CN111311179A - Object processing method and device, electronic equipment and computer readable storage medium - Google Patents

Object processing method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN111311179A
CN111311179A CN202010082955.1A CN202010082955A CN111311179A CN 111311179 A CN111311179 A CN 111311179A CN 202010082955 A CN202010082955 A CN 202010082955A CN 111311179 A CN111311179 A CN 111311179A
Authority
CN
China
Prior art keywords
audited
information
server
audit
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010082955.1A
Other languages
Chinese (zh)
Inventor
王强
王雪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xingxuan Technology Co Ltd
Original Assignee
Beijing Xingxuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xingxuan Technology Co Ltd filed Critical Beijing Xingxuan Technology Co Ltd
Priority to CN202010082955.1A priority Critical patent/CN111311179A/en
Publication of CN111311179A publication Critical patent/CN111311179A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents

Abstract

The embodiment of the disclosure discloses an object processing method, an object processing device, an electronic device and a computer readable storage medium, wherein the object processing method comprises the following steps: responding to the acquired object to be audited, and generating safety information of the object to be audited; sending the security information to an auditing server to enable the auditing server to audit the object to be audited, and sending an auditing signature file to first equipment after the auditing is passed, so that the first equipment signs the object to be audited to obtain the audited object and sends the audited object to an object processing server; and responding to the received operation instruction of the audited object, and operating the audited object according to the operation instruction of the audited object. The technical scheme can timely and effectively record and file the objects such as the contract and the like, enhance the monitoring strength of the contract, reduce high law risks, reduce possible asset loss, improve the express delivery efficiency of the objects such as the contract and the like, and enhance the filing capacity.

Description

Object processing method and device, electronic equipment and computer readable storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an object processing method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract cannot be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
Disclosure of Invention
The embodiment of the disclosure provides an object processing method and device, electronic equipment and a computer-readable storage medium.
In a first aspect, an embodiment of the present disclosure provides an object processing method, which is applicable to an object processing server.
Specifically, the object processing method includes:
in response to the acquisition of an object to be audited, generating security information of the object to be audited, wherein the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least comprises first relevant party information and second relevant party information of the object to be audited, identification information of the object to be audited and signature summary information of the object to be audited;
sending the security information of the object to be audited to an auditing server so that the auditing server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, sending an auditing signature file to the first equipment after the auditing is passed so that the first equipment signs the object to be audited according to the auditing signature file to obtain an audited object, and sending the audited object to the object processing server;
and responding to the received operation instruction of the audited object, and operating the audited object according to the operation instruction of the audited object.
With reference to the first aspect, the present disclosure provides, in a first implementation form of the first aspect,
the generating of the security information of the object to be audited in response to the obtaining of the object to be audited includes:
generating identification information of an object to be audited in response to the acquisition of the object to be audited, wherein the identification information is used for performing distinctive identification on the object to be audited;
acquiring the content information of the object to be checked, and performing signature summary calculation based on the content information of the object to be checked to obtain signature summary information of the object to be checked;
and acquiring first related party information and second related party information of the object to be audited, and forming safety information of the object to be audited with the identification information of the object to be audited and the signature abstract information of the object to be audited.
With reference to the first aspect and the first implementation manner of the first aspect, in a second implementation manner of the first aspect, an embodiment of the present disclosure further includes:
and determining a first related party and a second related party of the object to be audited, and sending the information of the second related party to the first equipment.
With reference to the first aspect, the first implementation manner of the first aspect, and the second implementation manner of the first aspect, in a third implementation manner of the first aspect, an embodiment of the present disclosure further includes:
and acquiring the content information of the checked object, performing signature abstract calculation based on the content information of the checked object to obtain signature abstract information of the checked object, and sending the signature abstract information of the checked object to the checking server.
In a second aspect, an embodiment of the present disclosure provides an object processing method, which is suitable for an audit server.
Specifically, the object processing method includes:
receiving safety information of an object to be audited, wherein the safety information at least comprises first related party information and second related party information of the object to be audited, identification information of the object to be audited and signature abstract information of the object to be audited;
auditing the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited;
and responding to the approval of the object to be approved, sending an approval signing file to the first equipment so that the first equipment signs the object to be approved according to the approval signing file to obtain the approved object, and sending the approved object to an object processing server.
With reference to the second aspect, the present disclosure provides, in a first implementation form of the second aspect,
the auditing the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited includes:
performing identity verification on the first related party information and the second related party information;
and when the first related party information and the second related party information pass identity authentication, determining that the object to be audited passes audit.
With reference to the second aspect and the first implementation manner of the second aspect, in a second implementation manner of the second aspect, an embodiment of the present disclosure further includes:
and acquiring related party information and a corresponding related party signed file, and performing identity authentication on the related party.
In a third aspect, an embodiment of the present disclosure provides an object processing method, which is applied to a first device corresponding to a first related party.
Specifically, the object processing method includes:
generating an object to be audited, sending the object to be audited to the object processing server, enabling the object processing server to generate safety information based on the object to be audited, sending the safety information to an auditing server, enabling the auditing server to audit the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sending an auditing signature file to the first equipment after the auditing is passed;
in response to receiving the verification signing file sent by the verification server, signing the object to be verified according to the verification signing file to obtain a verified object;
and sending the audited object to the object processing server.
With reference to the third aspect, in a first implementation manner of the third aspect, the present disclosure further includes:
and responding to the received second related party information sent by the object processing server, and storing the second related party information.
With reference to the third aspect and the first implementation manner of the third aspect, in a second implementation manner of the third aspect, the present disclosure further includes:
and sending the first relevant party information and the corresponding relevant party signed file to the auditing server so that the auditing server performs identity authentication on the first relevant party.
In a fourth aspect, an embodiment of the present disclosure provides an object processing method, which is applied to an object processing system including an object processing server, an auditing server, a first device corresponding to a first related party, and a second device corresponding to a second related party.
Specifically, the object processing method includes:
the first equipment generates an object to be audited and sends the object to be audited to the object processing server, wherein the object to be audited is at least associated with a first related party and a second related party;
the object processing server responds to the acquisition of an object to be audited, generates safety information of the object to be audited, and sends the safety information of the object to be audited to an auditing server, wherein the safety information at least comprises first relevant party information and second relevant party information of the object to be audited, identification information of the object to be audited and signature abstract information of the object to be audited;
the auditing server receives security information of an object to be audited, audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sends an auditing signature file to the first equipment when the audit of the object to be audited is passed;
the first equipment receives the audit signing file sent by the audit server, signs the object to be audited according to the audit signing file to obtain an audited object, and sends the audited object to the object processing server;
and the object processing server responds to the received operation instruction of the audited object and operates the audited object according to the operation instruction of the audited object.
With reference to the fourth aspect, in a first implementation manner of the fourth aspect, before the generating, by the first device, an object to be audited, the method further includes:
and the first equipment sends the first relevant party information and the corresponding relevant party signed file to the auditing server, and the auditing server acquires the relevant party information and the corresponding relevant party signed file and performs identity authentication on the relevant party.
With reference to the fourth aspect and the first implementation manner of the fourth aspect, in a second implementation manner of the fourth aspect, an embodiment of the present disclosure further includes:
and the object processing server determines a first related party and a second related party of the object to be checked, and sends the second related party information to the first equipment, and the first equipment stores the second related party information after receiving the second related party information sent by the object processing server.
With reference to the fourth aspect, the first implementation manner of the fourth aspect, and the second implementation manner of the fourth aspect, in a third implementation manner of the fourth aspect, the embodiment of the present disclosure further includes:
the object processing server obtains the content information of the checked object, performs signature abstract calculation based on the content information of the checked object to obtain signature abstract information of the checked object, and sends the signature abstract information of the checked object to the checking server.
In a fifth aspect, an embodiment of the present disclosure provides an object processing apparatus, which is suitable for an object processing server.
Specifically, the object processing apparatus includes:
the system comprises a first generation module, a second generation module and a verification module, wherein the first generation module is configured to respond to the acquisition of an object to be verified and generate security information of the object to be verified, the object to be verified is at least associated with a first related party and a second related party, and the security information at least comprises first related party information and second related party information of the object to be verified, identification information of the object to be verified and signature summary information of the object to be verified;
the first sending module is configured to send the security information of the object to be audited to an auditing server, so that the auditing server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sends an auditing signature file to the first equipment after the auditing is passed, so that the first equipment signs the object to be audited according to the auditing signature file to obtain an audited object, and sends the audited object to the object processing server;
and the operation module is configured to respond to the received operation instruction of the audited object and operate the audited object according to the operation instruction of the audited object.
With reference to the fifth aspect, in a first implementation manner of the fifth aspect, the first generating module includes:
the generating submodule is configured to respond to the acquisition of an object to be audited and generate identification information of the object to be audited, wherein the identification information is used for performing distinctive identification on the object to be audited;
the calculation submodule is configured to acquire content information of the object to be checked, and perform signature summary calculation based on the content information of the object to be checked to obtain signature summary information of the object to be checked;
and the combination submodule is configured to acquire first relevant party information and second relevant party information of the object to be audited, and form security information of the object to be audited with the identification information of the object to be audited and the signature summary information of the object to be audited.
With reference to the fifth aspect and the first implementation manner of the fifth aspect, in a second implementation manner of the fifth aspect, an embodiment of the present disclosure further includes:
and the second sending module is configured to determine a first related party and a second related party of the object to be audited, and send the second related party information to the first device.
With reference to the fifth aspect, the first implementation manner of the fifth aspect, and the second implementation manner of the fifth aspect, in a third implementation manner of the fifth aspect, the embodiment of the present disclosure further includes:
and the calculation module is configured to acquire the content information of the checked object, perform signature summary calculation based on the content information of the checked object to obtain signature summary information of the checked object, and send the signature summary information of the checked object to the check server.
In a sixth aspect, an embodiment of the present disclosure provides an object processing apparatus, which is suitable for an audit server.
Specifically, the object processing apparatus includes:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is configured to receive safety information of an object to be verified, and the safety information at least comprises first related party information and second related party information of the object to be verified, identification information of the object to be verified and signature summary information of the object to be verified;
the auditing module is configured to audit the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited;
and the third sending module is configured to send an audit signing file to the first device in response to the audit of the object to be audited passing, so that the first device signs the object to be audited according to the audit signing file to obtain an audited object, and sends the audited object to an object processing server.
With reference to the sixth aspect, in a first implementation manner of the sixth aspect, the audit module includes:
a verification sub-module configured to perform identity verification on the first and second stakeholder information;
and the determining submodule is configured to determine that the object to be audited passes the audit when the first relevant party information and the second relevant party information pass the identity authentication.
With reference to the sixth aspect and the first implementation manner of the sixth aspect, in a second implementation manner of the sixth aspect, the present disclosure further includes:
and the authentication module is configured to acquire the related party information and the corresponding related party signed file and perform identity authentication on the related party.
In a seventh aspect, an embodiment of the present disclosure provides an object processing apparatus, which is applied to a first device corresponding to a first related party.
Specifically, the object processing apparatus includes:
the second generation module is configured to generate an object to be audited, send the object to be audited to the object processing server, enable the object processing server to generate security information based on the object to be audited, send the security information to an audit server, enable the audit server to audit the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and send an audit signature file to the first device after the audit is passed;
the signing module is configured to respond to the received audit signing file sent by the audit server, sign the object to be audited according to the audit signing file, and obtain the audited object;
a fourth sending module configured to send the audited object to the object processing server.
With reference to the seventh aspect, in a first implementation manner of the seventh aspect, the present disclosure further includes:
and the storage module is configured to store the second related party information sent by the object processing server in response to receiving the second related party information.
With reference to the seventh aspect and the first implementation manner of the seventh aspect, in a second implementation manner of the seventh aspect, the present disclosure further includes:
and the fifth sending module is configured to send the first relevant party information and the corresponding relevant party signed file to the auditing server, so that the auditing server performs identity authentication on the first relevant party.
In an eighth aspect, an embodiment of the present disclosure provides an object processing apparatus, which is applied to an object processing system including an object processing server, an auditing server, a first device corresponding to a first relevant party, and a second device corresponding to a second relevant party.
Specifically, the object processing apparatus includes:
the device comprises a first device, a second device and a third device, wherein the first device is configured to generate an object to be audited, send the object to be audited to an object processing server, receive an audit signature file sent by the audit server, sign the object to be audited according to the audit signature file to obtain an audited object, and send the audited object to the object processing server, wherein the object to be audited is at least associated with a first related party and a second related party;
the object processing server is configured to respond to the acquisition of an object to be audited, generate security information of the object to be audited, send the security information of the object to be audited to the auditing server, respond to the reception of an operation instruction of the audited object, and operate on the audited object according to the operation instruction of the audited object, wherein the security information at least comprises first and second correlative party information of the object to be audited, identification information of the object to be audited, and signature abstract information of the object to be audited;
and the auditing server is configured to receive the security information of the object to be audited, audit the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, and send an auditing and signing file to the first equipment when the audit of the object to be audited is passed.
With reference to the eighth aspect, in a first implementation manner of the eighth aspect, before the first device generates the object to be audited, the first device is further configured to:
and the first equipment sends the first relevant party information and the corresponding relevant party signed file to the auditing server, and the auditing server acquires the relevant party information and the corresponding relevant party signed file and performs identity authentication on the relevant party.
With reference to the eighth aspect and the first implementation manner of the eighth aspect, in a second implementation manner of the eighth aspect, the object processing server is further configured to determine a first relevant party and a second relevant party of the object to be audited, send the second relevant party information to the first device, and the first device stores the second relevant party information after receiving the second relevant party information sent by the object processing server.
With reference to the eighth aspect, the first implementation manner of the eighth aspect, and the second implementation manner of the eighth aspect, in a third implementation manner of the eighth aspect, the object processing server is further configured to obtain content information of the checked object, perform signature summary calculation based on the content information of the checked object to obtain signature summary information of the checked object, and send the signature summary information of the checked object to the checking server.
In a ninth aspect, the present disclosure provides an electronic device, including a memory and at least one processor, wherein the memory is used for storing one or more computer instructions, and the one or more computer instructions are executed by the at least one processor to implement the method steps of the above object processing method.
In a tenth aspect, an embodiment of the present disclosure provides a computer-readable storage medium for storing computer instructions for an object processing apparatus, where the computer instructions include computer instructions for executing the object processing method to the object processing apparatus.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the technical scheme, the offline contract equivalent objects are moved to the online for processing, and contract processing servers such as an internet platform perform safety audit on the contract equivalent objects to generate audited objects for archiving. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
Other features, objects, and advantages of the present disclosure will become more apparent from the following detailed description of non-limiting embodiments when taken in conjunction with the accompanying drawings. In the drawings:
FIG. 1 illustrates a flow diagram of an object processing method according to an embodiment of the present disclosure;
fig. 2 shows a flowchart of step S101 of the object processing method according to the embodiment shown in fig. 1;
3-5, 7-11 show flow diagrams of object processing methods according to various embodiments of the present disclosure;
fig. 6 shows a flowchart of step S502 of the object processing method according to the embodiment shown in fig. 5;
FIG. 12 illustrates an overall flow diagram of an object processing method according to an embodiment of the present disclosure;
fig. 13 is a block diagram illustrating a structure of an object processing apparatus according to an embodiment of the present disclosure;
fig. 14 is a block diagram showing the configuration of a first generation module 1301 of the object processing apparatus according to the embodiment shown in fig. 13;
15-17, 19-23 show block diagrams of structures of object processing devices according to various embodiments of the present disclosure;
FIG. 18 is a block diagram illustrating the structure of an audit module 1702 of the object processing apparatus according to the embodiment shown in FIG. 17;
FIG. 24 shows a block diagram of an electronic device according to an embodiment of the present disclosure;
fig. 25 is a schematic structural diagram of a computer system suitable for implementing an object processing method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily implement them. Also, for the sake of clarity, parts not relevant to the description of the exemplary embodiments are omitted in the drawings.
In the present disclosure, it is to be understood that terms such as "including" or "having," etc., are intended to indicate the presence of the disclosed features, numbers, steps, behaviors, components, parts, or combinations thereof, and are not intended to preclude the possibility that one or more other features, numbers, steps, behaviors, components, parts, or combinations thereof may be present or added.
It should be further noted that the embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
According to the technical scheme provided by the embodiment of the disclosure, the offline contract equivalent object is moved to the online for processing, and the contract processing server such as an internet platform performs safety audit on the contract equivalent object to generate an audited object for archiving. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
Fig. 1 shows a flowchart of an object processing method according to an embodiment of the present disclosure, which is applicable to an object processing server, such as an internet platform, an electronic contract platform, and the like, and as shown in fig. 1, the object processing method includes the following steps S101 to S103:
in step S101, in response to acquiring an object to be audited, generating security information of the object to be audited, where the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least includes first relevant party information and second relevant party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited;
in step S102, sending the security information of the object to be audited to an audit server, so that the audit server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and after the audit is passed, sending an audit signature file to a first device corresponding to the first relevant party, so that the first device signs the object to be audited according to the audit signature file, so as to obtain an audited object, and sending the audited object to the object processing server;
in step S103, in response to receiving the operation instruction of the audited object, the audited object is operated according to the operation instruction of the audited object.
As mentioned above, with the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract can not be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
In view of the above-mentioned drawbacks, the present embodiment proposes an object processing method, in which an offline contract equivalent object is moved to an online state for processing, and a contract processing server such as an internet platform performs security check on the contract equivalent object to generate an checked object, and stores the checked object. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
In an optional implementation manner of this embodiment, the object to be audited refers to an object that includes a certain content, and the content needs to be audited by the audit server, and the object is associated with at least a first relevant party and a second relevant party. The object to be checked may be, for example, an electronic contract which includes contract agreement content and needs to be checked, the electronic contract may include a first related party a and a second related party b, and in some multiparty contracts, the electronic contract may include more related parties in addition to the first related party and the second related party. For convenience of description, in the following embodiments, it is assumed that the object to be audited includes only a first correlator and a second correlator, and the first correlator is an object master, i.e. equivalent to contract a party or a service receiver, and the second correlator is an object slave, i.e. equivalent to contract b party or a service provider, and for the case where a third correlator or other more correlators exist, the assignment of different roles according to which the third correlator or other more correlators are the master or slave may be performed similarly based on the above examples.
In an optional implementation manner of this embodiment, the security information refers to information used for providing to an audit server, so that the audit server performs identification and security audit on the object to be audited. The security information at least comprises first and second related party information of the object to be audited, identification information of the object to be audited and signature summary information of the object to be audited, and the first and second related party information of the object to be audited are used for enabling the auditing server to determine whether the identities of the first and second related parties are legal; the identification information of the object to be audited is used for identifying the object to be audited distinctively so as to search the object to be audited and the audited object obtained subsequently; the signature abstract information of the object to be audited is generated based on the content information of the object to be audited, belongs to an abstract comprising signature information, and is used for being provided for the auditing server, so that the auditing server can compare the signature abstract information of the object to be audited with the signature abstract information of the object to be audited subsequently, the object to be audited and the object to be audited are confirmed not to be tampered in the transmission process, meanwhile, the transmission of the whole text of the object to be audited is avoided, and the safety of information transmission is further enhanced. In an optional implementation manner of this embodiment, the signature summary information of the object to be checked may be, for example, signature summary information obtained by using an md5 algorithm.
In an optional implementation manner of this embodiment, the audit server refers to a party performing audit on an object to be audited, for example, if the object to be audited is an electronic contract, the audit server may be a party capable of verifying authenticity and validity of identities of two parties of the contract of the electronic contract. For example, if first relevant party information and second relevant party information about an electronic contract to be checked, which are sent by the object processing server, are received, the checking server may verify the authenticity and validity of the identities of both parties of the electronic contract based on the identity authentication information obtained in advance, and after the verification and the verification are confirmed to be passed, determine and send an audit signing document to a leading party of the electronic contract, so that the leading party of the electronic contract signs the object to be checked according to the audit signing document, and obtains the checked object. The audit signing document refers to a document which is stored in advance and can be loaded in the object to be audited to change the object to be audited into an audited object, such as an electronic seal, an electronic contract seal and the like of the party related to the electronic contract.
After receiving the audited object sent by the first device, the object processing server may operate on the audited object according to the received audited object operation instruction. The operation instruction of the audited object can be, for example, an archiving instruction, a query instruction, a data updating instruction, a failure of a second related party of the audited object, and the like. The failure of the related party of the audited object means that if the audited object is detected to exceed the validity period, a failure operation needs to be executed on a second related party related to the audited object. The first device corresponding to the first related party may be a device capable of performing an operation mainly performed by the first related party, the first device may be a different device from the object processing server or may be the same device, and when the first device and the object processing server are the same device, signal interaction between the first device and the object processing server may be omitted.
In an optional implementation manner of this embodiment, as shown in fig. 2, the step S101, that is, the step of generating the security information of the object to be audited in response to acquiring the object to be audited, includes the following steps S201 to S203:
in step S201, in response to acquiring an object to be checked, generating identification information of the object to be checked, where the identification information is used to perform distinctive identification on the object to be checked;
in step S202, content information of the object to be checked is obtained, and signature digest calculation is performed based on the content information of the object to be checked to obtain signature digest information of the object to be checked;
in step S203, the first and second relevant party information of the object to be audited are obtained, and the security information of the object to be audited is composed with the identification information of the object to be audited and the signature digest information of the object to be audited.
In the above, the security information refers to information that is provided to an audit server to enable the audit server to perform identification and security audit on the object to be audited, where the security information at least includes first related party information and second related party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited. In this embodiment, when generating security information, first, identification information capable of performing distinctive identification on an object to be audited is generated according to the obtained object to be audited, where the identification information may be, for example, a string of characters with a certain length, such as a numeric string and a letter string, and the length of the string of characters is related to the number of objects to be audited that need to be identified; then, acquiring content information of the object to be checked, and performing signature summary calculation based on the content information of the object to be checked to obtain signature summary information of the object to be checked, wherein the content information of the object to be checked refers to all content information of the object to be checked, the signature summary calculation can be, for example, md5 and other calculation methods, and the signature summary calculation can be used to obtain summary information of the object to be checked, including the signature information; and finally, acquiring first related party information and second related party information of the object to be audited, and forming safety information of the object to be audited with the identification information of the object to be audited and the signature abstract information of the object to be audited.
In an optional implementation manner of this embodiment, before the step S102, that is, before the step of sending the security information of the object to be audited to the auditing server, the method further includes a step of determining a first relevant party and a second relevant party of the object to be audited, and sending information of the second relevant party to the first device, that is, as shown in fig. 3, the method includes the following steps S301 to S304:
in step S301, in response to acquiring an object to be audited, generating security information of the object to be audited, where the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least includes identification information of the object to be audited and signature digest information of the object to be audited;
in step S302, a first relevant party and a second relevant party of the object to be audited are determined, and the second relevant party information is sent to the first device;
in step S303, sending the security information of the object to be audited to an audit server, so that the audit server audits the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, and after the audit is passed, sending an audit signature file to the first device, so that the first device signs the object to be audited according to the audit signature file, to obtain an audited object, and sending the audited object to the object processing server;
in step S304, in response to receiving the operation instruction of the audited object, the audited object is operated according to the operation instruction of the audited object.
In order to facilitate the first device to archive the second related party information to provide a data basis for subsequent related party search operations, in this embodiment, before sending the security information of the object to be audited to the auditing server for auditing, the second related party information is also sent to the first device, where the related party information may include one or more of the following information: the name of the related party, the identification information of the related party, and the like, for example, if the related party is an enterprise, the name of the related party refers to the name of the enterprise, and the identification information of the related party refers to information that can be used for identifying the identity of the enterprise, such as social unification credit information of the enterprise; if the related party is an individual, the name of the related party refers to the name of the individual, and the identification information of the related party refers to information which can be used for identifying the identity of the individual, such as identification card information, passport information, military officer license information and the like.
In an optional implementation manner of this embodiment, the method further includes the steps of obtaining content information of the audited object, performing signature digest calculation based on the content information of the audited object to obtain signature digest information of the audited object, and sending the signature digest information of the audited object to the audit server, that is, as shown in fig. 4, the method includes the following steps S401 to S404:
in step S401, in response to acquiring an object to be audited, generating security information of the object to be audited, where the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least includes identification information of the object to be audited and signature digest information of the object to be audited;
in step S402, sending the security information of the object to be audited to an audit server, so that the audit server audits the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, and after the audit is passed, sending an audit signature file to the first device, so that the first device signs the object to be audited according to the audit signature file, to obtain an audited object, and sending the audited object to the object processing server;
in step S403, in response to receiving an operation instruction of an audited object, performing an operation on the audited object according to the operation instruction of the audited object;
in step S404, content information of the audited object is obtained, signature digest calculation is performed based on the content information of the audited object to obtain signature digest information of the audited object, and the signature digest information of the audited object is sent to the audit server.
In this embodiment, after receiving the audited object, signature summary calculation is further performed according to the content information of the audited object to obtain signature summary information of the audited object, and then the signature summary information of the audited object is sent to the audit server. Similarly to the above, the signature digest calculation may be, for example, an md5 calculation method, and the signature digest calculation may be used to obtain digest information of the audited object including signature information.
Fig. 5 shows a flowchart of an object processing method according to another embodiment of the present disclosure, which is suitable for an auditing server, such as an auditing server, an auditing platform, and the like, and as shown in fig. 5, the object processing method includes the following steps S501-S503:
in step S501, receiving security information of an object to be audited, where the security information at least includes first and second party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited;
in step S502, the object to be checked is checked according to the first relevant party information and the second relevant party information of the object to be checked;
in step S503, in response to the to-be-audited object being approved, sending an audit signature file to the first device, so that the first device signs the to-be-audited object according to the audit signature file to obtain an audited object, and sending the audited object to an object processing server.
As mentioned above, with the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract can not be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
In view of the above drawbacks, the present embodiment proposes an object processing method, in which an offline contract equivalent object is moved to an online for processing, a contract processing server such as an internet platform performs security check on the contract equivalent object to generate an checked object for archiving, and the check server performs check on the online object. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
In an optional implementation manner of this embodiment, as shown in fig. 6, the step S502, namely, the step of performing an audit on the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, includes the following steps S601-S602:
in step S601, performing identity verification on the first party information and the second party information;
in step S602, when the first relevant party information and the second relevant party information pass identity authentication, it is determined that the object to be audited passes auditing.
In this embodiment, when the object to be checked is checked, the first relevant party information and the second relevant party information included in the received security information are compared with the pre-obtained relevant party identity authentication information to perform identity authentication, when the first relevant party information and the second relevant party information are in the pre-obtained relevant party identity authentication information, it is determined that the object to be checked is approved through identity authentication by the first relevant party information and the second relevant party information, and otherwise, it is determined that the object to be checked is approved through identity authentication by the first relevant party information and the second relevant party information, and if the object to be checked is not approved, it is determined that the object to be checked is false and illegal, that is, the object to be checked is not approved, and at this time, audit non-passing information can be sent to the object processing server, the audit failure information may include identification information of the object to be audited and an audit failure reason, so that the object processing server archives the audit failure reason according to the identification information of the object to be audited, and sends the audit failure reason to the first device and a second device corresponding to the second related party, where the second device corresponding to the second related party is a device capable of performing an operation with the second related party as an execution subject.
In an optional implementation manner of this embodiment, the method further includes a step of acquiring related party information and a corresponding related party signed file, and performing identity authentication on the related party, that is, as shown in fig. 7, the object processing method includes the following steps S701 to S704:
in step S701, relevant party information and a corresponding relevant party signature file are acquired, and the relevant party is authenticated;
in step S702, receiving security information of an object to be audited, where the security information at least includes first and second party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited;
in step S703, the object to be checked is checked according to the first relevant party information and the second relevant party information of the object to be checked;
in step S704, in response to that the object to be checked passes the checking, an audit signature file is sent to the first device, so that the first device signs the object to be checked according to the audit signature file to obtain an checked object, and sends the checked object to an object processing server.
In order to timely, effectively and quickly verify and audit related parties, before the audit work is executed, the audit server also obtains related party information which is possibly used as a related party of the electronic contract and a corresponding related party signed file in advance to form related party identity authentication information, and simultaneously performs identity authentication on the related party by means of the related party identity authentication information so as to ensure the authenticity and the validity of the corresponding related party signed file.
Technical features in fig. 5 to 7 and the related embodiments are the same as or similar to those in fig. 1 to 4 and the related embodiments, and therefore, for explanation and explanation of the technical features in fig. 5 to 7 and the related embodiments, reference may be made to the explanation and explanation of the corresponding technical features in fig. 1 to 4 and the related embodiments, and the disclosure is not repeated herein.
Fig. 8 shows a flowchart of an object processing method according to another embodiment of the present disclosure, which is suitable for a device corresponding to a first related party, such as an electronic contract first party or the like, as shown in fig. 8, the object processing method includes the following steps S801 to S803:
in step S801, an object to be audited is generated, and the object to be audited is sent to the object processing server, so that the object processing server generates security information based on the object to be audited, and sends the security information to an audit server, so that the audit server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sends an audit signature file to the first device after the audit is passed;
in step S802, in response to receiving the audit signature file sent by the audit server, signing the object to be audited according to the audit signature file to obtain an audited object;
in step S803, the audited object is sent to the object processing server.
As mentioned above, with the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract can not be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
In view of the above drawbacks, in this embodiment, an object processing method is provided, in which an offline contract equivalent object is moved to an online for processing, a first device generates an object to be checked and then sends the object to be checked to a contract processing server such as an internet platform, so as to perform security check on the object such as a contract, generate an checked object for archiving, and perform audit on the online object by the audit server. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
In an optional implementation manner of this embodiment, the object to be audited may be edited and generated in the object processing server, or may be edited and generated in another object processing server, and then is sent to the object processing server.
In an optional implementation manner of this embodiment, after the first device receives the audit signature file sent by the audit server, signing operation may be performed on the object to be audited according to the audit signature file, for example, an electronic seal of a related party, so as to obtain an audited object.
In an optional implementation manner of this embodiment, the method further includes a step of storing the second party information sent by the object processing server in response to receiving the second party information, that is, as shown in fig. 9, the object processing method includes the following steps S901 to S904:
in step S901, generating an object to be audited, sending the object to be audited to the object processing server, so that the object processing server generates security information based on the object to be audited, sending the security information to an auditing server, so that the auditing server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sending an auditing signature file to the first device after the auditing is passed;
in step S902, in response to receiving the second party information sent by the object processing server, storing it;
in step S903, in response to receiving the audit signature file sent by the audit server, signing the object to be audited according to the audit signature file to obtain an audited object;
in step S904, the audited object is sent to the object processing server.
In order to facilitate the first device to archive the second related party information to provide a data base for subsequent related party searching operations, in this embodiment, when the second related party information sent by the object processing server is received, the received second related party information sent by the object processing server is stored.
In an optional implementation manner of this embodiment, before generating an object to be audited, the method further includes a step of sending the first relevant party information and the corresponding relevant party signature file to the audit server, so that the audit server performs identity authentication on the first relevant party, that is, as shown in fig. 10, the object processing method includes the following steps S1001 to S1004:
in step S1001, the first relevant party information and the corresponding relevant party signature file are sent to the auditing server, so that the auditing server performs identity authentication on the first relevant party;
in step S1002, generating an object to be audited, sending the object to be audited to the object processing server, so that the object processing server generates security information based on the object to be audited, sending the security information to an audit server, so that the audit server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sending an audit signature file to the first device after the audit is passed;
in step S1003, in response to receiving the audit signature file sent by the audit server, signing the object to be audited according to the audit signature file to obtain an audited object;
in step S1004, the audited object is sent to the object processing server.
In order to facilitate the auditing server to check and audit related parties timely, effectively and rapidly, before generating an object to be audited, the first related party information and the corresponding related party signed file are sent to the auditing server in advance, so that the auditing server performs identity authentication on the first related party to ensure the authenticity and validity of the corresponding related party signed file.
Technical features in fig. 8 to 10 and the related embodiments are the same as or similar to those in fig. 1 to 7 and the related embodiments, and therefore, for explanation and explanation of the technical features in fig. 8 to 10 and the related embodiments, reference may be made to the explanation and explanation of the corresponding technical features in fig. 1 to 7 and the related embodiments, and the disclosure is not repeated herein.
Fig. 11 shows a flowchart of an object processing method according to still another embodiment of the present disclosure, which is applicable to an object processing system including an object processing server, an audit server, a first device corresponding to a first related party, and a second device corresponding to a second related party, as shown in fig. 11, the object processing method includes the following steps S1101-S1105:
in step S1101, the first device generates an object to be audited, and sends the object to be audited to the object processing server, where the object to be audited is associated with at least a first relevant party and a second relevant party;
in step S1102, the object processing server generates security information of an object to be audited in response to acquiring the object to be audited, and sends the security information of the object to be audited to an audit server, where the security information at least includes first and second related party information of the object to be audited, identification information of the object to be audited, and signature digest information of the object to be audited;
in step S1103, the auditing server receives security information of an object to be audited, audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sends an audit signature file to the first device when the audit of the object to be audited is passed;
in step S1104, the first device receives the audit signature file sent by the audit server, signs the object to be audited according to the audit signature file to obtain an audited object, and sends the audited object to the object processing server;
in step S1105, in response to receiving the operation instruction of the audited object, the object processing server performs an operation on the audited object according to the operation instruction of the audited object.
In an optional implementation manner of this embodiment, in step S1101, before the first device generates the object to be audited, the method further includes the following steps:
and the first equipment sends the first relevant party information and the corresponding relevant party signed file to the auditing server, and the auditing server acquires the relevant party information and the corresponding relevant party signed file and performs identity authentication on the relevant party.
In an optional implementation manner of this embodiment, the method further includes:
and the object processing server determines a first related party and a second related party of the object to be checked, and sends the second related party information to the first equipment, and the first equipment stores the second related party information after receiving the second related party information sent by the object processing server.
In an optional implementation manner of this embodiment, the method further includes:
the object processing server obtains the content information of the checked object, performs signature abstract calculation based on the content information of the checked object to obtain signature abstract information of the checked object, and sends the signature abstract information of the checked object to the checking server.
Technical features in fig. 11 and the related embodiments are the same as or similar to those in fig. 1 to 10 and the related embodiments, and therefore, for explanation and explanation of the technical features in fig. 11 and the related embodiments, reference may be made to the explanation and explanation of the corresponding technical features in fig. 1 to 10 and the related embodiments, and the disclosure is not repeated herein.
Fig. 12 is an overall flowchart of an object processing method according to an embodiment of the present disclosure, and as shown in fig. 12, after the first device generates an object to be checked, the first device sends the object to be checked to the object processing server; after the object processing server obtains an object to be audited, generating safety information of the object to be audited, and sending the safety information of the object to be audited to an auditing server; the auditing server receives the security information of an object to be audited, audits the object to be audited according to first relevant party information and second relevant party information in the security information of the object to be audited, and sends an auditing signature file to the first equipment when the audit of the object to be audited is passed; after receiving the audit signature file sent by the audit server, the first device signs the object to be audited according to the audit signature file to obtain an audited object, and sends the audited object to the object processing server; the object processing server obtains the content information of the checked object, performs signature abstract calculation based on the content information of the checked object to obtain signature abstract information of the checked object, and sends the signature abstract information of the checked object to the checking server, and the object processing server can operate the checked object according to the operation instruction of the checked object in response to receiving the operation instruction of the checked object.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods.
Fig. 13 is a block diagram illustrating a structure of an object processing apparatus according to an embodiment of the present disclosure, which may be implemented as part or all of an electronic device, and may be implemented as an object processing server, through software, hardware, or a combination of both. As shown in fig. 13, the object processing apparatus includes:
a first generating module 1301, configured to generate, in response to acquiring an object to be audited, security information of the object to be audited, where the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least includes first relevant party information and second relevant party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited;
a first sending module 1302, configured to send security information of the object to be audited to an audit server, so that the audit server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and after the audit is passed, send an audit signature file to the first device, so that the first device signs the object to be audited according to the audit signature file, so as to obtain an audited object, and send the audited object to the object processing server;
and the operation module 1303 is configured to, in response to receiving the operation instruction of the audited object, perform an operation on the audited object according to the operation instruction of the audited object.
As mentioned above, with the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract can not be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
In view of the above-mentioned drawbacks, the present embodiment proposes an object processing apparatus that moves an offline contract equivalent object to an online processing unit, and performs a security check on the contract equivalent object by a contract processing server such as an internet platform to generate an checked object, and stores the checked object. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
In an optional implementation manner of this embodiment, the object to be audited refers to an object that includes a certain content, and the content needs to be audited by the audit server, and the object is associated with at least a first relevant party and a second relevant party. The object to be checked may be, for example, an electronic contract which includes contract agreement content and needs to be checked, the electronic contract may include a first related party a and a second related party b, and in some multiparty contracts, the electronic contract may include more related parties in addition to the first related party and the second related party. For convenience of description, in the following embodiments, it is assumed that the object to be audited is only associated with a first correlator and a second correlator, and the first correlator is an object master, that is, equivalent to contract a party or a service receiver, and the second correlator is an object slave, that is, equivalent to contract b party or a service provider, and for the case where a third correlator or other more correlators exist, the assignment of different roles according to which the third correlator or other more correlators are the master or slave may be performed similarly based on the above examples.
In an optional implementation manner of this embodiment, the security information refers to information used for providing to an audit server, so that the audit server performs identification and security audit on the object to be audited. The security information at least comprises first and second related party information of the object to be audited, identification information of the object to be audited and signature summary information of the object to be audited, and the first and second related party information of the object to be audited are used for enabling the auditing server to determine whether the identities of the first and second related parties are legal; the identification information of the object to be audited is used for identifying the object to be audited distinctively so as to search the object to be audited and the audited object obtained subsequently; the signature abstract information of the object to be audited is generated based on the content information of the object to be audited, belongs to an abstract comprising signature information, and is used for being provided for the auditing server, so that the auditing server can compare the signature abstract information of the object to be audited with the signature abstract information of the object to be audited subsequently, the object to be audited and the object to be audited are confirmed not to be tampered in the transmission process, meanwhile, the transmission of the whole text of the object to be audited is avoided, and the safety of information transmission is further enhanced. In an optional implementation manner of this embodiment, the signature summary information of the object to be checked may be, for example, signature summary information obtained by using an md5 algorithm.
In an optional implementation manner of this embodiment, the audit server refers to a party performing audit on an object to be audited, for example, if the object to be audited is an electronic contract, the audit server may be a party capable of verifying authenticity and validity of identities of two parties of the contract of the electronic contract. For example, if first relevant party information and second relevant party information about an electronic contract to be checked, which are sent by the object processing server, are received, the checking server may verify the authenticity and validity of the identities of both parties of the electronic contract based on the identity authentication information obtained in advance, and after the verification and the verification are confirmed to be passed, determine and send an audit signing document to a leading party of the electronic contract, so that the leading party of the electronic contract signs the object to be checked according to the audit signing document, and obtains the checked object. The audit signing document refers to a document which is stored in advance and can be loaded in the object to be audited to change the object to be audited into an audited object, such as an electronic seal, an electronic contract seal and the like of the party related to the electronic contract.
After receiving the audited object sent by the first device, the object processing server may operate on the audited object according to the received audited object operation instruction. The audited object operation instruction may be, for example, an archiving instruction, a query instruction, a data update instruction, or the like. The failure of the related party of the audited object means that if the audited object is detected to exceed the validity period, a failure operation needs to be executed on a second related party related to the audited object. The first device corresponding to the first related party may be a device capable of performing an operation mainly performed by the first related party, the first device may be a different device from the object processing server or may be the same device, and when the first device and the object processing server are the same device, signal interaction between the first device and the object processing server may be omitted.
In an optional implementation manner of this embodiment, as shown in fig. 14, the first generating module 1301 includes:
a generating submodule 1401, configured to generate, in response to acquiring an object to be checked, identification information of the object to be checked, where the identification information is used to perform distinctive identification on the object to be checked;
the calculating submodule 1402 is configured to obtain content information of the object to be checked, and perform signature summary calculation based on the content information of the object to be checked to obtain signature summary information of the object to be checked;
the combining sub-module 1403 is configured to obtain the first relevant party information and the second relevant party information of the object to be audited, and form the security information of the object to be audited with the identification information of the object to be audited and the signature summary information of the object to be audited.
In the above, the security information refers to information that is provided to an audit server to enable the audit server to perform identification and security audit on the object to be audited, where the security information at least includes first related party information and second related party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited. In this embodiment, when generating security information, the generation sub-module 1401 generates identification information capable of performing distinctive identification on an object to be audited according to the obtained object to be audited, where the identification information may be, for example, a character string having a certain length, such as a numeric string and a letter string, and the length of the character string is related to the number of objects to be audited that need to be identified; the calculating submodule 1402 obtains content information of the object to be checked, and performs signature digest calculation based on the content information of the object to be checked to obtain signature digest information of the object to be checked, where the content information of the object to be checked refers to all content information of the object to be checked, the signature digest calculation may be, for example, md5, and the signature digest calculation may be used to obtain digest information of the object to be checked, including the signature information; the combining sub-module 1403 obtains the first relevant party information and the second relevant party information of the object to be audited, and forms the security information of the object to be audited with the identification information of the object to be audited and the signature summary information of the object to be audited.
In an optional implementation manner of this embodiment, before the first sending module 1302, the apparatus further includes a portion that determines a first relevant party and a second relevant party of the object to be audited, and sends the second relevant party information to the first device, that is, as shown in fig. 15, the apparatus includes:
a first generating module 1501, configured to generate security information of an object to be audited in response to obtaining the object to be audited, where the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least includes identification information of the object to be audited and signature summary information of the object to be audited;
a second sending module 1502 configured to determine a first relevant party and a second relevant party of the object to be audited, and send the second relevant party information to the first device;
a first sending module 1503, configured to send security information of the object to be audited to an audit server, so that the audit server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and after the audit is passed, send an audit signature file to the first device, so that the first device signs the object to be audited according to the audit signature file, obtain an audited object, and send the audited object to the object processing server;
an operation module 1504 configured to, in response to receiving an operation instruction for an audited object, perform an operation on the audited object according to the operation instruction for the audited object.
In order to facilitate the first device to archive the second related party information to provide a data basis for subsequent related party searching operations, in this embodiment, before sending the security information of the object to be audited to the auditing server for auditing, the second sending module 1502 further sends the second related party information to the first device, where the related party information may include one or more of the following information: the name of the related party, the identification information of the related party, and the like, for example, if the related party is an enterprise, the name of the related party refers to the name of the enterprise, and the identification information of the related party refers to information that can be used for identifying the identity of the enterprise, such as social unification credit information of the enterprise; if the related party is an individual, the name of the related party refers to the name of the individual, and the identification information of the related party refers to information which can be used for identifying the identity of the individual, such as identification card information, passport information, military officer license information and the like.
In an optional implementation manner of this embodiment, the apparatus further includes a portion that acquires content information of the audited object, performs signature digest calculation based on the content information of the audited object to obtain signature digest information of the audited object, and sends the signature digest information of the audited object to the audit server, that is, as shown in fig. 16, the apparatus includes:
a first generating module 1601, configured to generate, in response to acquiring an object to be audited, security information of the object to be audited, where the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least includes identification information of the object to be audited and signature summary information of the object to be audited;
a first sending module 1602, configured to send the security information of the object to be audited to an audit server, so that the audit server audits the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, and after the audit is passed, send an audit signature file to the first device, so that the first device signs the object to be audited according to the audit signature file, so as to obtain an audited object, and send the audited object to the object processing server;
an operation module 1603 configured to, in response to receiving an operation instruction of an audited object, perform an operation on the audited object according to the operation instruction of the audited object;
the calculating module 1604 is configured to obtain content information of the audited object, perform signature digest calculation based on the content information of the audited object to obtain signature digest information of the audited object, and send the signature digest information of the audited object to the auditing server.
In this embodiment, after receiving the audited object, the calculation module 1604 further performs signature digest calculation according to the content information of the audited object to obtain signature digest information of the audited object, and then sends the signature digest information of the audited object to the audit server. Similarly to the above, the signature digest calculation may be, for example, an md5 calculation method, and the signature digest calculation may be used to obtain digest information of the audited object including signature information.
Fig. 17 shows a flowchart of an object processing method according to another embodiment of the present disclosure, which may be implemented as an audit server, such as an audit server, an audit platform, or the like, and as shown in fig. 17, the object processing apparatus includes:
a receiving module 1701 configured to receive security information of an object to be audited, where the security information at least includes first and second party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited;
an auditing module 1702 configured to audit the object to be audited according to the first and second stakeholder information of the object to be audited;
a third sending module 1703, configured to send, in response to the audit of the object to be audited passing, an audit signature file to the first device, so that the first device signs the object to be audited according to the audit signature file to obtain an audited object, and sends the audited object to an object processing server.
As mentioned above, with the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract can not be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
In view of the above-mentioned drawbacks, the present embodiment proposes an object processing apparatus that moves an offline contract equivalent object to an online processing unit, performs security verification on the contract equivalent object by a contract processing server such as an internet platform, generates an approved object, archives the approved object, and performs verification on the online object by an audit server. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
In an optional implementation manner of this embodiment, as shown in fig. 18, the auditing module 1702 includes:
a verification sub-module 1801 configured to perform identity verification on the first and second related party information;
the determining submodule 1802 is configured to determine that the object to be audited passes the audit when the first relevant party information and the second relevant party information pass the authentication.
In this embodiment, when the object to be checked is checked, the verification sub-module 1801 compares the first relevant party information and the second relevant party information included in the received security information with the pre-obtained relevant party identity authentication information, performs identity verification, when the first relevant party information and the second relevant party information are in the pre-obtained relevant party identity authentication information, the determining sub-module 1802 determines that the first relevant party information and the second relevant party information are true and legal, and may determine that the object to be checked can be checked through identity verification by the first relevant party information and the second relevant party information, otherwise, it may determine that the object to be checked can be checked through identity verification by the first relevant party information and the second relevant party information are false and illegal, that is, the object to be checked cannot pass the verification, and may send information that the object processing server fails to verify, the audit failure information may include identification information of the object to be audited and an audit failure reason, so that the object processing server archives the audit failure reason according to the identification information of the object to be audited, and sends the audit failure reason to the first device and a second device corresponding to the second related party, where the second device corresponding to the second related party is a device capable of performing an operation with the second related party as an execution subject.
In an optional implementation manner of this embodiment, the apparatus further includes a part for acquiring the relevant party information and the corresponding relevant party signed file, and performing identity authentication on the relevant party, that is, as shown in fig. 19, the object processing apparatus includes:
an authentication module 1901 configured to obtain related party information and a corresponding related party signed document, and perform identity authentication on the related party;
a receiving module 1902, configured to receive security information of an object to be audited, where the security information at least includes first and second party information of the object to be audited, identification information of the object to be audited, and signature summary information of the object to be audited;
an auditing module 1903 configured to audit the object to be audited according to the first and second stakeholder information of the object to be audited;
a third sending module 1904, configured to send, in response to that the object to be checked passes the checking, a checking and signing file to the first relevant party, so that the first relevant party signs the object to be checked according to the checking and signing file to obtain a checked object, and sends the checked object to an object processing server.
In order to timely, effectively and quickly verify and audit related parties, before the audit work is executed, the audit server also obtains related party information which is possibly used as a related party of the electronic contract and a corresponding related party signed file in advance to form related party identity authentication information, and simultaneously performs identity authentication on the related party by means of the related party identity authentication information so as to ensure the authenticity and the validity of the corresponding related party signed file.
Technical features in fig. 17 to 19 and the related embodiments are the same as or similar to those in fig. 13 to 16 and the related embodiments, so that reference may be made to the above explanation and description of the technical features in fig. 17 to 19 and the related embodiments for the explanation and description of the corresponding technical features in fig. 13 to 16 and the related embodiments, and the detailed description of the disclosure is omitted here.
Fig. 20 is a flowchart of an object processing method according to another embodiment of the present disclosure, which may be implemented as a first device corresponding to a first related party, such as an electronic contract first party, and the like, as shown in fig. 20, the object processing apparatus includes:
a second generating module 2001, configured to generate an object to be audited, send the object to be audited to the object processing server, so that the object processing server generates security information based on the object to be audited, send the security information to an auditing server, so that the auditing server audits the object to be audited according to first and second relevant party information of the object to be audited, and send an auditing signature file to the first device after the auditing is passed;
a signing module 2002 configured to, in response to receiving the audit signing file sent by the audit server, sign the object to be audited according to the audit signing file to obtain an audited object;
a fourth sending module 2003 configured to send the audited object to the object handling server.
As mentioned above, with the development of internet technology, more and more service providers provide services to users or other service demanders through internet platforms. In order to agree and restrict service content, service behavior and other contents of service-related parties such as a service provider and a service receiver, the service-related parties usually need to sign a service contract, and in the prior art, signing and checking of the service contract are usually performed online, and then a courier performs delivery circulation of a paper contract between the service-related parties. This prior art approach has the following drawbacks: 1. the contract can not be timely and effectively recorded and filed, the contract is only transferred among service related parties, the monitoring strength of the internet platform on the contract is weak, the efficiency cannot be regulated, and high legal risks exist; 2. when the contract is updated, the internet platform cannot know the contract in time, and further unnecessary loss is possibly caused by the change of the contract information; 3. the efficiency of offline contract and express delivery is low, and the filing capability is weak.
In view of the above drawbacks, in this embodiment, an object processing apparatus is provided, which moves an offline contract equivalent object to an online for processing, and a first device generates an object to be checked and then sends the object to be checked to a contract processing server, such as an internet platform, so as to perform a security check on the object, such as a contract, to generate an checked object for archiving, and the check server performs a check on the online object. According to the technical scheme, objects such as contracts and the like can be effectively recorded and filed in time, the monitoring strength of the contracts is enhanced, high law risks are reduced, possible asset loss is reduced, meanwhile, the express delivery efficiency of the contract equivalent objects is improved, and the filing capacity is enhanced.
In an optional implementation manner of this embodiment, the object to be audited may be edited and generated in the object processing server, or may be edited and generated in another object processing server, and then is sent to the object processing server.
In an optional implementation manner of this embodiment, after the first device receives the audit signature file sent by the audit server, signing operation may be performed on the object to be audited according to the audit signature file, for example, an electronic seal of a related party, so as to obtain an audited object.
In an optional implementation manner of this embodiment, the apparatus further includes a portion that stores the second party information sent by the object processing server in response to receiving the second party information, that is, as shown in fig. 21, the object processing apparatus includes:
a second generating module 2101 configured to generate an object to be audited, send the object to be audited to the object processing server, enable the object processing server to generate security information based on the object to be audited, send the security information to an audit server, enable the audit server to audit the object to be audited according to first and second relevant party information of the object to be audited, and send an audit signature file to the first device after the audit is passed;
a storage module 2102 configured to store the second party information sent by the object processing server in response to receiving the second party information;
a signing module 2103, configured to respond to receiving the audit signing file sent by the audit server, sign the object to be audited according to the audit signing file, and obtain an audited object;
a fourth sending module 2104 configured to send the audited object to the object processing server.
In order to facilitate the first device to archive the second related party information to provide a data base for subsequent related party searching operations, in this embodiment, the storage module 2102 stores the received second related party information sent by the object processing server when receiving the second related party information sent by the object processing server.
In an optional implementation manner of this embodiment, before generating the object to be audited, the apparatus further includes a part that sends the first relevant party information and the corresponding relevant party signature file to the audit server, so that the audit server performs identity authentication on the first relevant party, that is, as shown in fig. 22, the object processing apparatus includes:
a fifth sending module 2201, configured to send the first relevant party information and the corresponding relevant party signature file to the auditing server, so that the auditing server performs identity authentication on the first relevant party;
a second generating module 2202, configured to generate an object to be audited, send the object to be audited to the object processing server, enable the object processing server to generate security information based on the object to be audited, send the security information to an auditing server, enable the auditing server to audit the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and send an auditing signature file to the first device after the auditing is passed;
a signing module 2203, configured to respond to the received audit signing file sent by the audit server, sign the object to be audited according to the audit signing file, and obtain an audited object;
a fourth sending module 2204 configured to send the audited object to the object processing server.
In order to facilitate the auditing server to perform timely, effective, and rapid verification and audit on the relevant party, before the object to be audited is generated, the fifth sending module 2201 further sends the first relevant party information and the corresponding relevant party signed file to the auditing server in advance, so that the auditing server performs identity authentication on the first relevant party to ensure the authenticity and validity of the corresponding relevant party signed file.
Technical features in fig. 20 to 22 and the related embodiments are the same as or similar to those in fig. 13 to 19 and the related embodiments, and therefore, for explanation and explanation of the technical features in fig. 20 to 22 and the related embodiments, reference may be made to the explanation and explanation of the corresponding technical features in fig. 13 to 19 and the related embodiments, and the disclosure is not repeated herein.
Fig. 23 illustrates a flowchart of an object processing method according to still another embodiment of the present disclosure, which may be implemented as an object processing system including an object processing server, an auditing server, a device corresponding to a first stakeholder, and a device corresponding to a second stakeholder, as illustrated in fig. 23, the object processing apparatus including:
the first device 2301 is configured to generate an object to be audited, send the object to be audited to the object processing server, receive an audit signature file sent by the audit server, sign the object to be audited according to the audit signature file to obtain an audited object, and send the audited object to the object processing server, where the object to be audited is associated with at least a first related party and a second related party;
the object processing server 2302 is configured to generate security information of an object to be audited in response to an object to be audited being acquired, send the security information of the object to be audited to an auditing server, and perform an operation on the audited object according to an operation instruction of the audited object in response to receiving an operation instruction of the audited object, where the security information at least includes first and second party information of the audited object, identification information of the audited object, and signature summary information of the audited object;
the auditing server 2303 is configured to receive security information of an object to be audited, audit the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, and send an audit signature file to the first device when the object to be audited passes the audit.
In an optional implementation manner of this embodiment, before the first device 2301 generates the object to be audited, it is further configured to:
and the first equipment sends the first relevant party information and the corresponding relevant party signed file to the auditing server, and the auditing server acquires the relevant party information and the corresponding relevant party signed file and performs identity authentication on the relevant party.
In an optional implementation manner of this embodiment, the object processing server 2302 is further configured to determine a first relevant party and a second relevant party of the object to be audited, and send the second relevant party information to the first device, where the first device stores the second relevant party information sent by the object processing server after receiving the second relevant party information.
In an optional implementation manner of this embodiment, the object processing server 2302 is further configured to obtain content information of the audited object, perform signature digest calculation based on the content information of the audited object to obtain signature digest information of the audited object, and send the signature digest information of the audited object to the auditing server.
Technical features in fig. 23 and the related embodiments are the same as or similar to those in fig. 13 to fig. 22 and the related embodiments, and therefore, for explanation and explanation of the technical features in fig. 23 and the related embodiments, reference may be made to the explanation and explanation of the corresponding technical features in fig. 13 to fig. 22 and the related embodiments, and the disclosure is not repeated herein.
The present disclosure also discloses an electronic device, fig. 24 shows a block diagram of the electronic device according to an embodiment of the present disclosure, and as shown in fig. 24, the electronic device 2400 includes a memory 2401 and a processor 2402; wherein the content of the first and second substances,
the memory 2401 is used to store one or more computer instructions that are executed by the processor 2402 to implement the above-described method steps.
Fig. 25 is a schematic block diagram of a computer system suitable for implementing an object processing method according to an embodiment of the present disclosure.
As shown in fig. 25, the computer system 2500 includes a Central Processing Unit (CPU)2501 which can execute various processes in the above-described embodiments according to a program stored in a Read Only Memory (ROM)2502 or a program loaded from a storage portion 2508 into a Random Access Memory (RAM) 2503. In the RAM2503, various programs and data necessary for the operation of the system 2500 are also stored. The CPU2501, ROM2502, and RAM2503 are connected to each other via a bus 2504. An input/output (I/O) interface 2505 is also connected to bus 2504.
The following components are connected to the I/O interface 2505: an input portion 2506 including a keyboard, a mouse, and the like; an output portion 2507 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage portion 2508 including a hard disk and the like; and a communication section 2509 including a network interface card such as a LAN card, a modem, or the like. The communication section 2509 performs communication processing via a network such as the internet. A driver 2510 is also connected to the I/O interface 2505 as needed. A removable medium 2511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 2510 as necessary, so that a computer program read out therefrom is mounted in the storage portion 2508 as necessary.
In particular, the above described methods may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a medium readable thereby, the computer program comprising program code for performing the object processing method described above. In such embodiments, the computer program may be downloaded and installed from a network via communications portion 2509, and/or installed from removable media 2511.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowcharts or block diagrams may represent a module, a program segment, or a portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present disclosure may be implemented by software or hardware. The units or modules described may also be provided in a processor, and the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
As another aspect, the present disclosure also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus in the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present disclosure.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is possible without departing from the inventive concept. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.

Claims (10)

1. An object processing method, which is suitable for an object processing server, is characterized by comprising the following steps:
in response to the acquisition of an object to be audited, generating security information of the object to be audited, wherein the object to be audited is associated with at least a first relevant party and a second relevant party, and the security information at least comprises first relevant party information and second relevant party information of the object to be audited, identification information of the object to be audited and signature summary information of the object to be audited;
sending the security information of the object to be audited to an auditing server so that the auditing server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, sending an auditing signature file to first equipment corresponding to the first relevant party after the auditing is passed so that the first equipment signs the object to be audited according to the auditing signature file to obtain an audited object, and sending the audited object to the object processing server;
and responding to the received operation instruction of the audited object, and operating the audited object according to the operation instruction of the audited object.
2. An object processing method is suitable for an auditing server, and is characterized by comprising the following steps:
receiving safety information of an object to be audited, wherein the safety information at least comprises first related party information and second related party information of the object to be audited, identification information of the object to be audited and signature abstract information of the object to be audited;
auditing the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited;
and responding to the approval of the object to be approved, sending an approval signing file to the first equipment so that the first equipment signs the object to be approved according to the approval signing file to obtain the approved object, and sending the approved object to an object processing server.
3. An object processing method, adapted to a first device corresponding to a first related party, includes:
generating an object to be audited, sending the object to be audited to the object processing server, enabling the object processing server to generate safety information based on the object to be audited, sending the safety information to an auditing server, enabling the auditing server to audit the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sending an auditing signature file to the first equipment after the auditing is passed;
in response to receiving the verification signing file sent by the verification server, signing the object to be verified according to the verification signing file to obtain a verified object;
and sending the audited object to the object processing server.
4. An object processing method is applicable to an object processing system comprising an object processing server, an auditing server, first equipment corresponding to a first related party and second equipment corresponding to a second related party, and is characterized by comprising the following steps:
the first equipment generates an object to be audited and sends the object to be audited to the object processing server, wherein the object to be audited is at least associated with a first related party and a second related party;
the object processing server responds to the acquisition of an object to be audited, generates safety information of the object to be audited, and sends the safety information of the object to be audited to an auditing server, wherein the safety information at least comprises first relevant party information and second relevant party information of the object to be audited, identification information of the object to be audited and signature abstract information of the object to be audited;
the auditing server receives security information of an object to be audited, audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sends an auditing signature file to the first equipment when the audit of the object to be audited is passed;
the first equipment receives the audit signing file sent by the audit server, signs the object to be audited according to the audit signing file to obtain an audited object, and sends the audited object to the object processing server;
and the object processing server responds to the received operation instruction of the audited object and operates the audited object according to the operation instruction of the audited object.
5. An object processing apparatus adapted to an object processing server, comprising:
the system comprises a first generation module, a second generation module and a verification module, wherein the first generation module is configured to respond to the acquisition of an object to be verified and generate security information of the object to be verified, the object to be verified is at least associated with a first related party and a second related party, and the security information at least comprises first related party information and second related party information of the object to be verified, identification information of the object to be verified and signature summary information of the object to be verified;
the first sending module is configured to send the security information of the object to be audited to an auditing server, so that the auditing server audits the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and sends an auditing signature file to the first equipment after the auditing is passed, so that the first equipment signs the object to be audited according to the auditing signature file to obtain an audited object, and sends the audited object to the object processing server;
and the operation module is configured to respond to the received operation instruction of the audited object and operate the audited object according to the operation instruction of the audited object.
6. An object processing apparatus adapted to an audit server, comprising:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is configured to receive safety information of an object to be verified, and the safety information at least comprises first related party information and second related party information of the object to be verified, identification information of the object to be verified and signature summary information of the object to be verified;
the auditing module is configured to audit the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited;
and the third sending module is configured to send an audit signing file to the first device in response to the audit of the object to be audited passing, so that the first device signs the object to be audited according to the audit signing file to obtain an audited object, and sends the audited object to an object processing server.
7. An object processing apparatus adapted to a first device corresponding to a first party, comprising:
the second generation module is configured to generate an object to be audited, send the object to be audited to the object processing server, enable the object processing server to generate security information based on the object to be audited, send the security information to an audit server, enable the audit server to audit the object to be audited according to first relevant party information and second relevant party information of the object to be audited, and send an audit signature file to the first device after the audit is passed;
the signing module is configured to respond to the received audit signing file sent by the audit server, sign the object to be audited according to the audit signing file, and obtain the audited object;
a fourth sending module configured to send the audited object to the object processing server.
8. An object processing apparatus adapted to an object processing system including an object processing server, an audit server, a first device corresponding to a first related party, and a second device corresponding to a second related party, comprising:
the device comprises a first device, a second device and a third device, wherein the first device is configured to generate an object to be audited, send the object to be audited to an object processing server, receive an audit signature file sent by the audit server, sign the object to be audited according to the audit signature file to obtain an audited object, and send the audited object to the object processing server, wherein the object to be audited is at least associated with a first related party and a second related party;
the object processing server is configured to respond to the acquisition of an object to be audited, generate security information of the object to be audited, send the security information of the object to be audited to the auditing server, respond to the reception of an operation instruction of the audited object, and operate on the audited object according to the operation instruction of the audited object, wherein the security information at least comprises first and second correlative party information of the object to be audited, identification information of the object to be audited, and signature abstract information of the object to be audited;
and the auditing server is configured to receive the security information of the object to be audited, audit the object to be audited according to the first relevant party information and the second relevant party information of the object to be audited, and send an auditing and signing file to the first equipment when the audit of the object to be audited is passed.
9. An electronic device comprising a memory and at least one processor; wherein the memory is to store one or more computer instructions, wherein the one or more computer instructions are to be executed by the at least one processor to implement the method steps of any one of claims 1-4.
10. A computer-readable storage medium having stored thereon computer instructions, characterized in that the computer instructions, when executed by a processor, carry out the method steps of any of claims 1-4.
CN202010082955.1A 2020-02-07 2020-02-07 Object processing method and device, electronic equipment and computer readable storage medium Pending CN111311179A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010082955.1A CN111311179A (en) 2020-02-07 2020-02-07 Object processing method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010082955.1A CN111311179A (en) 2020-02-07 2020-02-07 Object processing method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111311179A true CN111311179A (en) 2020-06-19

Family

ID=71161694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010082955.1A Pending CN111311179A (en) 2020-02-07 2020-02-07 Object processing method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111311179A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831661A (en) * 2020-07-20 2020-10-27 江苏云柜网络技术有限公司 Database filing method based on express business logic
WO2022161012A1 (en) * 2021-01-28 2022-08-04 京东科技控股股份有限公司 Method and device for updating digital certificate of electronic signature, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109345257A (en) * 2018-09-19 2019-02-15 江苏满运软件科技有限公司 The method, apparatus of electronic contract signature, electronic equipment, storage medium
CN109586919A (en) * 2018-12-03 2019-04-05 杭州仟金顶信息科技有限公司 A kind of online contract signs method automatically
US20190213564A1 (en) * 2015-08-13 2019-07-11 The Toronto-Dominion Bank Systems and methods for implementing hybrid public-private block-chain ledgers
CN110232633A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 A kind of electronic signature method, apparatus, storage medium and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190213564A1 (en) * 2015-08-13 2019-07-11 The Toronto-Dominion Bank Systems and methods for implementing hybrid public-private block-chain ledgers
CN109345257A (en) * 2018-09-19 2019-02-15 江苏满运软件科技有限公司 The method, apparatus of electronic contract signature, electronic equipment, storage medium
CN109586919A (en) * 2018-12-03 2019-04-05 杭州仟金顶信息科技有限公司 A kind of online contract signs method automatically
CN110232633A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 A kind of electronic signature method, apparatus, storage medium and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831661A (en) * 2020-07-20 2020-10-27 江苏云柜网络技术有限公司 Database filing method based on express business logic
WO2022161012A1 (en) * 2021-01-28 2022-08-04 京东科技控股股份有限公司 Method and device for updating digital certificate of electronic signature, and storage medium

Similar Documents

Publication Publication Date Title
CN108551437B (en) Method and apparatus for authenticating information
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
EP4089623A1 (en) Blockchain-implemented method and system
CN111163182B (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN110290522B (en) Risk identification method and device for mobile equipment and computer system
CN109669986A (en) Blacklist sharing method, device, equipment and storage medium based on block chain
US10812271B2 (en) Privacy control using unique identifiers associated with sensitive data elements of a group
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN111709860A (en) Homote advice processing method, device, equipment and storage medium
CN111311179A (en) Object processing method and device, electronic equipment and computer readable storage medium
CN109889410B (en) Method, system, device, proxy equipment and storage medium for testing service function
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN113129008A (en) Data processing method and device, computer readable medium and electronic equipment
CN112598810A (en) Exhibition entrance processing method and device
CN108052842B (en) Signature data storage and verification method and device
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN114172663B (en) Business right determining method and device based on block chain, storage medium and electronic equipment
CN112100178B (en) Delegation authorization verification method and system
CN114095200A (en) Resource access authority management method and device, electronic equipment and medium
CN113836566B (en) Model processing method, device, equipment and medium based on block chain system
CN112560055B (en) Credible electronic license system based on PKI technology and working method
CN116720773B (en) Bid-inviting method and device based on block bid evaluation
CN116846564B (en) Signature verification method, system, terminal and storage medium supporting multiple algorithms
CN117335976A (en) Block chain-based key processing method, device, equipment, medium and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200619