CN110232282B - Electronic signature method and system of fire-fighting checklist - Google Patents
Electronic signature method and system of fire-fighting checklist Download PDFInfo
- Publication number
- CN110232282B CN110232282B CN201910419240.8A CN201910419240A CN110232282B CN 110232282 B CN110232282 B CN 110232282B CN 201910419240 A CN201910419240 A CN 201910419240A CN 110232282 B CN110232282 B CN 110232282B
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- file
- verification
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012795 verification Methods 0.000 claims abstract description 186
- 238000007689 inspection Methods 0.000 claims abstract description 71
- 230000000977 initiatory effect Effects 0.000 claims description 12
- 238000012544 monitoring process Methods 0.000 claims description 6
- 238000010200 validation analysis Methods 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 22
- 230000003993 interaction Effects 0.000 abstract description 6
- 238000012790 confirmation Methods 0.000 abstract description 3
- 238000004590 computer program Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Tourism & Hospitality (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention is suitable for the technical field of safety supervision and provides an electronic signature method and system of a fire control checklist, wherein the method comprises the following steps: the method comprises the steps of obtaining fire fighting inspection information, generating a corresponding first format file according to the fire fighting inspection information, obtaining signature information of a user, sending the signature information to a CA verification platform, obtaining a second format file sent by the CA verification platform, encrypting the first format file and the second format file, generating an encrypted file, obtaining an inspection result, sending the inspection result and the encrypted file to the CA verification platform, and obtaining and storing an electronic signature file sent by the CA verification platform. Through the interaction between the fire protection inspection user terminal and the CA verification platform, the process of confirming the fire protection inspection information and the fire protection inspection result of the fire protection inspection user to the site is made clear, so that the confirmation process has the effectiveness of law, and the enthusiasm of the fire protection inspection user and the understanding degree of the fire protection inspection user on the fire protection inspection safety situation in the site are improved.
Description
Technical Field
The invention belongs to the technical field of safety supervision, and particularly relates to an electronic signature method and system of a fire-fighting checklist.
Background
Recently, fire checklists have required different types of fire inspection personnel to confirm the results of fire inspections together. However, the above process may present a false situation.
Moreover, people cannot determine whether the fire inspection result is changed after the fire inspection patrol personnel jointly confirm the fire inspection result.
Thus, current fire checklists do not have legal effectiveness. When a dispute arises, the fire checklist cannot be used as a document providing legal force to resolve the dispute.
Disclosure of Invention
In view of this, the embodiment of the invention provides an electronic signature method and system for a fire control checklist, so as to solve the problem that the existing fire control checklist in the prior art does not have legal effectiveness.
The first aspect of the embodiment of the invention provides an electronic signature method of a fire control checklist, which comprises the following steps:
acquiring fire-fighting inspection information, and generating a corresponding first format file according to the fire-fighting inspection information;
acquiring signature information of a user, sending the signature information to a CA (certificate authority) verification platform, and acquiring a second format file sent by the CA verification platform; wherein the users comprise a first user and a second user;
encrypting the first format file and the second format file to generate an encrypted file;
and acquiring a check result, and sending the check result and the encrypted file to the CA verification platform so as to acquire and store the electronic signature file sent by the CA verification platform.
Optionally, before the obtaining the fire inspection information and generating the corresponding first format file according to the fire inspection information, the method further includes:
if a registration request is received, acquiring identity information of the user, and sending the identity information to the CA verification platform to acquire a verification result sent by the CA verification platform; the identity information comprises at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data;
and if the verification result is that the authentication is passed, judging that the user registration is successful.
Optionally, the obtaining the signature information of the user, and sending the signature information to a CA verification platform, and obtaining the second format file sent by the CA verification platform includes:
acquiring the identity information of the user and sending the identity information to the CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification;
and acquiring the signature information of the user according to the file to be signed, and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information.
Optionally, the method further includes:
if an electronic signature authentication request is received, acquiring identity information of a user;
performing identity authentication according to the identity information to obtain an identity authentication result; wherein the users comprise a first user and a second user;
if the identity verification result is that the authentication is passed, sending a file to be signed to a user terminal so as to obtain the signature information of the user and the file to be signed, which are sent by the user terminal;
generating a second format document according to the signature information of the user and the file to be signed, and sending the second format document to the user terminal;
and acquiring an encrypted document and an inspection result, performing electronic signature according to the encrypted document and the inspection result, generating an electronic signature file and sending the electronic signature file to the user terminal.
Optionally, performing identity authentication according to the identity information to obtain an identity authentication result, including:
initiating identity verification on the first user to a public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity verification result;
initiating identity verification on the second user to a public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity verification result;
if the first identity verification result and the second identity verification result are both authenticated, judging that the identity verification result is authenticated;
and if the first identity verification result and/or the second identity verification result is authentication failure, judging that the identity authentication result is authentication failure.
A second aspect of the embodiments of the present invention provides an electronic signature system for a fire checklist, which includes a user terminal and a CA authentication platform, where the user terminal includes:
the first acquisition module is used for acquiring fire-fighting inspection information and generating a corresponding first format file according to the fire-fighting inspection information;
the second acquisition module is used for acquiring the signature information of the user, sending the signature information to the CA verification platform and acquiring a second format file sent by the CA verification platform; wherein the users comprise a first user and a second user;
the encryption module is used for encrypting the first format file and the second format file to generate an encrypted file;
and the third acquisition module is used for acquiring the inspection result, and sending the inspection result and the encrypted file to the CA verification platform so as to acquire and store the electronic signature file sent by the CA verification platform.
Optionally, the user terminal further includes:
a fourth obtaining module, configured to obtain, if a registration request is received, identity information of the user, and send the identity information to the CA verification platform, so as to obtain a verification result sent by the CA verification platform; the identity information comprises at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data;
and the judging module is used for judging that the user is successfully registered if the verification result is that the user passes the authentication.
Optionally, the second obtaining module includes:
the first acquisition unit is used for acquiring the identity information of the user and sending the identity information to the CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification;
and the first sending unit is used for acquiring the signature information of the user according to the file to be signed and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information.
Optionally, the CA verification platform includes:
the receiving module is used for acquiring the identity information of the user if receiving the electronic signature authentication request;
the authentication module is used for performing identity authentication according to the identity information to obtain an identity authentication result; wherein the users comprise a first user and a second user;
the sending module is used for sending a file to be signed to a user terminal if the identity verification result is that the authentication is passed so as to obtain the signature information of the user and the file to be signed, which are sent by the user terminal;
the first generation module is used for generating a second format document according to the signature information of the user and the file to be signed and sending the second format document to the user terminal;
and the second generation module is used for acquiring the encrypted document and the check result, performing electronic signature according to the encrypted document and the check result, generating an electronic signature file and sending the electronic signature file to the user terminal.
Optionally, the verification module includes:
the first verification unit is used for initiating identity verification on the first user to a public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity verification result;
the second verification unit is used for initiating identity verification on the second user to a public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity verification result;
a first determination unit, configured to determine that the identity verification result is authenticated if both the first identity verification result and the second identity verification result are authenticated;
and the second judging unit is used for judging that the identity authentication result is authentication failure if the first identity authentication result and/or the second identity authentication result is authentication failure.
A third aspect of an embodiment of the present invention provides a terminal device, including: a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
A fourth aspect of embodiments of the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as described above.
The embodiment of the invention defines the confirmation process of the fire inspection information and the fire inspection result of the fire inspection user to the site through the interaction between the fire inspection user terminal and the CA verification platform, so that the confirmation process has legal efficacy, and the enthusiasm of the fire inspection user and the understanding degree of the fire inspection user to the current situation of defense safety in the fire inspection site are improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic flow chart illustrating an electronic signature method for a fire checklist according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating an electronic signature method of a fire checklist according to a second embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an electronic signature system of a fire checklist according to a third embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an electronic signature system of a fire checklist according to a fourth embodiment of the present invention;
fig. 5 is a schematic diagram of a terminal device according to a fifth embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by those skilled in the art, the technical solutions in the embodiments of the present invention will be clearly described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprises" and "comprising," and any variations thereof, in the description and claims of this invention and the above-described drawings are intended to cover non-exclusive inclusions. For example, a process, method, or system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus. Furthermore, the terms "first," "second," and "third," etc. are used to distinguish between different objects and are not used to describe a particular order.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Example one
As shown in fig. 1, the present embodiment provides an electronic signature method for a fire checklist, which may be applied to terminal devices such as a mobile phone, a PC, a tablet computer, and the like. The electronic signature method of the fire checklist provided by the embodiment comprises the following steps:
s101, fire fighting inspection information is obtained, and a corresponding first format file is generated according to the fire fighting inspection information.
In specific application, acquiring fire fighting inspection information input by a user, and generating a corresponding first format file according to the input fire fighting inspection information; wherein, the users comprise a first user and a second user; in this embodiment, the first user and the second user are the network operators and the managers of the fire monitoring network, or the first user and the second user can be set as other fire inspection users; fire inspection information includes, but is not limited to, whether the fire sensing equipment is intact, whether the fire alarm equipment is intact, and whether the fire suppressant is intact; the first format file may be specifically set according to actual conditions, for example, the first format file is set as a file to be signed.
S102, obtaining signature information of a user, sending the signature information to a CA (certificate authority) verification platform, and obtaining a second format file sent by the CA verification platform; wherein the users include a first user and a second user.
In specific application, signature information of a user is obtained and sent to a CA verification platform, and a second format file sent by the CA verification platform is obtained; the signature information of the user comprises but is not limited to a handwritten signature of the user; the second format file can be specifically set according to the actual situation; for example, the second format file is set as a handwritten signature picture of a gridder and a manager. A Certificate Authority (CA), i.e., an Authority that issues digital certificates, is an Authority responsible for issuing and managing digital certificates, and is a trusted third party in e-commerce transactions, and is responsible for verifying the validity of public keys in a public key system.
S103, encrypting the first format file and the second format file to generate an encrypted file.
In specific application, the first format file and the second format file are encrypted according to a preset encryption algorithm to form an encrypted file. The preset Encryption algorithm may be specifically set according to actual conditions, for example, set to an AES algorithm (Advanced Encryption Standard), an Advanced Encryption Standard algorithm, or an MD5 algorithm.
And S104, obtaining a checking result, and sending the checking result and the encrypted file to the CA verification platform to obtain and store the electronic signature file sent by the CA verification platform.
In specific application, an inspection result corresponding to fire-fighting inspection information input by a user is obtained, the inspection result and the encrypted file are sent to a CA verification platform together (so that the CA verification platform verifies the inspection result and the encrypted file, and after the verification is passed, the CA verification platform issues an electronic signature file), and the electronic signature file sent by the CA verification platform is obtained and stored.
In one embodiment, the method further comprises:
if a registration request is received, acquiring identity information of the user, and sending the identity information to the CA verification platform to acquire a verification result sent by the CA verification platform; the identity information comprises at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data;
and if the verification result is that the authentication is passed, judging that the user registration is successful.
In a specific application, if a registration request of a user is received, identity information of the user is acquired, and the identity information of the user is sent to a CA (certification authority) verification platform (so that the CA verification platform verifies the identity information of the user) to acquire a verification result sent by the CA verification platform. The identity information includes but is not limited to at least two of an identification number, an identification photo, a name, a fingerprint, image data or audio data.
In one embodiment, step S102 includes:
acquiring the identity information of the user and sending the identity information to the CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification;
and acquiring the signature information of the user according to the file to be signed, and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information.
In specific application, the identity information of a user is acquired and sent to a CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification; and acquiring the signature information of the user according to the file to be signed, and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information. Wherein, the signature input box in the document page to be signed can be set to contain < signer category: girdles > and < signer category: operator > for signature by the corresponding grid operator or operator.
This embodiment is patrolled and examined user terminal and CA through the fire control and is verified and carry out the interaction between the platform, has made clear and definite the fire control and has patrolled and examined the user and to the fire control inspection information and the affirmation process of fire control inspection result in the place for the affirmation process has possessed the efficiency of law, has improved the enthusiasm of fire control and has patrolled and examined user and patrolled and examined the degree of understanding of user to the fire control and patrolled and examined the safety current situation in the place.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Example two
As shown in fig. 2, this embodiment is a further description of the method steps in the first embodiment. In this embodiment, the electronic signature method of the fire checklist may be applied to a terminal device such as a CA verification platform. The electronic signature method of the fire control checklist further comprises the following steps:
s201, if an electronic signature authentication request is received, acquiring identity information of a user.
In specific application, if an electronic signature authentication request sent by a user terminal is received, acquiring identity information of a user to verify the identity information of the user; the identity information of the user includes but is not limited to at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data, wherein the user includes a first user and a second user, and in this embodiment, the first user and the second user are a fire monitoring grid operator and a fire monitoring grid manager, or the first user and the second user can be set as other fire monitoring patrol users.
S202, performing identity authentication according to the identity information to obtain an identity authentication result; wherein the users include a first user and a second user.
In specific application, identity authentication is performed according to identity information of a user, and an identity authentication result is obtained. Wherein, the identity verification result comprises passing authentication or failing authentication.
S203, if the identity verification result is that the authentication is passed, sending the file to be signed to a user terminal so as to obtain the signature information of the user and the file to be signed, which are sent by the user terminal.
In a specific application, if the identity verification result is that the authentication is passed, the file to be signed is sent to the user terminal so as to obtain the signature information of the user and the file to be signed, which are sent by the user terminal. In this embodiment, the file to be signed may be set as the file in the first format described in the first embodiment. In this embodiment, if the authentication result is authentication failure, a message of the user authentication failure is sent to the user terminal.
And S204, generating a second format document according to the signature information of the user and the file to be signed, and sending the second format document to the user terminal.
In specific application, a second format document is generated according to the signature information of the user and the file to be signed, and is sent to the user terminal. The second format document can be specifically set according to actual conditions, for example, the second format document is set as a handwritten signature picture of a gridder and a manager.
S205, acquiring the encrypted document and the check result, performing electronic signature according to the encrypted document and the check result, generating an electronic signature file and sending the electronic signature file to the user terminal.
In the specific application, an encrypted document and a check result sent by a user terminal are obtained, the encrypted document is decrypted according to a preset encryption algorithm and verified, after the verification is passed, electronic signature is carried out according to the encrypted document and the check result, an electronic signature file is generated and sent to the user terminal. The preset encryption algorithm may be specifically set according to an actual situation, and in this embodiment, the preset encryption algorithm is set to be the same as the preset encryption algorithm in the first embodiment.
In one embodiment, step S202 includes:
initiating identity verification on the first user to a public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity verification result;
initiating identity verification on the second user to a public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity verification result;
if the first identity verification result and the second identity verification result are both authenticated, judging that the identity verification result is authenticated;
and if the first identity verification result and/or the second identity verification result is authentication failure, judging that the identity authentication result is authentication failure.
In the specific application, the identity authentication of the first user is initiated to the public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity authentication result, and the identity authentication of the second user is initiated to the public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity authentication result. And if the first identity verification result and the second identity verification result are both passed through the authentication, judging that the identity verification result is passed through the authentication. And if any one of the first identity verification result and the second identity verification result is authentication failure, determining that the identity authentication result of the user is authentication failure. In one embodiment, the image data of the user sent by the user terminal can be acquired, and the identity information of the user can be verified by performing face recognition on the image data and comparing a face recognition result with the identity information of the record of the public security bureau.
This embodiment is patrolled and examined user terminal and CA through the fire control and is verified and carry out the interaction between the platform, has made clear and definite the fire control and has patrolled and examined the user and to the fire control inspection information and the affirmation process of fire control inspection result in the place for the affirmation process has possessed the efficiency of law, has improved the enthusiasm of fire control and has patrolled and examined user and patrolled and examined the degree of understanding of user to the fire control and patrolled and examined the safety current situation in the place.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
EXAMPLE III
As shown in fig. 3, the present embodiment provides an electronic signature system 100 of a fire checklist for performing the method steps of the first embodiment. The electronic signature system 100 of the fire checklist provided in this embodiment includes a user terminal 111 and a CA certification platform, where the user terminal 111 includes:
the first acquisition module 101 is used for acquiring fire-fighting inspection information and generating a corresponding first format file according to the fire-fighting inspection information;
the second obtaining module 102 is configured to obtain signature information of a user, send the signature information to a CA verification platform, and obtain a second format file sent by the CA verification platform; wherein the users comprise a first user and a second user;
the encryption module 103 is configured to encrypt the first format file and the second format file to generate an encrypted file;
and the third obtaining module 104 is configured to obtain a check result, and send the check result and the encrypted file to the CA verification platform, so as to obtain and store the electronic signature file sent by the CA verification platform.
In one embodiment, the user terminal 111 further includes:
a fourth obtaining module, configured to obtain, if a registration request is received, identity information of the user, and send the identity information to the CA verification platform, so as to obtain a verification result sent by the CA verification platform; the identity information comprises at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data;
and the judging module is used for judging that the user is successfully registered if the verification result is that the user passes the authentication.
In one embodiment, the second obtaining module 102 includes:
the first acquisition unit is used for acquiring the identity information of the user and sending the identity information to the CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification;
and the first sending unit is used for acquiring the signature information of the user according to the file to be signed and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information.
This embodiment is patrolled and examined user terminal and CA through the fire control and is verified and carry out the interaction between the platform, has made clear and definite the fire control and has patrolled and examined the user and to the fire control inspection information and the affirmation process of fire control inspection result in the place for the affirmation process has possessed the efficiency of law, has improved the enthusiasm of fire control and has patrolled and examined user and patrolled and examined the degree of understanding of user to the fire control and patrolled and examined the safety current situation in the place.
Example four
As shown in fig. 4, in the present embodiment, the electronic signature system 100 of the fire checklist in the fourth embodiment includes a user terminal and a CA authentication platform 112, where the CA authentication platform 112 includes the following structure for executing the method steps in the second embodiment:
a receiving module 201, configured to obtain identity information of a user if an electronic signature authentication request is received;
the verification module 202 is configured to perform identity verification according to the identity information to obtain an identity verification result; wherein the users comprise a first user and a second user;
a sending module 203, configured to send a file to be signed to a user terminal if the identity verification result is that the authentication is passed, so as to obtain signature information of the user and the file to be signed, which are sent by the user terminal;
the first generating module 204 is configured to generate a second format document according to the signature information of the user and the file to be signed, and send the second format document to the user terminal;
and the second generating module 205 is configured to obtain the encrypted document and the inspection result, perform electronic signature according to the encrypted document and the inspection result, generate an electronic signature file, and send the electronic signature file to the user terminal.
In one embodiment, the verification module 202 includes:
the first verification unit is used for initiating identity verification on the first user to a public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity verification result;
the second verification unit is used for initiating identity verification on the second user to a public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity verification result;
a first determination unit, configured to determine that the identity verification result is authenticated if both the first identity verification result and the second identity verification result are authenticated;
and the second judging unit is used for judging that the identity authentication result is authentication failure if the first identity authentication result and/or the second identity authentication result is authentication failure.
This embodiment is patrolled and examined user terminal and CA through the fire control and is verified and carry out the interaction between the platform, has made clear and definite the fire control and has patrolled and examined the user and to the fire control inspection information and the affirmation process of fire control inspection result in the place for the affirmation process has possessed the efficiency of law, has improved the enthusiasm of fire control and has patrolled and examined user and patrolled and examined the degree of understanding of user to the fire control and patrolled and examined the safety current situation in the place.
EXAMPLE five
Fig. 5 is a schematic diagram of the terminal device provided in this embodiment. As shown in fig. 5, the terminal device 5 of this embodiment includes: a processor 50, a memory 51, and a computer program 52, such as an electronic signature program for a fire checklist, stored in the memory 51 and operable on the processor 50. The processor 50, when executing the computer program 52, implements the steps in the above-mentioned electronic signature method embodiments of the fire checklists, such as the steps S101 to S104 shown in fig. 1. Alternatively, the processor 50, when executing the computer program 52, implements the functions of each module/unit in the above-mentioned device embodiments, for example, the functions of the modules 101 to 104 shown in fig. 3.
Illustratively, the computer program 52 may be partitioned into one or more modules/units that are stored in the memory 51 and executed by the processor 50 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 52 in the terminal device 5. For example, the computer program 52 may be divided into a first obtaining module, a second obtaining module, an encrypting module and a third obtaining module, and specific functions of the modules are described in the above third embodiment, which are not described herein again.
The terminal device 5 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is merely an example of a terminal device 5 and does not constitute a limitation of terminal device 5 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may be an internal storage unit of the terminal device 5, such as a hard disk or a memory of the terminal device 5. The memory 51 may also be an external storage device of the terminal device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital Card (SD), a Flash memory Card (Flash Card) and the like provided on the terminal device 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the terminal device 5. The memory 51 is used for storing the computer program and other programs and data required by the terminal device. The memory 51 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
Claims (4)
1. An electronic signature method of a fire control checklist is characterized by comprising the following steps:
a user terminal acquires fire fighting inspection information input by a user and generates a corresponding first format file according to the fire fighting inspection information, wherein the first format file is a file to be signed;
the method comprises the steps that a user terminal obtains signature information of a user and sends the signature information to a CA (certificate authority) verification platform, and a second format file sent by the CA verification platform is obtained, wherein the second format file is a signature file; wherein the users comprise a first user and a second user; the first user and the second user are grid members of a fire monitoring grid; the second format file is a handwritten signature picture of a gridder and a manager; the CA verification platform is a trusted third party in the e-commerce transaction;
the user terminal encrypts the first format file and the second format file to generate an encrypted file; the encryption mode adopts AES algorithm, advanced encryption standard algorithm or MD5 algorithm;
the user terminal acquires an inspection result corresponding to fire-fighting inspection information input by a user, sends the inspection result and the encrypted file to the CA verification platform so that the CA verification platform verifies the inspection result and the encrypted file, and acquires and stores an electronic signature file sent by the CA verification platform after the verification is passed;
before the obtaining of the fire fighting inspection information input by the user and the generation of the corresponding first format file according to the fire fighting inspection information, the method further comprises the following steps:
if a registration request is received, acquiring identity information of the user, and sending the identity information to the CA verification platform to acquire a verification result sent by the CA verification platform; the identity information comprises at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data;
if the verification result is that the authentication is passed, judging that the user registration is successful;
acquiring the signature information of the user, sending the signature information to a CA (certificate Authority) verification platform, and acquiring a second format file sent by the CA verification platform, wherein the second format file comprises:
acquiring the identity information of the user and sending the identity information to the CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification;
acquiring signature information of the user according to the file to be signed, and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information;
performing identity authentication according to the identity information to obtain an identity authentication result, comprising:
initiating identity verification on the first user to a public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity verification result;
initiating identity verification on the second user to a public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity verification result;
if the first identity verification result and the second identity verification result are both authenticated, judging that the identity verification result is authenticated;
and if the first identity verification result and/or the second identity verification result is authentication failure, judging that the identity authentication result is authentication failure.
2. The method of electronic signature of a fire checklist of claim 1, further comprising:
if an electronic signature authentication request is received, acquiring identity information of a user;
performing identity authentication according to the identity information to obtain an identity authentication result; wherein the users comprise a first user and a second user;
if the identity verification result is that the authentication is passed, sending a file to be signed to a user terminal so as to obtain the signature information of the user and the file to be signed, which are sent by the user terminal;
generating a second format document according to the signature information of the user and the file to be signed, and sending the second format document to the user terminal;
and acquiring an encrypted document and an inspection result, performing electronic signature according to the encrypted document and the inspection result, generating an electronic signature file and sending the electronic signature file to the user terminal.
3. An electronic signature system of a fire control checklist is characterized by comprising a user terminal and a CA authentication platform, wherein the user terminal comprises:
the first acquisition module is used for acquiring fire fighting inspection information input by a user and generating a corresponding first format file according to the fire fighting inspection information, wherein the first format file is a file to be signed;
the second acquisition module is used for acquiring the signature information of a user, sending the signature information to a CA (certificate authority) verification platform and acquiring a second format file sent by the CA verification platform, wherein the second format file is a signature file; wherein the users comprise a first user and a second user; the first user and the second user are grid members of a fire monitoring grid; the second format file is a handwritten signature picture of a gridder and a manager; the CA verification platform is a trusted third party in the e-commerce transaction;
the encryption module is used for encrypting the first format file and the second format file to generate an encrypted file; the encryption mode adopts AES algorithm, advanced encryption standard algorithm or MD5 algorithm;
the third acquisition module is used for acquiring an inspection result corresponding to fire-fighting inspection information input by a user, sending the inspection result and the encrypted file to the CA verification platform so that the CA verification platform verifies the inspection result and the encrypted file, and acquiring and storing the electronic signature file sent by the CA verification platform after the verification is passed;
a fourth obtaining module, configured to obtain, if a registration request is received, identity information of the user, and send the identity information to the CA verification platform, so as to obtain a verification result sent by the CA verification platform; the identity information comprises at least two of an identity card number, an identity certificate photo, a name, a fingerprint, image data or audio data;
the judging module is used for judging that the user is successfully registered if the verification result is that the user passes the authentication;
the second obtaining module includes:
the first acquisition unit is used for acquiring the identity information of the user and sending the identity information to the CA verification platform so as to acquire a file to be signed, which is sent after the CA verification platform passes the identity information verification;
the first sending unit is used for acquiring the signature information of the user according to the file to be signed and sending the signature information to the CA verification platform so as to acquire a second format file generated by the CA verification platform according to the file to be signed and the signature information;
the verification module comprises:
the first verification unit is used for initiating identity verification on the first user to a public security bureau identity authentication platform according to the identity information of the first user to obtain a first identity verification result;
the second verification unit is used for initiating identity verification on the second user to a public security bureau identity authentication platform according to the identity information of the second user to obtain a second identity verification result;
a first determination unit, configured to determine that the identity verification result is authenticated if both the first identity verification result and the second identity verification result are authenticated;
and the second judging unit is used for judging that the identity authentication result is authentication failure if the first identity authentication result and/or the second identity authentication result is authentication failure.
4. The electronic signature system of a fire checklist of claim 3, wherein the CA validation platform includes:
the receiving module is used for acquiring the identity information of the user if receiving the electronic signature authentication request;
the authentication module is used for performing identity authentication according to the identity information to obtain an identity authentication result; wherein the users comprise a first user and a second user;
the sending module is used for sending a file to be signed to a user terminal if the identity verification result is that the authentication is passed so as to obtain the signature information of the user and the file to be signed, which are sent by the user terminal;
the first generation module is used for generating a second format document according to the signature information of the user and the file to be signed and sending the second format document to the user terminal;
and the second generation module is used for acquiring the encrypted document and the check result, performing electronic signature according to the encrypted document and the check result, generating an electronic signature file and sending the electronic signature file to the user terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910419240.8A CN110232282B (en) | 2019-05-20 | 2019-05-20 | Electronic signature method and system of fire-fighting checklist |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910419240.8A CN110232282B (en) | 2019-05-20 | 2019-05-20 | Electronic signature method and system of fire-fighting checklist |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110232282A CN110232282A (en) | 2019-09-13 |
CN110232282B true CN110232282B (en) | 2021-11-19 |
Family
ID=67860833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910419240.8A Active CN110232282B (en) | 2019-05-20 | 2019-05-20 | Electronic signature method and system of fire-fighting checklist |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110232282B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103505840A (en) * | 2012-06-25 | 2014-01-15 | 鸿富锦精密工业(深圳)有限公司 | System and method for fire protection inspection through cloud computing and mobile device |
CN103920270A (en) * | 2014-05-05 | 2014-07-16 | 重庆大学 | Routing inspection video monitoring method and system of fire fighting apparatus |
CN106982190A (en) * | 2016-01-18 | 2017-07-25 | 卓望数码技术(深圳)有限公司 | A kind of electric endorsement method and system |
CN107229850A (en) * | 2016-03-25 | 2017-10-03 | 阿里巴巴集团控股有限公司 | electronic signature method and device |
CN107393048A (en) * | 2017-07-28 | 2017-11-24 | 北京富邦智慧物联科技有限公司 | A kind of safe fire fighting device method for inspecting |
CN107491851A (en) * | 2016-10-27 | 2017-12-19 | 北京市安全生产科学技术研究院 | Keep the safety in production information-based inspection system and method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101714222A (en) * | 2008-10-08 | 2010-05-26 | 刘学明 | Safe electronic stamping method based on notarization stamp of notarization institution |
CN105913362B (en) * | 2016-04-08 | 2020-07-14 | 四川省和信源创劳务有限公司 | Staff support system based on mobile internet service application |
CN109412789B (en) * | 2018-09-29 | 2020-05-19 | 深圳市中电数通智慧安全科技股份有限公司 | Fire-fighting monitoring method and device |
-
2019
- 2019-05-20 CN CN201910419240.8A patent/CN110232282B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103505840A (en) * | 2012-06-25 | 2014-01-15 | 鸿富锦精密工业(深圳)有限公司 | System and method for fire protection inspection through cloud computing and mobile device |
CN103920270A (en) * | 2014-05-05 | 2014-07-16 | 重庆大学 | Routing inspection video monitoring method and system of fire fighting apparatus |
CN106982190A (en) * | 2016-01-18 | 2017-07-25 | 卓望数码技术(深圳)有限公司 | A kind of electric endorsement method and system |
CN107229850A (en) * | 2016-03-25 | 2017-10-03 | 阿里巴巴集团控股有限公司 | electronic signature method and device |
CN107491851A (en) * | 2016-10-27 | 2017-12-19 | 北京市安全生产科学技术研究院 | Keep the safety in production information-based inspection system and method |
CN107393048A (en) * | 2017-07-28 | 2017-11-24 | 北京富邦智慧物联科技有限公司 | A kind of safe fire fighting device method for inspecting |
Also Published As
Publication number | Publication date |
---|---|
CN110232282A (en) | 2019-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109522698B (en) | User authentication method based on block chain and terminal equipment | |
US20210152374A9 (en) | System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
KR102197218B1 (en) | System and method for providing distributed id and fido based block chain identification | |
US11159321B2 (en) | Digital notarization using a biometric identification service | |
TW201741922A (en) | Biological feature based safety certification method and device | |
US20210243037A1 (en) | Method for information processing in digital asset certificate inheritance transfer, and related device | |
CN104008351B (en) | Window application completeness check system, method and device | |
CN108173659B (en) | Certificate management method and system based on UKEY equipment and terminal equipment | |
CN109150535A (en) | A kind of identity identifying method, equipment, computer readable storage medium and device | |
CN109361697B (en) | Method for realizing credible identity authentication based on SIM card loading PKI | |
CN109118377B (en) | Processing method and system for claim settlement event based on block chain and electronic equipment | |
CN105099705B (en) | A kind of safety communicating method and its system based on usb protocol | |
CN112699353B (en) | Financial information transmission method and financial information transmission system | |
CN106101092A (en) | A kind of information evaluation processing method and first instance | |
CN110392043B (en) | Method and system for endowing electronic contract notarization with mandatory execution effect | |
CN114519206A (en) | Method for anonymously signing electronic contract and signature system | |
CN105743651A (en) | Method and apparatus for utilizing card application in chip security domain, and application terminal | |
CN109495276A (en) | A kind of implementation method of the electronic driving license based on SE chip, computer installation, computer readable storage medium | |
CN112383577A (en) | Authorization method, device, system, equipment and storage medium | |
CN104010306A (en) | Mobile device user identity authentication system and method | |
CA2898587C (en) | Digitised handwritten signature authentication | |
CN110232282B (en) | Electronic signature method and system of fire-fighting checklist | |
CN115865495A (en) | Data transmission control method and device, electronic equipment and readable storage medium | |
CN112910883B (en) | Data transmission method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |