electronic contract of the timestamp, guarantees that electronic contract is contracted law online
Validity.
The embodiment of the method for the electronic contract signature of above-mentioned offer may be implemented in server provided in an embodiment of the present invention,
Concrete function realizes the explanation referred in embodiment of the method, and details are not described herein.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of electronic contract signs method, which comprises the following steps:
Electronic contract including signature authentication interface is sent to target user end;
Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;
Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
The signed electronic contract is encrypted by predetermined encryption rule.
2. electronic contract according to claim 1 signs method, which is characterized in that the predetermined encryption rule is based on CA
Technology secrecy rule.
3. electronic contract according to claim 1 signs method, which is characterized in that it is described will include signature authentication interface
Electronic contract be sent among target user end, comprising:
It receives target user end and acquires the user images including target signature in real time, and obtain and believe with user in the electronic contract
The associated associated images of manner of breathing;
It will be compared from the target signature extracted in the associated images and the target signature in the user images, determine institute
Whether the user stated in associated images and the user images is same user;
When being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
4. electronic contract according to claim 3 signs method, which is characterized in that passing through predetermined encryption rule to described
After signed electronic contract is encrypted, which comprises
Critical field in the electronic contract is extracted, the critical field and the user images are deposited in a manner of associated
Storage.
5. electronic contract according to claim 1 signs method, which is characterized in that will include the electricity at signature authentication interface
Sub- contract is sent to before target user end, which comprises
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
6. electronic contract according to claim 5 signs method, which is characterized in that in the label for receiving the sending of the first user terminal
After about inviting instruction, the method also includes:
The electronic contract comprising the first user information is sent to the first user terminal.
7. electronic contract according to claim 5 signs method, which is characterized in that receiving described in the reception of second user end
After the instruction of invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes described
One user information.
8. electronic contract according to claim 7 signs method, which is characterized in that receiving second user described second
After the key message for the generation electronic contract that user terminal is filled in, which comprises
The electronic contract comprising the key message is sent to the first user terminal, in order to which the first user uses described first
The modification instruction of the electronic contract is modified in the triggering of family end;
The modification instruction that first user terminal is sent is received, the modification for sending the electronic contract to second user end is logical
Know, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modified
The electronic contract.
9. a kind of electronic contract signs device characterized by comprising
Signature authentication interface sending module, for will include that the electronic contract at signature authentication interface is sent to target user end;
Electronic contract generation module is directed to the signing messages and label that the signature authentication interface issues for receiving target user end
Name timestamp;
Relating module, for generating signed electronic contract according to the signing messages, signature timestamp and the electronic contract;
Encrypting module, for being encrypted by predetermined encryption rule to the signed electronic contract.
10. a kind of server characterized by comprising
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and are configured
To be executed by one or more of processors, one or more of application programs are configured to carry out according to any one right
It is required that electronic contract described in 1 to 8 signs the step of method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810618349.XA CN109087056A (en) | 2018-06-15 | 2018-06-15 | Electronic contract signs method, apparatus and server |
PCT/CN2018/108059 WO2019237570A1 (en) | 2018-06-15 | 2018-09-27 | Electronic contract signing method, device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810618349.XA CN109087056A (en) | 2018-06-15 | 2018-06-15 | Electronic contract signs method, apparatus and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109087056A true CN109087056A (en) | 2018-12-25 |
Family
ID=64839741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810618349.XA Pending CN109087056A (en) | 2018-06-15 | 2018-06-15 | Electronic contract signs method, apparatus and server |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109087056A (en) |
WO (1) | WO2019237570A1 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754267A (en) * | 2018-12-29 | 2019-05-14 | 百度在线网络技术(北京)有限公司 | Brand authorization method, device, equipment and medium based on block chain |
CN109784005A (en) * | 2018-12-28 | 2019-05-21 | 国网雄安金融科技有限公司 | Electronic protocol manages platform and electronic protocol management method |
CN109960919A (en) * | 2019-03-25 | 2019-07-02 | 深圳市元征科技股份有限公司 | A kind of contract signature method and block chain node device |
CN110221864A (en) * | 2019-04-24 | 2019-09-10 | 深圳法大大网络科技有限公司 | Electronic document signs method, apparatus and terminal device, storage medium |
CN110598460A (en) * | 2019-09-27 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based electronic signature method and device and storage medium |
CN110677259A (en) * | 2019-09-29 | 2020-01-10 | 杭州尚尚签网络科技有限公司 | Full-link real-time notarization system and method for electronic contract |
CN110879835A (en) * | 2019-11-29 | 2020-03-13 | 腾讯科技(深圳)有限公司 | Data processing method, device and equipment based on block chain and readable storage medium |
CN111242579A (en) * | 2020-01-14 | 2020-06-05 | 珠海市华兴软件信息服务有限公司 | Electronic contract signing method, system, device and storage medium |
JP2020107081A (en) * | 2018-12-27 | 2020-07-09 | 有限会社建物管理保証 | Contract management server |
CN111756787A (en) * | 2019-11-15 | 2020-10-09 | 北京京东尚科信息技术有限公司 | Online signature method and device, electronic equipment and computer readable storage medium |
CN112118105A (en) * | 2019-06-19 | 2020-12-22 | 深圳法大大网络科技有限公司 | Electronic file signature method and device and terminal equipment |
CN112529508A (en) * | 2020-12-23 | 2021-03-19 | 杭州电子科技大学 | Electric power material management system based on PBFT alliance chain |
CN113191836A (en) * | 2021-03-24 | 2021-07-30 | 特斯联科技集团有限公司 | Community tenant management method and system based on user habit analysis |
CN113313540A (en) * | 2021-08-02 | 2021-08-27 | 云账户技术(天津)有限公司 | Contract generation method and device, electronic equipment and readable storage medium |
CN114038130A (en) * | 2021-11-06 | 2022-02-11 | 深圳市智物科技有限公司 | Method for realizing remote room prepayment |
CN114792270A (en) * | 2022-06-27 | 2022-07-26 | 浙江数秦科技有限公司 | Loan contract online signing system based on block chain |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023128908A1 (en) * | 2021-12-30 | 2023-07-06 | Cloudpeer Global Teknoloji A. S. | A mobile electronic signature system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1722165A (en) * | 2004-07-12 | 2006-01-18 | 刘正荣 | Communication system and method |
CN101034450A (en) * | 2007-04-06 | 2007-09-12 | 刘明晶 | Electronic contract automatic settlement method |
CN107527215A (en) * | 2017-09-28 | 2017-12-29 | 山西特信环宇信息技术有限公司 | A kind of electronic contract system and operating method based on biological identification technology |
CN107844946A (en) * | 2017-06-19 | 2018-03-27 | 深圳法大大网络科技有限公司 | A kind of method, apparatus and server of electronic contract signature |
CN108092779A (en) * | 2018-01-05 | 2018-05-29 | 北京汇通金财信息科技有限公司 | A kind of method and device for realizing electronic signature |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106960165B (en) * | 2017-03-13 | 2020-12-22 | 广东网金控股股份有限公司 | Method for realizing multi-party electronic contract countersigning based on block chain intelligent contract |
-
2018
- 2018-06-15 CN CN201810618349.XA patent/CN109087056A/en active Pending
- 2018-09-27 WO PCT/CN2018/108059 patent/WO2019237570A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1722165A (en) * | 2004-07-12 | 2006-01-18 | 刘正荣 | Communication system and method |
CN101034450A (en) * | 2007-04-06 | 2007-09-12 | 刘明晶 | Electronic contract automatic settlement method |
CN107844946A (en) * | 2017-06-19 | 2018-03-27 | 深圳法大大网络科技有限公司 | A kind of method, apparatus and server of electronic contract signature |
CN107527215A (en) * | 2017-09-28 | 2017-12-29 | 山西特信环宇信息技术有限公司 | A kind of electronic contract system and operating method based on biological identification technology |
CN108092779A (en) * | 2018-01-05 | 2018-05-29 | 北京汇通金财信息科技有限公司 | A kind of method and device for realizing electronic signature |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7299598B2 (en) | 2018-12-27 | 2023-06-28 | 有限会社建物管理保証 | Contract management server |
JP2020107081A (en) * | 2018-12-27 | 2020-07-09 | 有限会社建物管理保証 | Contract management server |
CN109784005A (en) * | 2018-12-28 | 2019-05-21 | 国网雄安金融科技有限公司 | Electronic protocol manages platform and electronic protocol management method |
CN109754267A (en) * | 2018-12-29 | 2019-05-14 | 百度在线网络技术(北京)有限公司 | Brand authorization method, device, equipment and medium based on block chain |
CN109960919A (en) * | 2019-03-25 | 2019-07-02 | 深圳市元征科技股份有限公司 | A kind of contract signature method and block chain node device |
CN109960919B (en) * | 2019-03-25 | 2023-02-28 | 深圳市元征科技股份有限公司 | Contract signing method and block link point equipment |
CN110221864A (en) * | 2019-04-24 | 2019-09-10 | 深圳法大大网络科技有限公司 | Electronic document signs method, apparatus and terminal device, storage medium |
CN112118105A (en) * | 2019-06-19 | 2020-12-22 | 深圳法大大网络科技有限公司 | Electronic file signature method and device and terminal equipment |
CN112118105B (en) * | 2019-06-19 | 2024-03-01 | 深圳法大大网络科技有限公司 | Electronic file signing method and device and terminal equipment |
CN110598460A (en) * | 2019-09-27 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based electronic signature method and device and storage medium |
CN110677259A (en) * | 2019-09-29 | 2020-01-10 | 杭州尚尚签网络科技有限公司 | Full-link real-time notarization system and method for electronic contract |
CN110677259B (en) * | 2019-09-29 | 2022-03-15 | 杭州尚尚签网络科技有限公司 | Full-link real-time notarization system and method for electronic contract |
CN111756787A (en) * | 2019-11-15 | 2020-10-09 | 北京京东尚科信息技术有限公司 | Online signature method and device, electronic equipment and computer readable storage medium |
CN110879835B (en) * | 2019-11-29 | 2024-02-09 | 腾讯科技(深圳)有限公司 | Block chain-based data processing method, device, equipment and readable storage medium |
CN110879835A (en) * | 2019-11-29 | 2020-03-13 | 腾讯科技(深圳)有限公司 | Data processing method, device and equipment based on block chain and readable storage medium |
CN111242579A (en) * | 2020-01-14 | 2020-06-05 | 珠海市华兴软件信息服务有限公司 | Electronic contract signing method, system, device and storage medium |
CN112529508A (en) * | 2020-12-23 | 2021-03-19 | 杭州电子科技大学 | Electric power material management system based on PBFT alliance chain |
CN113191836A (en) * | 2021-03-24 | 2021-07-30 | 特斯联科技集团有限公司 | Community tenant management method and system based on user habit analysis |
CN113313540A (en) * | 2021-08-02 | 2021-08-27 | 云账户技术(天津)有限公司 | Contract generation method and device, electronic equipment and readable storage medium |
CN113313540B (en) * | 2021-08-02 | 2021-09-28 | 云账户技术(天津)有限公司 | Contract generation method and device, electronic equipment and readable storage medium |
CN114038130A (en) * | 2021-11-06 | 2022-02-11 | 深圳市智物科技有限公司 | Method for realizing remote room prepayment |
CN114792270A (en) * | 2022-06-27 | 2022-07-26 | 浙江数秦科技有限公司 | Loan contract online signing system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
WO2019237570A1 (en) | 2019-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109087056A (en) | Electronic contract signs method, apparatus and server | |
AU2021203184B2 (en) | Transaction messaging | |
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
US8543091B2 (en) | Secure short message service (SMS) communications | |
CN1689297B (en) | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |
CN111787530B (en) | Block chain digital identity management method based on SIM card | |
CN109583219A (en) | A kind of data signature, encryption and preservation method, apparatus and equipment | |
US20100205431A1 (en) | System, method and program product for checking revocation status of a biometric reference template | |
CN104320251B (en) | A kind of offline seal information device, electronic signature management system and authentication method for using on-line authentication | |
JP2005328574A (en) | Cryptographic system and method with key escrow feature | |
CN105103488A (en) | Policy enforcement with associated data | |
CN107579828A (en) | Safety certification device and method in machine-to-machine communication between the device based on PUF | |
CN105191207A (en) | Federated key management | |
CN105991650B (en) | A kind of transmission method and system of ID card information | |
CN106789024B (en) | A kind of remote de-locking method, device and system | |
CN109729046A (en) | Two-dimensional code scanning method and terminal, authentication method and server and service system | |
CN101652782B (en) | Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification | |
KR100870202B1 (en) | Method and system of issuing accredited certificate using encrypted image | |
Griffin | Telebiometric authentication objects | |
US8176330B2 (en) | Method, apparatus and article for off-line certification in mobile applications | |
CN108833431A (en) | A kind of method, apparatus, equipment and the storage medium of password resetting | |
WO2020042508A1 (en) | Method, system and electronic device for processing claim incident based on blockchain | |
US20120284787A1 (en) | Personal Secured Access Devices | |
CN104462877B (en) | A kind of digital resource acquisition method under copyright protection and system | |
US20230259899A1 (en) | Method, participant unit, transaction register and payment system for managing transaction data sets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |