CN110232282A - A kind of fire-fighting checks the electronic signature method and system of table - Google Patents

A kind of fire-fighting checks the electronic signature method and system of table Download PDF

Info

Publication number
CN110232282A
CN110232282A CN201910419240.8A CN201910419240A CN110232282A CN 110232282 A CN110232282 A CN 110232282A CN 201910419240 A CN201910419240 A CN 201910419240A CN 110232282 A CN110232282 A CN 110232282A
Authority
CN
China
Prior art keywords
user
file
fire
authentication
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910419240.8A
Other languages
Chinese (zh)
Other versions
CN110232282B (en
Inventor
廖凯
黄捷
朱鹏飞
叶强华
张俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Clp Smart Security Polytron Technologies Inc
Original Assignee
Shenzhen Clp Smart Security Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Clp Smart Security Polytron Technologies Inc filed Critical Shenzhen Clp Smart Security Polytron Technologies Inc
Priority to CN201910419240.8A priority Critical patent/CN110232282B/en
Publication of CN110232282A publication Critical patent/CN110232282A/en
Application granted granted Critical
Publication of CN110232282B publication Critical patent/CN110232282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Automation & Control Theory (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention is suitable for security control technical field, provide the electronic signature method and system of a kind of fire-fighting inspection table, the described method includes: obtaining fire-fighting checks information, and check that information generates corresponding first formatted file according to fire-fighting, it obtains the signing messages of user and is sent to CA verification platform, obtain the second formatted file that CA verification platform is sent, and the first formatted file and the second formatted file are encrypted, generate encryption file, obtain inspection result, inspection result and encryption file are sent to CA verification platform, to obtain the Electronic Signature file of CA verification platform transmission and save.By being interacted between fire protection patrol user terminal and CA verification platform, specify that fire protection patrol user checks the fire-fighting in place the confirmation process of information and fire-fighting inspection result, the enthusiasm that fire protection patrol user is improved so that confirmation process has the effect of law and fire protection patrol user are to the degree of understanding of fire-fighting protection in fire protection patrol place.

Description

A kind of fire-fighting checks the electronic signature method and system of table
Technical field
The invention belongs to the electronic signature method of security control technical field more particularly to a kind of fire-fighting inspection table and it is System.
Background technique
Recently, although fire-fighting inspection table needs different types of fire protection patrol personnel to confirm fire-fighting inspection result jointly.But It is that there may be false informations for the above process.
Also, after people can not determine that fire protection patrol personnel confirm fire-fighting inspection result jointly, the inspection result whether by Change.
Therefore, current fire-fighting inspection table does not have legal effect.When dispute generates, fire-fighting inspection table cannot function as mentioning For the file information with legal effect to resolve a dispute.
Summary of the invention
In view of this, the embodiment of the invention provides electronic signature method and system that a kind of fire-fighting checks table, to solve Current fire-fighting inspection table does not have the problem of legal effect in the prior art.
The first aspect of the embodiment of the present invention provides a kind of electronic signature method of fire-fighting inspection table, comprising:
It obtains fire-fighting and checks information, and check that information generates corresponding first formatted file according to the fire-fighting;
The signing messages of user is obtained, and is sent to CA verification platform, obtains the second lattice that the CA verification platform is sent Formula file;Wherein, the user includes the first user and second user;
First formatted file and second formatted file are encrypted, encryption file is generated;
Inspection result is obtained, the inspection result and the encryption file are sent to the CA verification platform, to obtain The Electronic Signature file of the CA verification platform transmission simultaneously saves.
Optionally, the acquisition fire-fighting checks information, and checks that information generates corresponding first format according to the fire-fighting Before file, further includes:
If receiving registration request, the identity information of the user is obtained, and sends the identity information to the CA Verification platform, to obtain the verification result that the CA verification platform is sent;Wherein, the identity information include ID card No., At least two in identity document photograph, name, fingerprint, image data or audio data;
If the verification result is that certification passes through, the user registration success is determined.
Optionally, the signing messages of the user is obtained, and is sent to CA verification platform, obtains the CA verification platform hair The second formatted file sent, comprising:
It obtains the identity information of the user and is sent to the CA verification platform, to obtain the CA verification platform to institute State the file to be signed sent after identity information is verified;
According to the signing messages of user described in the file acquisition to be signed, and it is sent to the CA verification platform, to obtain The second formatted file for taking the CA verification platform to be generated according to the file to be signed and the signing messages.
Optionally, the method, further includes:
If receiving Electronic Signature certification request, the identity information of user is obtained;
Authentication is carried out according to the identity information, obtains authentication result;Wherein, the user includes the first use Family and second user;
If the authentication result is that certification passes through, file to be signed is sent to user terminal, to obtain the use The signing messages and the file to be signed for the user that family terminal is sent;
According to the signing messages of the user and second format file of file generated to be signed, and it is sent to the use Family terminal;
Encrypted document and inspection result are obtained, Electronic Signature is carried out according to the encrypted document and inspection result, generates electricity Sub- stamped signature file cocurrent is sent to the user terminal.
Optionally, authentication is carried out according to the identity information, obtains authentication result, comprising:
It initiates to carry out first user to public security bureau's identity authentication platform according to the identity information of first user Authentication obtains the first authentication result;
It initiates to carry out the second user to public security bureau's identity authentication platform according to the identity information of the second user Authentication obtains the second authentication result;
If the first authentication result and the second authentication result are that certification passes through, the body is determined Part verification result is that certification passes through;
If the first authentication result and/or the second authentication result are authentification failure, determine described in Identity authentication result is authentification failure.
The second aspect of the embodiment of the present invention provides a kind of Electronic Seal System of fire-fighting inspection table comprising user is whole End and ca authentication platform, the user terminal include:
First obtains module, checks information for obtaining fire-fighting, and check that information generates corresponding the according to the fire-fighting One formatted file;
Second obtains module, for obtaining the signing messages of user, and is sent to CA verification platform, obtains the CA verifying The second formatted file that platform is sent;Wherein, the user includes the first user and second user;
Encrypting module generates encryption text for encrypting first formatted file and second formatted file Part;
Third obtains module, for obtaining inspection result, the inspection result and the encryption file is sent to described CA verification platform, to obtain the Electronic Signature file of the CA verification platform transmission and save.
Optionally, the user terminal, further includes:
4th obtains module, if obtaining the identity information of the user, and described in transmission for receiving registration request Identity information is to the CA verification platform, to obtain the verification result that the CA verification platform is sent;Wherein, the identity information Including at least two in ID card No., identity document photograph, name, fingerprint, image data or audio data;
Determination module determines the user registration success if being that certification passes through for the verification result.
Optionally, described second module is obtained, comprising:
First acquisition unit, for obtaining the identity information of the user and being sent to the CA verification platform, to obtain The file to be signed that the CA verification platform is sent after being verified to the identity information;
First transmission unit for the signing messages of the user according to the file acquisition to be signed, and is sent to institute CA verification platform is stated, to obtain the second lattice that the CA verification platform is generated according to the file to be signed and the signing messages Formula file.
Optionally, the CA verification platform, comprising:
Receiving module, if obtaining the identity information of user for receiving Electronic Signature certification request;
Authentication module obtains authentication result for carrying out authentication according to the identity information;Wherein, described User includes the first user and second user;
Sending module sends file to be signed to user terminal if being that certification passes through for the authentication result, To obtain the signing messages and the file to be signed of the user that the user terminal is sent;
First generation module, for according to the signing messages of the user and second format of file generated to be signed text Shelves, and it is sent to the user terminal;
Second generation module, for obtaining encrypted document and inspection result, according to the encrypted document and inspection result into Row Electronic Signature generates Electronic Signature file cocurrent and send to the user terminal.
Optionally, the authentication module, comprising:
First authentication unit, for being initiated pair according to the identity information of first user to public security bureau's identity authentication platform First user carries out authentication, obtains the first authentication result;
Second authentication unit, for being initiated pair according to the identity information of the second user to public security bureau's identity authentication platform The second user carries out authentication, obtains the second authentication result;
First judging unit, if being certification for the first authentication result and the second authentication result Pass through, then determines that the authentication result passes through for certification;
Second judging unit, if being to recognize for the first authentication result and/or the second authentication result Card failure, then determine the identity authentication result for authentification failure.
The third aspect of the embodiment of the present invention provides a kind of terminal device, comprising: memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program It realizes such as the step of the above method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, realizes when the computer program is executed by processor such as the step of the above method.
The embodiment of the present invention specifies that fire-fighting is patrolled by interacting between fire protection patrol user terminal and CA verification platform The confirmation process that user checks the fire-fighting in place information and fire-fighting inspection result is examined, so that confirmation process has the effect of law Power improves the understanding of the enthusiasm and fire protection patrol user of fire protection patrol user to fire-fighting protection in fire protection patrol place Degree.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the flow diagram of the electronic signature method for the fire-fighting inspection table that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of the electronic signature method of fire-fighting inspection table provided by Embodiment 2 of the present invention;
Fig. 3 is the structural schematic diagram of the Electronic Seal System for the fire-fighting inspection table that the embodiment of the present invention three provides;
Fig. 4 is the structural schematic diagram of the Electronic Seal System for the fire-fighting inspection table that the embodiment of the present invention four provides;
Fig. 5 is the schematic diagram for the terminal device that the embodiment of the present invention five provides.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical solution in the embodiment of the present invention are explicitly described, it is clear that described embodiment is the present invention one The embodiment divided, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, should fall within the scope of the present invention.
Description and claims of this specification and term " includes " and their any deformations in above-mentioned attached drawing, meaning Figure, which is to cover, non-exclusive includes.Such as process, method or system comprising a series of steps or units, product or equipment do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include the other step or units intrinsic for these process, methods, product or equipment.In addition, term " first ", " second " and " third " etc. is for distinguishing different objects, not for description particular order.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Embodiment one
As shown in Figure 1, the present embodiment provides a kind of fire-fighting check table electronic signature method, this method can be applied to as The terminal devices such as mobile phone, PC, tablet computer.The electronic signature method of the inspection table of fire-fighting provided by the present embodiment, comprising:
S101, fire-fighting inspection information is obtained, and checks that information generates corresponding first formatted file according to the fire-fighting.
In a particular application, the fire-fighting for obtaining user's input checks information, and checks that information generates according to the fire-fighting of input Corresponding first formatted file;Wherein, user includes the first user and second user;In the present embodiment, the first user and Two users may be set to other fire-fightings and patrol for the grid person of fire-fighting monitoring grid and operator or the first user and second user Examine user;Fire-fighting checks information includes but is not limited to that whether fire-fighting sensing equipment is intact, whether fire alarm system is intact and disappears Whether fire-prevention extinguishing agent is intact;First formatted file can specifically be set according to the actual situation, for example, the first formatted file of setting For file to be signed.
S102, the signing messages for obtaining user, and are sent to CA verification platform, obtain that the CA verification platform sends the Two formatted files;Wherein, the user includes the first user and second user.
In a particular application, the signing messages of user is obtained, and is sent to CA verification platform, CA verification platform is obtained and sends The second formatted file;Wherein, the signing messages of user includes but unlimited user's handwritten signature;Second formatted file can be according to reality Border situation is specifically set;For example, setting the second formatted file as the handwritten signature picture of grid person and operator.Certificate is issued The mechanism that hair mechanism (CA, Certificate Authority) issues digital certificate, is responsible for distribution & management digital certificate Authoritative institution, and as third party trusted in e-commerce transaction, the legitimacy for undertaking public key in Public Key Infrastructure is examined Responsibility.
S103, first formatted file and second formatted file are encrypted, generates encryption file.
In a particular application, the first formatted file and the second formatted file are encrypted according to predetermined encryption algorithm, shape At encryption file.Predetermined encryption algorithm can specifically be set according to the actual situation, for example, being set as aes algorithm (Advanced Encryption Standard), Advanced Encryption Standardalgorithm or MD5 algorithm.
S104, inspection result is obtained, the inspection result and the encryption file is sent to the CA verification platform, with It obtains the Electronic Signature file that the CA verification platform is sent and saves.
In a particular application, obtain user's input checks the corresponding inspection result of information with fire-fighting, by inspection result with Above-mentioned encryption file is sent to CA verification platform (so that CA verification platform tests inspection result and above-mentioned encryption file together Card, after being verified, CA verification platform signs and issues Electronic Signature file) the Electronic Signature file that CA verification platform is sent is obtained, and It saves.
In one embodiment, the method, further includes:
If receiving registration request, the identity information of the user is obtained, and sends the identity information to the CA Verification platform, to obtain the verification result that the CA verification platform is sent;Wherein, the identity information include ID card No., At least two in identity document photograph, name, fingerprint, image data or audio data;
If the verification result is that certification passes through, the user registration success is determined.
In a particular application, if receiving the registration request of user, the identity information of user is obtained, sends the body of user Part information to CA verification platform (so that CA verification platform verifies the identity information of user) obtains the CA verification platform The verification result of transmission.Wherein, identity information includes but is not limited to ID card No., identity document photograph, name, fingerprint, image At least two in data or audio data.
In one embodiment, step S102, comprising:
It obtains the identity information of the user and is sent to the CA verification platform, to obtain the CA verification platform to institute State the file to be signed sent after identity information is verified;
According to the signing messages of user described in the file acquisition to be signed, and it is sent to the CA verification platform, to obtain The second formatted file for taking the CA verification platform to be generated according to the file to be signed and the signing messages.
In a particular application, it obtains the identity information of user and is sent to CA verification platform, to obtain CA verification platform pair The file to be signed that identity information is sent after being verified;According to the signing messages of file acquisition user to be signed, and it is sent to CA verification platform, to obtain the second formatted file that CA verification platform is generated according to file to be signed and signing messages.Wherein, may be used Setting the signature input frame in file page to be signed includes<signer's classification: grid person>and<signer's classification: operator> Mark so that corresponding grid person or operator signature.
The present embodiment specifies that fire protection patrol is used by interacting between fire protection patrol user terminal and CA verification platform Family checks the fire-fighting in place the confirmation process of information and fire-fighting inspection result, so that confirmation process has the effect of law, The enthusiasm for improving fire protection patrol user and fire protection patrol user are to the understanding journey of fire-fighting protection in fire protection patrol place Degree.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment two
As shown in Fig. 2, the present embodiment is the further explanation to the method and step in embodiment one.In the present embodiment, The electronic signature method of fire-fighting inspection table can be applied to such as CA verification platform terminal device.The fire-fighting checks the electronics of table Signature method, further includes:
If S201, receiving Electronic Signature certification request, the identity information of user is obtained.
In a particular application, if receiving the Electronic Signature certification request of user terminal transmission, the identity of user is obtained Information is verified with the identity information to user;Wherein, the identity information of user includes but is not limited to ID card No., body At least two in part certificate photo, name, fingerprint, image data or audio data, wherein user includes the first user and second User, in the present embodiment, the first user and second user are the grid person and operator of fire-fighting monitoring grid, alternatively, first User and second user may be set to other fire protection patrols user.
S202, authentication is carried out according to the identity information, obtains authentication result;Wherein, the user includes First user and second user.
In a particular application, authentication is carried out according to the identity information of user, obtains authentication result.Wherein, body Part verification result passes through including certification or authentification failure.
If S203, the authentication result are that certification passes through, file to be signed is sent to user terminal, to obtain State the signing messages and the file to be signed of the user of user terminal transmission.
In a particular application, if authentication result is that certification passes through, file to be signed is sent to user terminal, to obtain The signing messages and file to be signed for the user for taking user terminal to send.In the present embodiment, file to be signed can be set as First formatted file described in above-described embodiment one.In the present embodiment, it if authentication result is authentification failure, sends User identity authentication failure news is to user terminal.
S204, signing messages and second format file of file generated to be signed according to the user, and be sent to The user terminal.
In a particular application, it according to second format file of the signing messages of user and file generated to be signed, and is sent to User terminal.Wherein, the second format file can specifically be set according to the actual situation, for example, being set as grid person and operation The handwritten signature picture of people.
S205, encrypted document and inspection result are obtained, Electronic Signature is carried out according to the encrypted document and inspection result, it is raw It send at Electronic Signature file cocurrent to the user terminal.
In a particular application, encrypted document and inspection result that user terminal is sent are obtained, according to predetermined encryption algorithm pair Encrypted document is decrypted, and is verified, and after being verified, carries out Electronic Signature according to encrypted document and inspection result, raw It send at Electronic Signature file cocurrent to user terminal.Wherein, predetermined encryption algorithm can specifically be set according to the actual situation, In the present embodiment, setting predetermined encryption algorithm is identical as the predetermined encryption algorithm in above-described embodiment one.
In one embodiment, step S202, comprising:
It initiates to carry out first user to public security bureau's identity authentication platform according to the identity information of first user Authentication obtains the first authentication result;
It initiates to carry out the second user to public security bureau's identity authentication platform according to the identity information of the second user Authentication obtains the second authentication result;
If the first authentication result and the second authentication result are that certification passes through, the body is determined Part verification result is that certification passes through;
If the first authentication result and/or the second authentication result are authentification failure, determine described in Identity authentication result is authentification failure.
In a particular application, it is initiated to public security bureau's identity authentication platform to the first user according to the identity information of the first user Authentication is carried out, obtains the first authentication as a result, and flat to public security bureau's authentication according to the identity information of second user Platform initiates to carry out authentication to second user, obtains the second authentication result.If the first authentication result and the second body Part verification result is that certification passes through, then determines that authentication result passes through for certification.If the first authentication result or second In authentication result, any authentication result is authentification failure, then determines the identity authentication result of user for authentification failure. In one embodiment, the image data that the user of user terminal transmission can be obtained, by carrying out face to above-mentioned image data Identification, and the identity information of face recognition result and public security bureau put on record is compared, subscriber identity information is tested in realization Card.
The present embodiment specifies that fire protection patrol is used by interacting between fire protection patrol user terminal and CA verification platform Family checks the fire-fighting in place the confirmation process of information and fire-fighting inspection result, so that confirmation process has the effect of law, The enthusiasm for improving fire protection patrol user and fire protection patrol user are to the understanding journey of fire-fighting protection in fire protection patrol place Degree.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment three
As shown in figure 3, the present embodiment provides the Electronic Seal Systems 100 that a kind of fire-fighting checks table, for executing embodiment Method and step in one.Fire-fighting provided in this embodiment checks the Electronic Seal System 100 of table, including user terminal 111 and CA Authentication platform, the user terminal 111 include:
First obtains module 101, checks information for obtaining fire-fighting, and check that information generation is corresponding according to the fire-fighting First formatted file;
Second obtains module 102, for obtaining the signing messages of user, and is sent to CA verification platform, obtains the CA The second formatted file that verification platform is sent;Wherein, the user includes the first user and second user;
Encrypting module 103 generates encryption for encrypting first formatted file and second formatted file File;
Third obtains module 104, and for obtaining inspection result, the inspection result and the encryption file are sent to institute CA verification platform is stated, to obtain the Electronic Signature file of the CA verification platform transmission and save.
In one embodiment, the user terminal 111, further includes:
4th obtains module, if obtaining the identity information of the user, and described in transmission for receiving registration request Identity information is to the CA verification platform, to obtain the verification result that the CA verification platform is sent;Wherein, the identity information Including at least two in ID card No., identity document photograph, name, fingerprint, image data or audio data;
Determination module determines the user registration success if being that certification passes through for the verification result.
In one embodiment, described second module 102 is obtained, comprising:
First acquisition unit, for obtaining the identity information of the user and being sent to the CA verification platform, to obtain The file to be signed that the CA verification platform is sent after being verified to the identity information;
First transmission unit for the signing messages of the user according to the file acquisition to be signed, and is sent to institute CA verification platform is stated, to obtain the second lattice that the CA verification platform is generated according to the file to be signed and the signing messages Formula file.
The present embodiment specifies that fire protection patrol is used by interacting between fire protection patrol user terminal and CA verification platform Family checks the fire-fighting in place the confirmation process of information and fire-fighting inspection result, so that confirmation process has the effect of law, The enthusiasm for improving fire protection patrol user and fire protection patrol user are to the understanding journey of fire-fighting protection in fire protection patrol place Degree.
Example IV
As shown in figure 4, in the present embodiment, the Electronic Seal System 100 of the fire-fighting inspection table in example IV, including with Family terminal and ca authentication platform 112, the ca authentication platform 112 include the following knot for executing method and step in embodiment two Structure:
Receiving module 201, if obtaining the identity information of user for receiving Electronic Signature certification request;
Authentication module 202 obtains authentication result for carrying out authentication according to the identity information;Wherein, institute Stating user includes the first user and second user;
Sending module 203 sends file to be signed to user's end if being that certification passes through for the authentication result End, to obtain the signing messages and the file to be signed of the user that the user terminal is sent;
First generation module 204, for the signing messages and second lattice of file generated to be signed according to the user Formula document, and it is sent to the user terminal;
Second generation module 205, for obtaining encrypted document and inspection result, according to the encrypted document and inspection result Electronic Signature is carried out, Electronic Signature file cocurrent is generated and send to the user terminal.
In one embodiment, the authentication module 202, comprising:
First authentication unit, for being initiated pair according to the identity information of first user to public security bureau's identity authentication platform First user carries out authentication, obtains the first authentication result;
Second authentication unit, for being initiated pair according to the identity information of the second user to public security bureau's identity authentication platform The second user carries out authentication, obtains the second authentication result;
First judging unit, if being certification for the first authentication result and the second authentication result Pass through, then determines that the authentication result passes through for certification;
Second judging unit, if being to recognize for the first authentication result and/or the second authentication result Card failure, then determine the identity authentication result for authentification failure.
The present embodiment specifies that fire protection patrol is used by interacting between fire protection patrol user terminal and CA verification platform Family checks the fire-fighting in place the confirmation process of information and fire-fighting inspection result, so that confirmation process has the effect of law, The enthusiasm for improving fire protection patrol user and fire protection patrol user are to the understanding journey of fire-fighting protection in fire protection patrol place Degree.
Embodiment five
Fig. 5 is the schematic diagram of terminal device provided in this embodiment.As shown in figure 5, the terminal device 5 of the embodiment wraps It includes: processor 50, memory 51 and being stored in the computer that can be run in the memory 51 and on the processor 50 Program 52, such as fire-fighting check the Electronic Signature program of table.The processor 50 is realized when executing the computer program 52 State the step in the electronic signature method embodiment of each fire-fighting inspection table, such as step S101 to S104 shown in FIG. 1.Or Person, the processor 50 realize the function of each module/unit in above-mentioned each Installation practice when executing the computer program 52, Such as the function of module 101 to 104 shown in Fig. 3.
Illustratively, the computer program 52 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 51, and are executed by the processor 50, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 52 in the terminal device 5 is described.For example, the computer program 52 can be divided It is cut into the first acquisition module, the second acquisition module, encrypting module and third and obtains module, each for example above-mentioned implementation of module concrete function Described in example three, details are not described herein.
The terminal device 5 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5 The only example of terminal device 5 does not constitute the restriction to terminal device 5, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 51 can be the internal storage unit of the terminal device 5, such as the hard disk or interior of terminal device 5 It deposits.The memory 51 is also possible to the External memory equipment of the terminal device 5, such as be equipped on the terminal device 5 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), safe digital card (Secure Digital, SD) dodge Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the terminal device 5 Member also includes External memory equipment.The memory 51 is for storing needed for the computer program and the terminal device Other programs and data.The memory 51 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. the electronic signature method that a kind of fire-fighting checks table characterized by comprising
It obtains fire-fighting and checks information, and check that information generates corresponding first formatted file according to the fire-fighting;
The signing messages of user is obtained, and is sent to CA verification platform, obtains the second format text that the CA verification platform is sent Part;Wherein, the user includes the first user and second user;
First formatted file and second formatted file are encrypted, encryption file is generated;
Inspection result is obtained, the inspection result and the encryption file are sent to the CA verification platform, described in obtaining The Electronic Signature file of CA verification platform transmission simultaneously saves.
2. the electronic signature method that fire-fighting as described in claim 1 checks table, which is characterized in that the acquisition fire-fighting inspection letter Breath, and before checking that information generates corresponding first formatted file according to the fire-fighting, further includes:
If receiving registration request, the identity information of the user is obtained, and sends the identity information and verifies to the CA Platform, to obtain the verification result that the CA verification platform is sent;Wherein, the identity information includes ID card No., identity At least two in certificate photo, name, fingerprint, image data or audio data;
If the verification result is that certification passes through, the user registration success is determined.
3. the electronic signature method that fire-fighting as claimed in claim 2 checks table, which is characterized in that obtain the signature of the user Information, and it is sent to CA verification platform, obtain the second formatted file that the CA verification platform is sent, comprising:
It obtains the identity information of the user and is sent to the CA verification platform, to obtain the CA verification platform to the body The file to be signed that part Information Authentication is sent after passing through;
According to the signing messages of user described in the file acquisition to be signed, and it is sent to the CA verification platform, to obtain State the second formatted file that CA verification platform is generated according to the file to be signed and the signing messages.
4. the electronic signature method that fire-fighting according to claim 1 checks table, which is characterized in that the method, further includes:
If receiving Electronic Signature certification request, the identity information of user is obtained;
Authentication is carried out according to the identity information, obtains authentication result;Wherein, the user include the first user and Second user;
If the authentication result is that certification passes through, file to be signed is sent to user terminal, to obtain user's end Hold the signing messages and the file to be signed of the user sent;
According to the signing messages of the user and second format file of file generated to be signed, and it is whole to be sent to the user End;
Encrypted document and inspection result are obtained, Electronic Signature is carried out according to the encrypted document and inspection result, generates electronics label Chapter file cocurrent is sent to the user terminal.
5. the electronic signature method that fire-fighting as claimed in claim 4 checks table, which is characterized in that according to the identity information into Row authentication obtains authentication result, comprising:
It is initiated to carry out identity to first user to public security bureau's identity authentication platform according to the identity information of first user Verifying obtains the first authentication result;
It is initiated to carry out identity to the second user to public security bureau's identity authentication platform according to the identity information of the second user Verifying obtains the second authentication result;
If the first authentication result and the second authentication result are that certification passes through, determine that the identity is tested Card result is that certification passes through;
If the first authentication result and/or the second authentication result are authentification failure, the identity is determined Authentication result is authentification failure.
6. the Electronic Seal System that a kind of fire-fighting checks table, which is characterized in that it includes user terminal and ca authentication platform, described User terminal includes:
First obtains module, checks information for obtaining fire-fighting, and check that information generates corresponding first lattice according to the fire-fighting Formula file;
Second obtains module, for obtaining the signing messages of user, and is sent to CA verification platform, obtains the CA verification platform The second formatted file sent;Wherein, the user includes the first user and second user;
Encrypting module generates encryption file for encrypting first formatted file and second formatted file;
Third obtains module and the inspection result is sent to the CA with the encryption file and is tested for obtaining inspection result Platform is demonstrate,proved, to obtain the Electronic Signature file of the CA verification platform transmission and save.
7. the Electronic Seal System that fire-fighting as claimed in claim 6 checks table, which is characterized in that the user terminal also wraps It includes:
4th obtains module, if obtaining the identity information of the user for receiving registration request, and sends the identity Information is to the CA verification platform, to obtain the verification result that the CA verification platform is sent;Wherein, the identity information includes At least two in ID card No., identity document photograph, name, fingerprint, image data or audio data;
Determination module determines the user registration success if being that certification passes through for the verification result.
8. the Electronic Seal System that fire-fighting as claimed in claim 7 checks table, which is characterized in that described second obtains module, Include:
First acquisition unit, for obtaining the identity information of the user and being sent to the CA verification platform, described in obtaining The file to be signed that CA verification platform is sent after being verified to the identity information;
First transmission unit for the signing messages of the user according to the file acquisition to be signed, and is sent to the CA Verification platform, to obtain the second format text that the CA verification platform is generated according to the file to be signed and the signing messages Part.
9. the Electronic Seal System that fire-fighting according to claim 6 checks table, which is characterized in that the CA verification platform, Include:
Receiving module, if obtaining the identity information of user for receiving Electronic Signature certification request;
Authentication module obtains authentication result for carrying out authentication according to the identity information;Wherein, the user Including the first user and second user;
Sending module sends file to be signed to user terminal, to obtain if being that certification passes through for the authentication result The signing messages and the file to be signed for the user for taking the user terminal to send;
First generation module, for the signing messages and second format file of file generated to be signed according to the user, And it is sent to the user terminal;
Second generation module carries out electricity according to the encrypted document and inspection result for obtaining encrypted document and inspection result Sub- stamped signature generates Electronic Signature file cocurrent and send to the user terminal.
10. the Electronic Seal System that fire-fighting as claimed in claim 9 checks table, which is characterized in that the authentication module, packet It includes:
First authentication unit, for being initiated to public security bureau's identity authentication platform to described according to the identity information of first user First user carries out authentication, obtains the first authentication result;
Second authentication unit, for being initiated to public security bureau's identity authentication platform to described according to the identity information of the second user Second user carries out authentication, obtains the second authentication result;
First judging unit, if being that certification is logical for the first authentication result and the second authentication result It crosses, then determines that the authentication result passes through for certification;
Second judging unit, if being that certification is lost for the first authentication result and/or the second authentication result It loses, then determines the identity authentication result for authentification failure.
CN201910419240.8A 2019-05-20 2019-05-20 Electronic signature method and system of fire-fighting checklist Active CN110232282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910419240.8A CN110232282B (en) 2019-05-20 2019-05-20 Electronic signature method and system of fire-fighting checklist

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910419240.8A CN110232282B (en) 2019-05-20 2019-05-20 Electronic signature method and system of fire-fighting checklist

Publications (2)

Publication Number Publication Date
CN110232282A true CN110232282A (en) 2019-09-13
CN110232282B CN110232282B (en) 2021-11-19

Family

ID=67860833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910419240.8A Active CN110232282B (en) 2019-05-20 2019-05-20 Electronic signature method and system of fire-fighting checklist

Country Status (1)

Country Link
CN (1) CN110232282B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714222A (en) * 2008-10-08 2010-05-26 刘学明 Safe electronic stamping method based on notarization stamp of notarization institution
CN103505840A (en) * 2012-06-25 2014-01-15 鸿富锦精密工业(深圳)有限公司 System and method for fire protection inspection through cloud computing and mobile device
CN103920270A (en) * 2014-05-05 2014-07-16 重庆大学 Routing inspection video monitoring method and system of fire fighting apparatus
CN105913362A (en) * 2016-04-08 2016-08-31 四川省亚丁胡杨人力资源集团有限公司 Mobile Internet service application-based worker protecting system
CN106982190A (en) * 2016-01-18 2017-07-25 卓望数码技术(深圳)有限公司 A kind of electric endorsement method and system
CN107229850A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 electronic signature method and device
CN107393048A (en) * 2017-07-28 2017-11-24 北京富邦智慧物联科技有限公司 A kind of safe fire fighting device method for inspecting
CN107491851A (en) * 2016-10-27 2017-12-19 北京市安全生产科学技术研究院 Keep the safety in production information-based inspection system and method
CN109412789A (en) * 2018-09-29 2019-03-01 深圳市中电数通智慧安全科技股份有限公司 A kind of method and device of fire fighting monitoring

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714222A (en) * 2008-10-08 2010-05-26 刘学明 Safe electronic stamping method based on notarization stamp of notarization institution
CN103505840A (en) * 2012-06-25 2014-01-15 鸿富锦精密工业(深圳)有限公司 System and method for fire protection inspection through cloud computing and mobile device
CN103920270A (en) * 2014-05-05 2014-07-16 重庆大学 Routing inspection video monitoring method and system of fire fighting apparatus
CN106982190A (en) * 2016-01-18 2017-07-25 卓望数码技术(深圳)有限公司 A kind of electric endorsement method and system
CN107229850A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 electronic signature method and device
CN105913362A (en) * 2016-04-08 2016-08-31 四川省亚丁胡杨人力资源集团有限公司 Mobile Internet service application-based worker protecting system
CN107491851A (en) * 2016-10-27 2017-12-19 北京市安全生产科学技术研究院 Keep the safety in production information-based inspection system and method
CN107393048A (en) * 2017-07-28 2017-11-24 北京富邦智慧物联科技有限公司 A kind of safe fire fighting device method for inspecting
CN109412789A (en) * 2018-09-29 2019-03-01 深圳市中电数通智慧安全科技股份有限公司 A kind of method and device of fire fighting monitoring

Also Published As

Publication number Publication date
CN110232282B (en) 2021-11-19

Similar Documents

Publication Publication Date Title
CN109067801A (en) A kind of identity identifying method, identification authentication system and computer-readable medium
CN112446785A (en) Cross-chain transaction method, system, device, equipment and storage medium
CN110113167A (en) A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
CN109472166A (en) A kind of electronic signature method, device, equipment and medium
CN109862041A (en) A kind of digital identification authentication method, unit, system and storage medium
CN109379369A (en) Single-point logging method, device, server and storage medium
CN107844946A (en) A kind of method, apparatus and server of electronic contract signature
CN1496073B (en) Information check equipment
CN108933667A (en) A kind of management method and management system of the public key certificate based on block chain
US11588638B2 (en) Digital notarization using a biometric identification service
CN110096944A (en) A kind of signature method, system and the terminal device of electronic contract
CN108365950A (en) The generation method and device of financial self-service equipment key
CN102231729A (en) Method for supporting various CA (Certification Authority) identity authentications
CN109635572A (en) A kind of contract signing method, apparatus and terminal device based on block chain
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
CN102710611A (en) Network security authentication method and system
CN109361697A (en) The method for realizing trusted identity certification based on SIM card load PKI
CN101409622B (en) Digital signing system and method
CN112543184B (en) Block chain-based equipment authentication activation method
CN107994995A (en) A kind of method of commerce, system and the terminal device of lower security medium
CN115664659A (en) Method, device, equipment and medium for supervising blockchain transaction data
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device
CN112217636B (en) Data processing method and device based on block chain, computer equipment and medium
CN104753879B (en) Method and system, the method and system of cloud service provider certification terminal of terminal authentication cloud service provider

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant