CN109087056A - Electronic contract signs method, apparatus and server - Google Patents

Electronic contract signs method, apparatus and server Download PDF

Info

Publication number
CN109087056A
CN109087056A CN201810618349.XA CN201810618349A CN109087056A CN 109087056 A CN109087056 A CN 109087056A CN 201810618349 A CN201810618349 A CN 201810618349A CN 109087056 A CN109087056 A CN 109087056A
Authority
CN
China
Prior art keywords
electronic contract
user
signature
contract
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810618349.XA
Other languages
Chinese (zh)
Inventor
靳倩慧
黄晓霞
黄俊凯
杜立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810618349.XA priority Critical patent/CN109087056A/en
Priority to PCT/CN2018/108059 priority patent/WO2019237570A1/en
Publication of CN109087056A publication Critical patent/CN109087056A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

A kind of electronic contract signature method provided in the embodiment of the present invention, comprising the following steps: in response to user instruction, send the electronic contract including signature authentication interface to user;Signature of the user on the signature authentication interface is received, the signature is generated in the electronic contract;Timestamp associated with the electronic contract is obtained, the timestamp and the electronic contract are associated;It is encrypted by predetermined encryption rule to including the signature and with the associated electronic contract of the timestamp.The present invention is applied to house lease field, on electronic signature Contract basis, guarantees the tamper-resistance properties of electronic contract, legal effect of contracting online by the method for timestamp, encryption.

Description

Electronic contract signs method, apparatus and server
Technical field
The present invention relates to house lease, electronic contract, encryption technology fields, specifically, the present invention relates to a kind of electronics Contract signs method, apparatus and server.
Background technique
With the development of internet technology, people more and more pursue efficient and convenient method of doing things, however, current room Room lease field also uses papery contract to sign, and signs due to needing to sign both sides' agreement specific time to scene, from And need both sides to adjust oneself schedule, individually to contract signature scene signature, cause to sign the convenience of papery contract compared with Difference reasonable cannot easily be arranged according to the both sides' when and where leased;Meanwhile papery contract is not easy to store, holds It is easy to damage, and the contractual writing of papery is easy to obscure, it cannot be guaranteed that the validity of contract and the preservation of contract and backup, no Contractual information can timely be transferred to be transmitted or put on record, while also increasing the cost of labor of inquiry contract.Although Part industry has electronic contract at present, but electronic contract is contracted online, legal force is not high, is easy to be trapped, be usurped Change, and the fraudulent there are contract parties in time, does not recognize to sign contract in this time.
Summary of the invention
The purpose of the present invention, which aims to solve at least one of above-mentioned technological deficiency, especially electronic contract law of contracting online, to be had Effect property is not high, is easy the problem of being trapped, being tampered.
The present invention provides a kind of electronic contracts to sign method, comprising the following steps:
Electronic contract including signature authentication interface is sent to target user end;
Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;
Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
The signed electronic contract is encrypted by predetermined encryption rule.
Preferably, the predetermined encryption rule is based on CA technology secrecy rule.
It is further, described that the electronic contract including signature authentication interface is sent to target user end, comprising:
It receives target user end and acquires the user images including target signature in real time, and obtain and used in the electronic contract The associated associated images of family information;
It will be compared from the target signature extracted in the associated images and the target signature in the user images, really Whether the user in the fixed associated images and the user images is same user;
When being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
Further, after being carried out by predetermined encryption rule to the signed electronic contract, which comprises
Critical field in the electronic contract is extracted, by the critical field and the user images in a manner of associated Storage.
Further, by include signature authentication interface electronic contract be sent to target user end before, the method Include:
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
Further, after receiving the signing that the first user terminal issues and inviting instruction, the method also includes:
The electronic contract comprising first user information is sent to the first user terminal.
Further, after receiving second user end and receiving the instruction of the invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes institute State the first user information.
Further, in the pass for receiving the generation electronic contract that second user is filled at the second user end After key information, which comprises
Sent to the first user terminal include the key message the electronic contract, in order to which the first user is described the The modification instruction of the electronic contract is modified in the triggering of one user terminal;
The modification instruction that first user terminal is sent is received, sends repairing for the electronic contract to second user end Change notice, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modification The electronic contract afterwards.
The present invention provides a kind of electronic contracts to sign device, comprising:
Signature authentication interface sending module, for will include that the electronic contract at signature authentication interface is sent to target user End;
Electronic contract generation module is directed to the signing messages that the signature authentication interface issues for receiving target user end With signature timestamp;
Relating module, for generating signed electronics according to the signing messages, signature timestamp and the electronic contract Contract;
Encrypting module, for being encrypted by predetermined encryption rule to the signed electronic contract.The present invention is implemented A kind of server provided in example, comprising:
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and quilt It is configured to be executed by one or more of processors, one or more of application programs are configured to carry out according to any skill Electronic contract described in art scheme signs the step of method.
Compared with prior art, embodiment provided by the invention has the advantages that
1, a kind of electronic contract signature method provided in the embodiment of the present invention, comprising the following steps: will include that signature is recognized The electronic contract at card interface is sent to target user end;It receives target user end and is directed to the signature that the signature authentication interface issues Information and signature timestamp;Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract; The signed electronic contract is encrypted by predetermined encryption rule.On electronic signature Contract basis, by timestamp, The method of encryption guarantees the tamper-resistance properties of electronic contract, legal effect of contracting online.
2, a kind of electronic contract signature method provided in the embodiment of the present invention, the predetermined encryption rule is based on CA skill Art encryption rule.By the support at Third Party Authentication center, effective method is provided for the online signing legal effect of electronic contract Restrain effect.
3, a kind of electronic contract signature method provided in the embodiment of the present invention, is applied to house lease field, breaks biography The limitation that system is rented a house in contract signing model to lease both sides' time, space, the both sides to sign a contract can also be according to personal reason Directly add supplementary provision in terminal so that electronic contract neat and tidy, and electronic contract save with data mode and The critical field in electronic contract, the phonotape and videotape during signature will be extracted, convenient for carrying out with government department or other authorized organizations Put on record or other shared docking, while guaranteeing that the people to sign a contract is corresponding with the information of a side on electronic contract, guarantees that contracts has Effect property, avoids being swindled.The transmission of contract is facilitated by critical field or is put on record, and cost of labor is reduced.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is that electronic contract of the present invention signs a kind of flow diagram of embodiment in the exemplary embodiments of method;
Fig. 2 is the flow diagram that electronic contract of the present invention signs another embodiment in the exemplary embodiments of method;
Fig. 3 is the structural schematic diagram for the exemplary embodiments that electronic contract of the present invention signs device;
Fig. 4 is an example structure schematic diagram of server of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
A kind of electronic contract signature method provided in the embodiment of the present invention is mainly used in house lease field, will be in room Room leases field and introduces electronic contract, simplifies landlord and lessee signs the process of electronic contract, forms house lease on line and closes Ring breaks the limitation in traditional contract signing model of renting a house to lease both sides' time, space.Wherein in the embodiment of the present invention One user can be landlord/lessor, and second user can be lessee/tenantry, and the first user terminal is what the first user used Terminal, second user end are the terminal that second user uses, and target user end includes the first user terminal and second user end, and mesh Mark user terminal includes but is not limited to the application program being installed on the communication equipment that mobile phone, computer, plate etc. can be shot.
A kind of electronic contract signature method provided in the embodiment of the present invention, as shown in Figure 1, a kind of embodiment wherein In, comprising the following steps:
S100: the electronic contract including signature authentication interface is sent to target user end;
S200: signing messages and signature timestamp that target user end is issued for the signature authentication interface are received;
S300: signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
S400: the signed electronic contract is encrypted by predetermined encryption rule.
The content in Current electronic contract is determined without mistaking in tenantry and lessor, and sending to both sides includes that signature is recognized The electronic contract for demonstrate,proving interface, i.e., send the electronic contract including signature authentication interface to tenantry and lessor, In order to which user signs on the signature authentication interface of electronic contract, while user can also check the item in electronic contract Whether money meets the requirements.It certainly include holding in electronic contract before sending including the electronic contract on signature authentication interface Rent side and lessor's essential information, houseclearing and lease treaty etc..If essential information includes name, phone, identification card number Code etc., houseclearing includes house essential information and user's supplemental information, and the basic information in house includes house address, area, court To etc., user's supplemental information is the house situation (family property information in such as house) of user's supplement, premises perimeter facility;Lease item It about include: that rent, purposes of renting a house, rent pay information, promise breaking relevant information, supplementary provision etc..Aforementioned information by lessor and/ Or tenantry fills on terminal interface, in the contract of lease of property for the information addition that terminal will fill in.
For the ease of user's signature and increase signature validity, avoid user signature when triggered activity interface its His control instruction, app sends electron underwriting authentication interface to user first, to enable a customer to sign on the surface, After user signs in authentication interface before this, at the corresponding position of signature addition electronic contract, if Party A is lessor, Party B is tenantry, and after lessor signs on electronic contract, which is just added to Party A's signature position of electronic contract The signature after tenantry signs on electronic contract, is just added at Party B's signature position of electronic contract by place.When user exists After completing signature on the signature authentication interface, the backstage app receives the signature of the user, and is generated to electronic contract In.After guaranteeing that the tamper-resistance properties of electronic contract, user complete signature on digital certificate interface, obtains and closed with the electronics With associated timestamp, the timestamp and the electronic contract are associated.Specifically, user will need to cover the time The data of stamp are sent to time stamp server after eap-message digest generates timestamp request, when being returned by time stamp server Between stamp response message give signing and issuing of stabbing of client deadline.Terminal (app) first uses the electronic contract for needing to add timestamp Hash coding encrypting forms abstract, and timestamp request is generated on the basis of the abstract, i.e., includes the abstract in the request, then Time stamp server is sent the request to, is stabbed by time stamp server time of return stamp response message to the terminal deadline It signs and issues, due to including that electronic contract is made a summary in request message, when timestamp returns to terminal, i.e., closes the timestamp and electronics With being associated, when other users change the electronic contract, timestamp associated there fails, at this point, then explanation should Electronic contract is modified, and then guarantees the solidification of electronic contract time of signature, prevents electronic contract to be tampered, while also preventing out A possibility that being cheated in existing user time.It should be noted that time stamp server is mainly authenticated by official and believable third Square tube reason, and believable timestamp is signed and issued based on the time stamp server, timestamp can prove that electronic message (various electronic documents And electronic data) a time point be it is already existing, complete, can verify that have the electronic certificate of legal effect.
On the basis of joined timestamp, closed by predetermined encryption rule to including the signature and with the timestamp The electronic contract of connection encrypts, to ensure that electronic contract is contracted legal effect online.Specifically, due to the shape of electronic contract data Formula is stored or is transmitted, therefore, in storage transmission process, it usually needs guarantee the confidentiality of electronic contract, integrality, Availability;Confidentiality is that electronic contract is transmitted by data packet ciphertext, and after being intercepted and captured by people, other people can not understand;Completely Property prevent someone's malice from distorting electronic contract data message it is (common in conjunction with both timestamp above-mentioned and predetermined encryption rule It realizes);Availability can allow communicating pair (tenantry and lessor) can proper solution by a kind of general cryptographic protocol It is close.Specifically, there are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.Symmetric cryptography is to add It is close and decryption using the common algorithm of the same key include 3DES, AES (key length include 128,192,256, 384 etc.), the symmetric encipherment algorithms such as blowfish, twofish, IDEA, RC6, CAST5.Key is divided into a pair in public key encryption Public key and private key.It can only be unlocked with private key with the data of public key encryption, all inextricable with public key oneself, vice versa.Public key: can It to be disclosed to owner, extracts from private key, private key: being generated by particular algorithm, user oneself retains, it is necessary to assure Its privacy, public key encryption may be implemented digital signature, three key exchange, data encryption functions, digital signature: essentially consist in Allow the identity of recipient's acknowledged;Key exchange: then sender's one symmetric key of recipient's public key encryption is being sent out Give recipient;Data encryption: public key is directly to the scene of data encryption and few, because of symmetric cryptography faster than public key encryption 3 A order of magnitude, so usually using symmetric cryptography.Public key encryption algorithms most in use: RSA, DSA, ELGamal.One-Way Encryption predominantly mentions Take data fingerprint;One-Way Encryption algorithms most in use: MD5: Message Digest 5,5 version numbers, 128 fixed length output;SHA1: Secure Hash Algorithm, 1 is version number, 160;There are also SHA224, SHA256, SHA384, SHA512.In order to guarantee electronic contract The integrality and authentication of data aforementioned encryption rule can also be used in combination, detailed process are as follows: 1, use One-Way Encryption Technology secrecy data generate a condition code, ensure that the integrality of data.2, with the private key of Party A to the condition code of generation into Row encryption.Only Party A's private key for having oneself, ensure that authentication.3, data and encrypted condition code symmetrically add It is close.4, with the public key encryption of Party B symmetric cryptography password obtained in the previous step.For decrypting process are as follows: 1, use the private key of Party B First decrypt symmetric cryptography password.2, the data and condition code for going decryption to encrypt with obtained symmetric cryptography password.Using unidirectional The data that Encryption Algorithm encryption previous step decrypts.3, decrypting feature code is removed using the public key of Party A, obtains sending in Party A The condition code of data.4, whether the condition code compared in 3,4 steps is consistent.When consistent, decoding data obtains electronic contract.It is logical It crosses encryption rule realization above-mentioned to encrypt to including the signature and with the associated electronic contract of the timestamp, guarantees electronics conjunction With online signing legal force.
Preferably, the predetermined encryption rule is based on CA technology secrecy rule.
Specifically, CA technology be an authoritative Third Party Authentication mechanism, be based on openssl be a multi-functional life Tool is enabled to realize signing and issuing for certificate.Specifically, the algorithm that opensll is provided includes: symmetric encipherment algorithm, rivest, shamir, adelman (DHA, RSA, EIGamal, DSA), message digest algorithm (MD5, SHA1, SHA512, CRC-32), key and certificate management. The CA application program that OpenSSL is provided is exactly a small-sized Certificate Authority (CA), realizes digital signature and signs and issues Whole flow process and certificate management most of mechanism.Electronic contract digital signature was signed and issued based on the realization of CA platform Cheng Zhong further includes one and implements and provide the security infrastructure with universality of security service with public key concept and technology PKI, a complete pki system should include following sections: visa mechanism (CA), registration body (RA), certificate access library (CB), certificate revocation list (CRL) etc..In application process of the present invention, certificate agency CA is the foundation of trust of PKI, it is managed The whole life cycle of public key, effect include: to provide certificate, the validity period of regulation certificate and by publication Certificate Revocation Lists (CRL) ensuring when necessary can be with revocation certificate.Registration body RA provides an interface between user and CA, it obtains and authenticates The identity of user proposes certificate request to CA.It mainly completes to collect user information and confirms the function of user identity.Certificate is deposited Library is taken to be responsible for the access of certificate, can be by user oneself, or pass through directory service.LIST SERVER can be a tissue In it is existing, be also possible to provide in PKI scheme.Certificate revocation list (Certificate revocation lists, again Certificate blacklist) it is referred to as that application program and other systems provide a kind of mode of inspection certificate validity.Any one certificate After abolishment, certificate agency CA can be notified by way of issuing CRL each related side (as associated of the present invention terminal, Lessor, tenantry).
Specifically, registration body is the terminal for carrying out realizing that electronic contract signs process in the present invention in implementation process (house lease app) provides an interface between user and CA, it obtains and authenticate the identity of user, proposes to demonstrate,prove to CA Book request.Further, first is filed a request by terminal, and the public key of oneself and some information are submitted to ca authentication, by CA After certification passes through, the certificate comprising first essential information and first public key can be issued to first.In order to guarantee the safety of electronic contract Property, the communication between second and first is secure communication, and therefore, first can issue the certificate of oneself second, and second can first be gone in the same CA Check whether the certificate of first is correct effectively, if inquiry is out of question, second can be securely communicated normally with first.Specifically such as exist When electronic contract being staggeredly sent to tenantry and lessor, a contract documents are issued other side second by terminal by first, Entire transmission process is as follows for first: 1. creation symmetric keys (corresponding software generates, and is disposable) are encrypted with it Contract, and symmetric key is packaged with the public key of second.2. creating digital signature, hashing algorithm (such as MD5 algorithm) is carried out simultaneously to contract Generate original digest, the first private key encryption of oneself abstract (public/private key pair oneself can both be created or be provided by CA).3. most Afterwards, first (is signed the digital certificate of key, encrypted abstract and first after encrypted contract, packing by authoritative institution CA Hair) second is issued together.And after second receives encryption file, it needs to complete following act: after 1. receive, decrypting to obtain with the private key of second Symmetric key, and the contract of encryption is unlocked with symmetric key, obtain contract in plain text.2. the digital certificate acquisition by first belongs to first Public key, and unlock abstract (referred to as make a summary 1) with it.3. the contract after pair decryption is come using hashing algorithm same with sender Creation abstract (referred to as abstract 2).4. comparing abstract 1 and abstract 2, if they are the same, then it represents that information is not tampered with, and from first.
Further, in a kind of wherein embodiment, as shown in Fig. 2, that will include the electronics conjunction at signature authentication interface It is same to be sent among target user end, which comprises
S110: it receives target user end and acquires the user images including target signature in real time, and obtain and closed with the electronics With the associated associated images of middle user information;
S120: it will be carried out pair from the target signature in the target signature extracted in the associated images and the user images Than determining whether the user in the associated images and the user images is same user;
S130: when being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
In order to guarantee that the law on-line signing of the electronic contract of signature has message, it is therefore desirable to ensure to sign electronics and close Same people artificial same people corresponding with user information on electronic contract.Specifically, including the signature being sent to user Before the electronic contract of authentication interface, receives target user end and acquire the user images including target signature, i.e. face in real time Image includes the five features (profile and size of eyes, nose, mouth, ear, face etc.) of user in image, obtain with The associated associated images of user information in the electronic contract, wherein user information is the official's letter that can prove that user identity Breath has electronic data in official such as the facial image on user identity card.Therefore, it extracts in user images and associated images Target signature compare, i.e., the features such as the profile of eyes, nose, mouth, ear, face etc. and size are passed through into recognition of face Algorithm compares, and determines the user of signature electronic contract and whether the corresponding user of identity information is same people.Specific mistake Cheng Ru, extracting target signature method can the face identification method by geometrical characteristic, the recognition of face side based on eigenface (PCA) The recognition of face side of method, the face identification method based on eigenface LBP, the face identification method of neural network, elastic graph matching Method etc..Such as the face identification method process based on eigenface LBP is as follows, carries out gray processing processing to image, is then mentioned by LBP Take target signature in face, obtain include target signature face figure, avoid in image other as the comparison of two images of interference. The facial image including target signature obtained after LBP is handled is subjected to ULBP dimension-reduction treatment, by the figure after dimension-reduction treatment Each grid is generated into histogram as being divided into multiple grids, and on this basis, histogram and target signature are linked, So that the feature vector of target signature gathers together, the histogram of same characteristic features in two images is compared, When the histogram height of same target signature is identical with size, then it can determine that as same user, and then ensure that user signs online Legal effect about.When being determined as same user, then the institute including the signature authentication interface is sent to the app program of terminal Electronic contract is stated, in order to which user signs on the signature authentication interface, realizes process as previously described.
Further, it is described the signed electronic contract is encrypted by predetermined encryption rule after, it is described Method includes:
Critical field in the electronic contract is extracted, by the critical field and the user images in a manner of associated Storage.
When needing using the electronic contract, is called in order to enable the electronic contract is easy matching, therefore, extract the electricity Critical field in sub- contract stores the critical field and the user images in a manner of associated.It guarantees that electronics closes Same confidentiality, safety and authenticity inquires or calls the electronic contract or relevant with electronic contract convenient for the later period Information, while the electronic contract saves in the form of data, is also less prone to the case where leading to damage due to the factor of environment.It closes Key field includes the key message (subscriber identity information) filled in, contract number, abstract (such as Hash volume generated with predetermined manner One or more of code) etc., it is government or other authorization machines based on being arranged in terminal when the later period inquires or calls The mating interface of structure access, so that one or more of government or other authorized organizations input critical field inquiry or tune With the electronic contract or with the associated information of electronic contract, convenient for put on record with government department or other authorized organizations or its Its shared docking.
Further, before the electronic contract including signature authentication interface being sent to target user end, the method packet It includes:
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
Further, after receiving the signing that the first user terminal issues and inviting instruction, the method also includes:
The electronic contract comprising first user information is sent to the first user terminal.
When user is tenantry, when tenantry sees the suitable source of houses at the terminal, tenantry determines current house With oneself ideal source of houses it is close or identical when, then issue signing to the lessor for issuing the information of renting a house on app and invite, with Determine whether the source of houses has a mind to hire out the source of houses to tenantry also in the state of renting a house or lessor.Tenantry is in terminal Signing is triggered on interface and invites control, if user clicks a certain virtual key at the terminal, when user clicks completion, is generated to out Rent side, which issues to contract, invites instruction, which invites title, identification card number, telephone number etc. in instruction including tenantry, because This, after user clicks a certain virtual key at the terminal, needs to be generated to electronics to its displaying in the terminal of tenantry first and closes Tenantry's information in, it is identical as user information above, in order to receive the signing in lessor it is invited to that electronics is taken to close When with template, tenantry's information can be directly appended in electronic contract, while tenantry also can confirm that whether the information is correct, When incorrect, tenantry modifies its information at the terminal.Specifically, pop-up includes holding when tenantry issues signing and invites The interface of rent side's essential information, tenantry check or fill on the surface the essential information of tenantry, and true in tenantry Essential information is determined without mistaking, and tenantry clicks determination on interface, after terminal is determined based on user's click, at this time just to lessor Issue signing invitation notification.Wherein, in inviting instruction, the essential information including contract invitation notification and tenantry.Signing is invited It please notify according to preset template generation, if template is " * * * issues signing invitation notification to you ", wherein " * * * " is tenantry Title, which extracts from the user name of tenantry's register account number.After lessor receives signing invitation notification, The notice interface is popped up at the interface of lessor, after user clicks the determination virtual key for receiving signing invitation on the surface, It generates and receives signing and invite instruction, include obtaining preset electronic contract template from database in the instruction, and in electronic contract Have been added the information of tenantry and lessor.
Further, after receiving the second user end and receiving the instruction of the invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes institute State the first user information.
Further, in the pass for receiving the generation electronic contract that second user is filled at the second user end After key information, which comprises
Sent to the first user terminal include the key message the electronic contract, in order to which the first user is described the The modification instruction of the electronic contract is modified in the triggering of one user terminal;
The modification instruction that first user terminal is sent is received, sends repairing for the electronic contract to second user end Change notice, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modification The electronic contract afterwards.
After getting electronic contract template, show to include needing to fill in electronic contract key message to lessor one by one User Interface, i.e., the same User Interface can only be filled in category information, and such as moving in time surface can only fill in or select to move in The range of lease time can only be filled in or be selected to time, lease time range, other supplementary provisions, rent pay the behaviour such as information It is identical to make method.It wherein needs at the reserved location of fill message to be interrelated in key message interface and electronic contract template And it is one-to-one.After filling the key message for generating electronic contract in lessor, terminal receives lessor and selects the generation filled out The key message of electronic contract generates electronic contract mould to bring key message at the corresponding position of electronic contract template into Plate, wherein key message includes user information, i.e. tenantry's information and lessor's information.Not bad key message is filled out in lessor's choosing Afterwards, in conjunction with aforementioned tenantry's information, corresponding electronic contract is generated, which is saved and sends the electronics to tenantry Contract, in order to tenantry browse check the electronic contract, determine whether do not met in the electronic contract legal provisions and/or To oneself lossy clause project.If tenantry, which determines to exist in the electronic contract, does not meet legal provisions and/or to oneself When lossy clause project, tenantry clicks modification on the interface of terminal, and tenantry fills in unsatisfied in terminal interface Clause and/or project generate the modification instruction for being sent to lessor, wherein include in the instruction after tenantry clicks modification The unsatisfied clause of tenantry and/or project and the amendment advice for sending it to lessor.Receive what lessor filled in The key message of electronic contract modification, generates modified electronic contract.After lessor receives the amendment advice, at the terminal The key message of relevant provision and/or project is modified, modification process is identical with the operation for filling in key message, and modification is completed Afterwards, the determining virtual key of point solution on lessor's terminal interface, to enable the terminals to obtain and receive the modified key message, Modified electronic contract is equally generated based on the identical process of aforementioned generation electronic contract.To guarantee the clause in electronic contract It is fair, between reduction lease later period tenantry and lessor contradiction to lessor and tenantry with project.It needs Illustrate, aforementioned tenantry and lessor can exchange, and when lessor confirms that tenantry is suitble to the source of houses of oneself, hire out direction Tenantry issue signing invitation notification, subsequent process with charter direction rent a house sending contract invitation notification it is identical, being only that will be former Tenantry is converted into lessor, and former lessor is converted to tenantry, in order to which lessor selects suitable tenantry.
Furthermore it is also possible to establish the option of the corresponding modification key message of credit grade of tenantry, lessor.Citing: The low tenantry of credit grade, it is desirable that pre-pay 4 months cash pledges, the high tenantry of credit grade can pre-pay 1 month cash pledge.Into One step, credit grade, evaluation or the similar information of other side can be shown to tenantry, lessor, repaired for tenantry, lessor It is referred to when changing.But these information are simultaneously not written into contract.For example, showing the nearest evaluation in 3 years of tenantry to lessor, make Tenantry voluntarily assesses modification content.
A kind of electronic contract signature device provided in the embodiment of the present invention, in a kind of wherein embodiment, such as Fig. 3 institute Show, comprising:
Signature authentication interface sending module 100, for by include signature authentication interface electronic contract be sent to target use Family end;
Electronic contract generation module 200 is directed to the signature that the signature authentication interface issues for receiving target user end Information and signature timestamp;
Relating module 300, for generating signed electricity according to the signing messages, signature timestamp and the electronic contract Sub- contract;
Encrypting module 400, for being encrypted by predetermined encryption rule to the signed electronic contract.
Further, it is also wrapped continuing with a kind of device of electronic contract signature referring to Fig. 3, provided in the embodiment of the present invention It includes:
Acquisition unit 110 acquires the user images including target signature for receiving target user end in real time, and obtain with The associated associated images of user information in the electronic contract;Target's feature-extraction unit 120, being used for will be from the associated diagram The target signature extracted as in is compared with the target signature in the user images, determines the associated images and the use Whether the user in the image of family is same user;Signature authentication interface transmission unit 130, for when being determined as same user, Electronic contract including signature authentication interface is sent to target user end.Critical field extraction module 420, it is described for extracting Critical field in electronic contract stores the critical field and the user images in a manner of associated.Signing is invited logical Know sending module 101, instruction is invited in the signing for receiving the sending of the first user terminal, is invited to the sending signing of second user end logical Know;Contract template obtains module 102, and the instruction of the invitation notification is received for receiving the second user end, obtains electronics Contract template.Display module 103 sends the electronic contract comprising first user information for the first user terminal.Key letter Receiving module 104 is ceased, for receiving the crucial letter for the generation electronic contract that second user is filled at the second user end Breath;First electronic contract generation module 105, for according to electronics described in the key message and the electronic contract template generation Contract, the key message include first user information.Electronic contract display module 106 is sent for the first user terminal The electronic contract comprising the key message, in order to which the first user modifies the electronics in first user terminal triggering The modification of contract instructs;Amendment advice sending module 107, the modification instruction sent for receiving first user terminal, The amendment advice of the electronic contract is sent to second user end, so that second user is based on the amendment advice and modifies the electricity Sub- contract;Second electronic contract generation module 108, the electronics filled in for receiving second user at the second user end The key message of change to the contract generates the modified electronic contract.
The side of above-mentioned electronic contract signature may be implemented in a kind of device of electronic contract signature provided in an embodiment of the present invention The embodiment of method, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.
A kind of computer readable storage medium provided in an embodiment of the present invention stores on the computer readable storage medium There is computer program, the method for electronic contract signature described in any one technical solution is realized when which is executed by processor. Wherein, the computer readable storage medium includes but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD- ROM and magneto-optic disk), ROM (Read-Only Memory, read-only memory), RAM (Random AcceSS Memory, immediately Memory), EPROM (EraSable Programmable Read-Only Memory, Erarable Programmable Read only Memory), (Electrically EraSable Programmable Read-Only Memory, electric erazable programmable is read-only to be deposited EEPROM Reservoir), flash memory, magnetic card or light card.It is, storage equipment includes by equipment (for example, computer, mobile phone) with energy Any medium for the form storage or transmission information enough read can be read-only memory, disk or CD etc..
A kind of computer readable storage medium provided in an embodiment of the present invention, in the base for guaranteeing online signing legal force On plinth, the embodiment of above-mentioned electronic contract signature is realized, house lease field is introduced into, formed house lease on line and close Ring breaks the limitation in traditional contract signing model of renting a house to lease both sides' time, space;By the electricity including signature authentication interface Sub- contract is sent to target user end;It receives target user end and is directed to signing messages and signature that the signature authentication interface issues Timestamp;Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;Added by default Close rule encrypts the signed electronic contract.In the embodiment of offer of the invention, in tenantry and lessor Determine that the content in Current electronic contract without mistaking, sends the electronic contract including signature authentication interface to both sides, i.e., The electronic contract including signature authentication interface is sent, to tenantry and lessor in order to which user is in the label of electronic contract It signs in name authentication interface, while user can also check whether the clause in electronic contract meets the requirements.Certainly it is sending out It send including including tenantry and lessor's essential information, room before the electronic contract on signature authentication interface, in electronic contract Room information and lease treaty etc..The information is filled on terminal interface by lessor and/or tenantry, and terminal will fill out In the contract of lease of property for the information addition write.For the ease of user's signature and increase the validity signed, user is avoided to sign When triggered activity interface other control instructions, terminal first to user send electron underwriting authentication interface, to enable a customer to It signs on the surface, after user signs in authentication interface before this, by the corresponding position of signature addition electronic contract Set place.After guaranteeing that the tamper-resistance properties of electronic contract, user complete signature on digital certificate interface, obtain and the electronics The associated timestamp of contract, the timestamp and the electronic contract are associated.On the basis of joined timestamp, It is encrypted by predetermined encryption rule to including the signature and with the associated electronic contract of the timestamp, to ensure electronic contract Online signing legal effect.There are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.By preceding The encryption rule stated is realized to be encrypted to including the signature and with the associated electronic contract of the timestamp, guarantees that electronic contract exists Line signing legal force.
The method of above-mentioned electronic contract signature may be implemented in computer readable storage medium provided in an embodiment of the present invention Embodiment, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.
In addition, the present invention also provides a kind of servers, as shown in figure 4, the server process in another embodiment The devices such as device 503, memory 505, input unit 507 and display unit 509.It will be understood by those skilled in the art that Fig. 4 shows Structure devices out do not constitute the restriction to Servers-all, may include than illustrating more or fewer components or group Close certain components.Memory 505 can be used for storing application program 501 and each functional module, and the operation of processor 503 is stored in The application program 501 of reservoir 505, thereby executing the various function application and data processing of equipment.Memory 505 can be interior Memory or external memory, or including both built-in storage and external memory.Built-in storage may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash Device or random access memory.External memory may include hard disk, floppy disk, ZIP disk, USB flash disk, tape etc..It is disclosed in this invention to deposit Reservoir includes but is not limited to the memory of these types.Memory 505 disclosed in this invention is only used as example rather than as limit It is fixed.
Input unit 507 is used to receive the input of signal, and receives the key message of user's input with the signature of, user And the operational order of user's input.Input unit 507 may include touch panel and other input equipments.Touch panel can be received Collecting the touch operation of client on it or nearby, (for example client is being touched using any suitable object or attachment such as finger, stylus Control on panel or the operation near touch panel), and drive corresponding attachment device according to a pre-set procedure;It is other defeated Entering equipment can include but is not limited to physical keyboard, function key (such as broadcasting control button, switch key etc.), trace ball, mouse One of mark, operating stick etc. are a variety of.Display unit 509 can be used for showing the information of client's input or be supplied to the letter of client The various menus of breath and computer equipment.The forms such as liquid crystal display, Organic Light Emitting Diode can be used in display unit 509. Processor 503 is the control centre of computer equipment, using the various pieces of various interfaces and the entire computer of connection, is passed through Operation executes the software program and/or module being stored in memory 503, and calls the data being stored in memory, Perform various functions and handle data.One or more processors 503 shown in Fig. 4 are able to carry out, realize shown in Fig. 3 The function of signature authentication interface sending module 100, the function of relating module 300, adds the function of electronic contract generation module 200 The function of close module 400, the function of acquisition unit 110, the function of target's feature-extraction unit 120, signature authentication interface are sent Function, the function of critical field extraction module 420, the function for invitation notification sending module 101 of contracting, contract mould of unit 130 Plate obtains the function of module 102, the function of display module 103, the function of key message receiving module 104, the first electronic contract The function of generation module 105, the function of electronic contract display module 106, the function of amendment advice sending module 107, the second electricity The function of sub- contract generation module 108.
In one embodiment, the server includes one or more processors 503, and one or more storages Device 505, one or more application program 501, wherein one or more of application programs 501 are stored in memory 505 And be configured as being executed by one or more of processors 503, one or more of application programs 301 are configured to carry out Electronic contract described in above embodiments signs method.
A kind of server provided in an embodiment of the present invention realizes on the basis of guaranteeing online signing legal force The embodiment of above-mentioned electronic contract signature, is introduced into house lease field, forms house lease closed loop on line, break traditional rent To the limitation of lease both sides' time, space in room contract signing model;Electronic contract including signature authentication interface is sent to Target user end;Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;According to The signing messages, signature timestamp and the electronic contract generate signed electronic contract;By predetermined encryption rule to institute Signed electronic contract is stated to be encrypted.In the embodiment of offer of the invention, determined in tenantry and lessor current Content in electronic contract without mistaking, sent to both sides include signature authentication interface the electronic contract, i.e., to tenantry and Lessor sends the electronic contract including signature authentication interface, in order to which user is at the signature authentication interface of electronic contract On sign, while user can also check whether the clause in electronic contract meets the requirements.It certainly include signature sending Include before electronic contract in authentication interface, in electronic contract tenantry and lessor's essential information, houseclearing and Lease treaty etc..The information is filled on terminal interface by lessor and/or tenantry, and the information that terminal will fill in adds In the contract of lease of property added.For the ease of user's signature and increase the validity signed, avoids user's triggered activity in signature Other control instructions at interface, terminal sends electron underwriting authentication interface to user first, to enable a customer on the surface It signs, after user signs in authentication interface before this, at the corresponding position of signature addition electronic contract.In order to protect The tamper-resistance properties of electronic contract are demonstrate,proved, after user completes signature on digital certificate interface, are obtained associated with the electronic contract Timestamp, the timestamp and the electronic contract are associated.On the basis of joined timestamp, added by default Close rule is to including the signature and encrypt with the associated electronic contract of the timestamp, to ensure that electronic contract is contracted method online Restrain effect.There are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.It is advised by encryption above-mentioned It then realizes to including the signature and encrypted with the associated electronic contract of the timestamp, guarantees that electronic contract is contracted law online Validity.
The embodiment of the method for the electronic contract signature of above-mentioned offer may be implemented in server provided in an embodiment of the present invention, Concrete function realizes the explanation referred in embodiment of the method, and details are not described herein.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of electronic contract signs method, which comprises the following steps:
Electronic contract including signature authentication interface is sent to target user end;
Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;
Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
The signed electronic contract is encrypted by predetermined encryption rule.
2. electronic contract according to claim 1 signs method, which is characterized in that the predetermined encryption rule is based on CA Technology secrecy rule.
3. electronic contract according to claim 1 signs method, which is characterized in that it is described will include signature authentication interface Electronic contract be sent among target user end, comprising:
It receives target user end and acquires the user images including target signature in real time, and obtain and believe with user in the electronic contract The associated associated images of manner of breathing;
It will be compared from the target signature extracted in the associated images and the target signature in the user images, determine institute Whether the user stated in associated images and the user images is same user;
When being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
4. electronic contract according to claim 3 signs method, which is characterized in that passing through predetermined encryption rule to described After signed electronic contract is encrypted, which comprises
Critical field in the electronic contract is extracted, the critical field and the user images are deposited in a manner of associated Storage.
5. electronic contract according to claim 1 signs method, which is characterized in that will include the electricity at signature authentication interface Sub- contract is sent to before target user end, which comprises
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
6. electronic contract according to claim 5 signs method, which is characterized in that in the label for receiving the sending of the first user terminal After about inviting instruction, the method also includes:
The electronic contract comprising the first user information is sent to the first user terminal.
7. electronic contract according to claim 5 signs method, which is characterized in that receiving described in the reception of second user end After the instruction of invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes described One user information.
8. electronic contract according to claim 7 signs method, which is characterized in that receiving second user described second After the key message for the generation electronic contract that user terminal is filled in, which comprises
The electronic contract comprising the key message is sent to the first user terminal, in order to which the first user uses described first The modification instruction of the electronic contract is modified in the triggering of family end;
The modification instruction that first user terminal is sent is received, the modification for sending the electronic contract to second user end is logical Know, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modified The electronic contract.
9. a kind of electronic contract signs device characterized by comprising
Signature authentication interface sending module, for will include that the electronic contract at signature authentication interface is sent to target user end;
Electronic contract generation module is directed to the signing messages and label that the signature authentication interface issues for receiving target user end Name timestamp;
Relating module, for generating signed electronic contract according to the signing messages, signature timestamp and the electronic contract;
Encrypting module, for being encrypted by predetermined encryption rule to the signed electronic contract.
10. a kind of server characterized by comprising
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and are configured To be executed by one or more of processors, one or more of application programs are configured to carry out according to any one right It is required that electronic contract described in 1 to 8 signs the step of method.
CN201810618349.XA 2018-06-15 2018-06-15 Electronic contract signs method, apparatus and server Pending CN109087056A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810618349.XA CN109087056A (en) 2018-06-15 2018-06-15 Electronic contract signs method, apparatus and server
PCT/CN2018/108059 WO2019237570A1 (en) 2018-06-15 2018-09-27 Electronic contract signing method, device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810618349.XA CN109087056A (en) 2018-06-15 2018-06-15 Electronic contract signs method, apparatus and server

Publications (1)

Publication Number Publication Date
CN109087056A true CN109087056A (en) 2018-12-25

Family

ID=64839741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810618349.XA Pending CN109087056A (en) 2018-06-15 2018-06-15 Electronic contract signs method, apparatus and server

Country Status (2)

Country Link
CN (1) CN109087056A (en)
WO (1) WO2019237570A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754267A (en) * 2018-12-29 2019-05-14 百度在线网络技术(北京)有限公司 Brand authorization method, device, equipment and medium based on block chain
CN109784005A (en) * 2018-12-28 2019-05-21 国网雄安金融科技有限公司 Electronic protocol manages platform and electronic protocol management method
CN109960919A (en) * 2019-03-25 2019-07-02 深圳市元征科技股份有限公司 A kind of contract signature method and block chain node device
CN110221864A (en) * 2019-04-24 2019-09-10 深圳法大大网络科技有限公司 Electronic document signs method, apparatus and terminal device, storage medium
CN110598460A (en) * 2019-09-27 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based electronic signature method and device and storage medium
CN110677259A (en) * 2019-09-29 2020-01-10 杭州尚尚签网络科技有限公司 Full-link real-time notarization system and method for electronic contract
CN110879835A (en) * 2019-11-29 2020-03-13 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain and readable storage medium
CN111242579A (en) * 2020-01-14 2020-06-05 珠海市华兴软件信息服务有限公司 Electronic contract signing method, system, device and storage medium
JP2020107081A (en) * 2018-12-27 2020-07-09 有限会社建物管理保証 Contract management server
CN111756787A (en) * 2019-11-15 2020-10-09 北京京东尚科信息技术有限公司 Online signature method and device, electronic equipment and computer readable storage medium
CN112118105A (en) * 2019-06-19 2020-12-22 深圳法大大网络科技有限公司 Electronic file signature method and device and terminal equipment
CN112529508A (en) * 2020-12-23 2021-03-19 杭州电子科技大学 Electric power material management system based on PBFT alliance chain
CN113191836A (en) * 2021-03-24 2021-07-30 特斯联科技集团有限公司 Community tenant management method and system based on user habit analysis
CN113313540A (en) * 2021-08-02 2021-08-27 云账户技术(天津)有限公司 Contract generation method and device, electronic equipment and readable storage medium
CN114038130A (en) * 2021-11-06 2022-02-11 深圳市智物科技有限公司 Method for realizing remote room prepayment
CN114792270A (en) * 2022-06-27 2022-07-26 浙江数秦科技有限公司 Loan contract online signing system based on block chain

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023128908A1 (en) * 2021-12-30 2023-07-06 Cloudpeer Global Teknoloji A. S. A mobile electronic signature system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1722165A (en) * 2004-07-12 2006-01-18 刘正荣 Communication system and method
CN101034450A (en) * 2007-04-06 2007-09-12 刘明晶 Electronic contract automatic settlement method
CN107527215A (en) * 2017-09-28 2017-12-29 山西特信环宇信息技术有限公司 A kind of electronic contract system and operating method based on biological identification technology
CN107844946A (en) * 2017-06-19 2018-03-27 深圳法大大网络科技有限公司 A kind of method, apparatus and server of electronic contract signature
CN108092779A (en) * 2018-01-05 2018-05-29 北京汇通金财信息科技有限公司 A kind of method and device for realizing electronic signature

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960165B (en) * 2017-03-13 2020-12-22 广东网金控股股份有限公司 Method for realizing multi-party electronic contract countersigning based on block chain intelligent contract

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1722165A (en) * 2004-07-12 2006-01-18 刘正荣 Communication system and method
CN101034450A (en) * 2007-04-06 2007-09-12 刘明晶 Electronic contract automatic settlement method
CN107844946A (en) * 2017-06-19 2018-03-27 深圳法大大网络科技有限公司 A kind of method, apparatus and server of electronic contract signature
CN107527215A (en) * 2017-09-28 2017-12-29 山西特信环宇信息技术有限公司 A kind of electronic contract system and operating method based on biological identification technology
CN108092779A (en) * 2018-01-05 2018-05-29 北京汇通金财信息科技有限公司 A kind of method and device for realizing electronic signature

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7299598B2 (en) 2018-12-27 2023-06-28 有限会社建物管理保証 Contract management server
JP2020107081A (en) * 2018-12-27 2020-07-09 有限会社建物管理保証 Contract management server
CN109784005A (en) * 2018-12-28 2019-05-21 国网雄安金融科技有限公司 Electronic protocol manages platform and electronic protocol management method
CN109754267A (en) * 2018-12-29 2019-05-14 百度在线网络技术(北京)有限公司 Brand authorization method, device, equipment and medium based on block chain
CN109960919A (en) * 2019-03-25 2019-07-02 深圳市元征科技股份有限公司 A kind of contract signature method and block chain node device
CN109960919B (en) * 2019-03-25 2023-02-28 深圳市元征科技股份有限公司 Contract signing method and block link point equipment
CN110221864A (en) * 2019-04-24 2019-09-10 深圳法大大网络科技有限公司 Electronic document signs method, apparatus and terminal device, storage medium
CN112118105A (en) * 2019-06-19 2020-12-22 深圳法大大网络科技有限公司 Electronic file signature method and device and terminal equipment
CN112118105B (en) * 2019-06-19 2024-03-01 深圳法大大网络科技有限公司 Electronic file signing method and device and terminal equipment
CN110598460A (en) * 2019-09-27 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based electronic signature method and device and storage medium
CN110677259A (en) * 2019-09-29 2020-01-10 杭州尚尚签网络科技有限公司 Full-link real-time notarization system and method for electronic contract
CN110677259B (en) * 2019-09-29 2022-03-15 杭州尚尚签网络科技有限公司 Full-link real-time notarization system and method for electronic contract
CN111756787A (en) * 2019-11-15 2020-10-09 北京京东尚科信息技术有限公司 Online signature method and device, electronic equipment and computer readable storage medium
CN110879835B (en) * 2019-11-29 2024-02-09 腾讯科技(深圳)有限公司 Block chain-based data processing method, device, equipment and readable storage medium
CN110879835A (en) * 2019-11-29 2020-03-13 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain and readable storage medium
CN111242579A (en) * 2020-01-14 2020-06-05 珠海市华兴软件信息服务有限公司 Electronic contract signing method, system, device and storage medium
CN112529508A (en) * 2020-12-23 2021-03-19 杭州电子科技大学 Electric power material management system based on PBFT alliance chain
CN113191836A (en) * 2021-03-24 2021-07-30 特斯联科技集团有限公司 Community tenant management method and system based on user habit analysis
CN113313540A (en) * 2021-08-02 2021-08-27 云账户技术(天津)有限公司 Contract generation method and device, electronic equipment and readable storage medium
CN113313540B (en) * 2021-08-02 2021-09-28 云账户技术(天津)有限公司 Contract generation method and device, electronic equipment and readable storage medium
CN114038130A (en) * 2021-11-06 2022-02-11 深圳市智物科技有限公司 Method for realizing remote room prepayment
CN114792270A (en) * 2022-06-27 2022-07-26 浙江数秦科技有限公司 Loan contract online signing system based on block chain

Also Published As

Publication number Publication date
WO2019237570A1 (en) 2019-12-19

Similar Documents

Publication Publication Date Title
CN109087056A (en) Electronic contract signs method, apparatus and server
AU2021203184B2 (en) Transaction messaging
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
US8543091B2 (en) Secure short message service (SMS) communications
CN1689297B (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CN111787530B (en) Block chain digital identity management method based on SIM card
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
US20100205431A1 (en) System, method and program product for checking revocation status of a biometric reference template
CN104320251B (en) A kind of offline seal information device, electronic signature management system and authentication method for using on-line authentication
JP2005328574A (en) Cryptographic system and method with key escrow feature
CN105103488A (en) Policy enforcement with associated data
CN107579828A (en) Safety certification device and method in machine-to-machine communication between the device based on PUF
CN105191207A (en) Federated key management
CN105991650B (en) A kind of transmission method and system of ID card information
CN106789024B (en) A kind of remote de-locking method, device and system
CN109729046A (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
CN101652782B (en) Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
KR100870202B1 (en) Method and system of issuing accredited certificate using encrypted image
Griffin Telebiometric authentication objects
US8176330B2 (en) Method, apparatus and article for off-line certification in mobile applications
CN108833431A (en) A kind of method, apparatus, equipment and the storage medium of password resetting
WO2020042508A1 (en) Method, system and electronic device for processing claim incident based on blockchain
US20120284787A1 (en) Personal Secured Access Devices
CN104462877B (en) A kind of digital resource acquisition method under copyright protection and system
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination