CN111414629B - Electronic contract signing device - Google Patents

Electronic contract signing device Download PDF

Info

Publication number
CN111414629B
CN111414629B CN201910290030.3A CN201910290030A CN111414629B CN 111414629 B CN111414629 B CN 111414629B CN 201910290030 A CN201910290030 A CN 201910290030A CN 111414629 B CN111414629 B CN 111414629B
Authority
CN
China
Prior art keywords
contract
user equipment
online
electronic
digest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910290030.3A
Other languages
Chinese (zh)
Other versions
CN111414629A (en
Inventor
潘晓慧
林家庆
洪家佑
康家豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Qianwang Information Technology Co ltd
Original Assignee
Suzhou Qianwang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Qianwang Information Technology Co ltd filed Critical Suzhou Qianwang Information Technology Co ltd
Publication of CN111414629A publication Critical patent/CN111414629A/en
Application granted granted Critical
Publication of CN111414629B publication Critical patent/CN111414629B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

An electronic contract signing device is applicable to electronic contract data, and comprises an online contract server, a first user device and a second user device, wherein the online contract server pre-stores the electronic contract data and a plurality of account identification codes, provides a plurality of private keys and public keys, distributes the private keys to the first user device and the second user device, the first user device encrypts a contract abstract related to the electronic contract data by the private keys to generate a first encrypted abstract, the second user device encrypts the first encrypted abstract by the private keys to generate a second encrypted abstract, and the online contract server verifies the second encrypted abstract by the corresponding public keys, and records the electronic contract data as a valid contract when verification is successful.

Description

Electronic contract signing device
Technical Field
The present invention relates to a device for protecting computer device components, programs or data from unauthorized actions, and more particularly to a system for protecting data access, such as using keys or controlling access rules, or for protecting data integrity, such as checking, verifying or signing, by a platform.
Background
With the development of information technology and encryption technology, the signing and saving forms of the existing paper contracts are gradually changed into program logic which is readable by an electronic operation processing device (such as a computer) and changed into electronic contracts with confidentiality through various encryption technologies.
However, when a party transfers an electronic contract through the internet, a main problem is: how to prevent interception and impersonation by non-affiliated parties or unauthorized malicious third parties and further read and tamper with the content of the electronic contract is one of the main research subjects in the field of information security at present, and how to transfer and store the electronic contract in a safe and reliable manner.
Disclosure of Invention
The object of the present invention is to provide an electronic contract signing device capable of preventing an unauthorized person from reading and falsifying the content of an electronic contract.
The invention relates to an electronic contract signing device, which is applicable to electronic contract data, wherein the electronic contract data corresponds to one of an effective state and an ineffective state.
The online contract server stores the electronic contract data and a plurality of account identification codes, provides a plurality of private keys respectively corresponding to the account identification codes, and stores a plurality of public keys respectively corresponding to the private keys.
The first user equipment corresponds to one of the account identification codes and is in communication connection with the online contract server.
The second user equipment corresponds to the other account identification code and is in communication connection with the online contract server.
The online contract server distributes a private key corresponding to the account identification code of the first user equipment to the first user equipment.
The first user equipment encrypts a contract abstract related to the electronic contract data by using the private key to generate a first encrypted abstract, and transmits the first encrypted abstract to the second user equipment.
The online contract server distributes a private key corresponding to the account identifier of the second user device to the second user device.
The second user equipment encrypts the first encrypted digest by the private key to generate a second encrypted digest, and transmits the second encrypted digest to the online contract server.
The online contract server sequentially verifies the second encryption abstract by using public keys corresponding to private keys of the second user equipment and the first user equipment, and when judging that the data after verifying the second encryption abstract is identical to the prestored contract abstract corresponding to the electronic contract data, the online contract server records that the electronic contract data corresponds to the valid state.
Preferably, the online contract server decrypts the second encrypted digest with the public key corresponding to the private key transmitted to the second user equipment, and then decrypts the first encrypted digest with the public key corresponding to the private key transmitted to the first user equipment after judging that the decrypted data is the first encrypted digest, and records that the electronic contract data corresponds to the valid state when judging that the decrypted data is the same as the contract digest corresponding to the electronic contract data.
Preferably, the first user equipment hashes the electronic contract data to generate the contract digest.
Preferably, the online contract server hashes the stored electronic contract data to generate the contract digest.
Preferably, the electronic contract signing device further comprises a verification device, the second user device further transmits the second encrypted digest to the first user device, the verification device receives a connection code indicating the second encrypted digest from one of the first user device and the second user device, the verification device is in communication connection with the online contract server according to the connection code, the online contract server sequentially decrypts the second encrypted digest indicated by the connection code corresponding to the public keys of the second user device and the first user device, and when the online contract server judges that the information generated after decryption is the same as the contract digest generated by hash operation of the electronic contract data, the online contract server transmits the electronic contract data to the verification device.
Preferably, the electronic contract signing device further comprises a verification device, the second user device further transmits the second encrypted digest to the first user device, the verification device receives a link code indicating the second encrypted digest from one of the first user device and the second user device, the verification device is in communication connection with the online contract server according to the link code, the link code is provided with a timestamp indicating an aging interval, when the online contract server judges that the time point of the communication connection with the verification device is in the aging interval, the online contract server sequentially decrypts the second encrypted digest indicated by the link code corresponding to the public keys of the second user device and the first user device, and when the online contract server judges that the information generated after decryption is identical to the contract digest generated by the hash operation of the electronic contract data, the online contract server transmits the electronic contract data to the verification device.
The invention has the following effects: the method comprises the steps of encrypting a contract abstract corresponding to electronic contract data by using a private key distributed by an online contract server through a first user device and a second user device of two account identification codes corresponding to the online contract server to generate a second encrypted contract, verifying the second encrypted contract by using the public key sequentially distributed by the online contract server to the second user device and the private key of the first user device, judging that the electronic contract data is an effective contract when the verification result is the same as the contract abstract corresponding to the prestored electronic contract data, and preventing prestored electronic contract data from being electronic contract data which is not falsified and re-uploaded by a malicious third party which is one of the first user device and the second user device.
Drawings
Other features and advantages of the present invention will become apparent from the following description of the embodiments with reference to the drawings, in which:
FIG. 1 is a block diagram illustrating an embodiment of an electronic contract signing apparatus in accordance with the present invention;
FIG. 2 is a flow chart illustrating an electronic contract signing method performed by the embodiment;
FIG. 3 is a flow chart illustrating a third party access authentication procedure performed by the embodiment; a kind of electronic device with high-pressure air-conditioning system
FIG. 4 is a flow chart illustrating a specific business application performed by the embodiment.
Detailed Description
Referring to fig. 1, an embodiment of an electronic contract signing apparatus for electronic contract data 2 is provided based on the existing asymmetric encryption mechanism, wherein the electronic contract data 2 corresponds to one of a valid state and a non-valid state, and the electronic contract signing apparatus comprises an online contract server 3, a first user equipment 4, a second user equipment 5, and a verification device 6.
The online contract server 3 pre-stores the electronic contract data 2 and a plurality of account identification codes, provides a plurality of private keys (private keys) corresponding to the account identification codes respectively, and stores a plurality of Public keys (Public keys) corresponding to the private keys respectively, and it should be further explained that the online contract server 3 performs information encryption by Public-key cryptology (or asymmetric encryption (Asymmetric cryptography) mechanism), and performs hash operation (e.g. SHA-256 hash function) on the electronic contract data 2 to generate a contract digest, so as to reduce the amount of data required to be compared in the subsequent data verification, and the online contract server 3 belongs to a certificate issuing operation server with a third party Public trust authority, which can be installed in an internal administrative natural personnel certificate management center, an economic agency certificate management center, an organization and certificate management center, or any legal certificate center, or in a certificate management center of other business owners, such as a financial IC card, a first government certificate is installed in a mobile phone certificate management center of a mobile phone business government, and a second business certificate is a first business certificate device of the mobile phone business government, and the second business certificate is a first business certificate device of the mobile phone 4 is a Public contract file of the electronic contract device of the electronic contract server 4: txt, pdf, docx, and the online contract server 3 stores the electronic contract data 2 in the form of a Cloud database (Cloud SQL) or a blockchain (blockchain), which can provide access to data services in real time.
The first user device 4 corresponds to one of the account identification codes and is communicatively connected to the online contract server 3.
The second user device 5 corresponds to the other one of the account identification codes and is communicatively connected to the online contract server 3.
Further, the first and second user devices 4 and 5 are legal users registered in advance in the online contract server 3, and thus each correspond to an account identification code, and the electronic contract data 2 is signed together in advance for both the first and second user devices 4 and 5, and stored in the electronic contract file of the online contract server 3.
The authentication device 6 is adapted to be communicatively connected to the first and second user devices 4,5 and the online contract server 3 and to read the electronic contract data 2.
Referring to fig. 2, an electronic contract signing method executed in this embodiment is described next, which includes a hash operation step 71, a first distributing private key step 72, a first encryption step 73, a first transmission ciphertext step 74, a first distributing private key step 75, a second encryption step 76, a second transmission ciphertext step 77, a first verification ciphertext step 78, and a contract status determination step 79.
The hash operation step 71 is to hash the electronic contract data 2 with SHA-256 hash function by the first ue 4 to generate a contract digest, and it should be noted that, since the contract digest is subjected to hash compression operation, the information content of the contract digest is lower than that of the electronic contract data 2, the data amount during transmission can be reduced, and the contract digest of the first ue 4 is the same as that of the online contract server 3.
The first private key distributing step 72 distributes a private key corresponding to the account identifier of the first user equipment 4 to the first user equipment 4 for the online contract server 3, i.e. if a user equipment does not correspond to one of the account identifiers stored in the online contract server 3, the private key provided by the online contract server 3 cannot be used.
The first encryption step 73 generates a first encrypted digest for the first ue 4 to encrypt the contract digest with the private key.
The first ciphertext transmission step 74 is the first ue 4 then transmitting the first encrypted digest to the second ue 5.
The first distributing private key step 75 distributes a private key corresponding to the account identifier of the second user equipment 5 to the second user equipment 5 for the online contract server 3.
The second encryption step 76 generates a second encrypted digest for the second ue 5 by encrypting the received first encrypted digest with the private key received from the online contract server 3.
The second ciphertext sending step 77 is the second user device 5 then sending the second encrypted digest to the online contract server 3.
The first verification ciphertext step 78 is that the online contract server 3 sequentially verifies the second encrypted digest by using the public keys corresponding to the private keys of the second user equipment 5 and the first user equipment 4, further illustrates the verification mechanism of the online contract server 3, and in terms of the asymmetric encryption architecture adopted in this embodiment, the online contract server 3 decrypts the second encrypted digest by using the public key corresponding to the private key allocated to the second user equipment 5 first to generate the first encrypted digest, and decrypts the first encrypted digest by using the public key corresponding to the private key allocated to the first user equipment 4, when it is determined that the information generated after decryption is identical to the contract digest held by the online contract server 3 itself, that is, the second encrypted digest transmitted by the second user equipment 5 can be restored to the contract digest held by the first user equipment 4, the online contract server 3 determines that verification is successful.
When the online contract server 3 determines that the second encrypted digest is the same as the stored contract digest corresponding to the electronic contract data 2, the online contract server 3 determines that the electronic contract data 2 stored previously corresponds to the valid status, and it should be noted that, since the electronic contract data 2 stored by the online contract server 3 is possibly a counterfeit file that is tampered and uploaded by a malicious third party that is not included in the first and second user devices 4 and 5, the authenticity of the electronic contract data 2 stored previously can be further determined after the first distribution private key step 72 to the first verification ciphertext step 78 are sequentially executed.
Referring to fig. 3, after the electronic contract signing method is executed in this embodiment, a third party access verification procedure is executed, which includes a step 81 of receiving a link code, a step 82 of connecting a communication, a step 83 of verifying ciphertext, and a step 84 of transmitting plaintext.
The step 81 of receiving the concatenated code is that the authentication device 6 receives a concatenated code indicating the second encrypted digest transmitted by one of the first ue 4 and the second ue 5. It should be noted that, in the above-mentioned step 79 of determining the contract status, when the online contract server 3 verifies the correctness of the second encrypted digest and stores the data, a link code (e.g. short web address) related to the second encrypted digest is transmitted to the first ue 4 and the second ue 5, so as to facilitate the two parties to check the content of the electronic contract data.
The communication connection step 82 is that the verification device 6 is in communication connection with the online contract server 3 according to the connection code.
The second verification ciphertext step 83 is that the online contract server 3 sequentially verifies the second encrypted digest indicated by the connection code with the public keys corresponding to the private keys of the second and first user devices 5 and 4, i.e. determines whether the data generated after decrypting the second encrypted digest is identical to the contract digest stored in the online contract server 3 itself.
The step 84 of transmitting plaintext is that when the online contract server 3 determines that the verification is successful, the online contract server 3 then transmits the stored electronic contract data to the verification device 6 for review, on behalf of the verification device 6 being a third party authorized legally via the first user device 4 and the second user device 5. In addition, the linking code has a timestamp indicating an aging period, when the online contract server 3 determines that the time point of the communication connection with the verification device 6 is within the aging period, the online contract server 3 sequentially decrypts the second encrypted digest indicated by the linking code corresponding to the public key of the second ue 5 and the public key of the first ue 4, and when the online contract server 3 determines that the decrypted information is the same as the contract digest generated by performing data processing on the electronic contract data 2 by using SHA-256 hash function, the online contract server 3 transmits the electronic contract data 2 to the verification device 6.
With reference to fig. 4, a specific application of the embodiment in the e-commerce field is described, and a performance verification process is described herein, which includes a contract determining condition step 91, a determination executing result step 92, and a processing step 93, where after the verification device 6 passes the verification of the online contract server 3, the verification device 6 determines the processing performed by the first user device 4 and the second user device 5 according to the condition content set by the electronic contract data 2.
The contract judging condition step 91 firstly reads the performance condition set for the electronic contract data 2 for the verification device 6, and further, when the first user device 4 and the second user device 5 set the performance condition for the electronic contract data 2, the performance condition agreed by the two parties is associated to a timestamp (timestamp) for the first user device, the second user device and the verification device 6 to automatically judge that the state corresponding to the performance condition changes at the time point set by the timestamp.
The determining execution result step 92 is to determine a state change of the associated execution condition at the time point set by the timestamp, and further, determine a state change corresponding to both the first ue 4 and the second ue 5, for example: before the first ue 4 is set in the electronic contract data 2 on the tenth day of each month, a payment certificate with the electronic signature provided by the first ue 4 should be uploaded to the online contract server 3, and after the second ue 5 confirms that the first ue 4 provides the payment certificate according to the timestamp, a confirmation certificate with the electronic signature provided by the second ue 5 should be returned to the online contract server 3 to represent completion of the performance.
The disposing step 93 is that if the first ue 4 does not upload the payment proof with its electronic signature according to the agreed time condition, the second ue 5 confirms and the verification device 6 notarizes the payment proof, the online contract server 3 executes the corresponding fine to the account identifier of the first ue 4, specifically, the second ue 5 confirms that the first ue 4 does not provide the payment proof within the term according to the timestamp, then the verification device 6 judges that the first ue 4 does not perform the payment within the term according to the timestamp, the online contract server 3 executes the payment to a pre-stored deposit corresponding to the account identifier of the first ue 4, and transfers the payment to the account identifier corresponding to the second ue 5.
In the above embodiment, the online contract server 3 verifies the content of the second encrypted digest uploaded by the second user device 5 through the public key corresponding to the private key distributed to the first and second user devices 4 and 5, further determines the validity (authenticity) of the electronic contract data 2 stored previously, prevents malicious third parties from uploading counterfeit files, and provides the electronic contract data 2 to the verification device 6 after verifying that the verification device 6 is indeed authorized legally via the first and second user devices 4 and 5 (the connection code provided by one of the first and second user devices), so as to ensure that the electronic contract data 2 cannot easily flow outwards.
In summary, in the above embodiments, the online contract server sequentially decrypts and verifies the second encrypted digest encrypted by the first and second user devices with the public keys corresponding to the private keys of the second and first user devices, and when the verification is determined to be successful, the electronic contract data stored in advance on behalf of the online contract server is actually from the first and second user devices, so as to determine that the electronic contract data corresponds to the valid state, and ensure the authenticity of the electronic contract data, thereby truly achieving the purpose of the present invention.
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, which is defined by the appended claims and their equivalents.

Claims (5)

1. An electronic contract signing device suitable for an electronic contract data, the electronic contract data corresponding to one of an effective state and an ineffective state, the electronic contract signing device comprising:
an online contract server for storing the electronic contract data and a plurality of account identification codes, providing a plurality of private keys corresponding to the account identification codes respectively, and storing a plurality of public keys corresponding to the private keys respectively;
a verification device;
the first user equipment corresponds to one of the account identification codes and is in communication connection with the online contract server; a kind of electronic device with high-pressure air-conditioning system
A second user device corresponding to the other of the account identifiers and communicatively coupled to the online contract server,
the online contract server distributes a private key corresponding to the account identifier of the first user device to the first user device,
the first user equipment encrypts a contract abstract related to the electronic contract data by using the private key to generate a first encrypted abstract, and transmits the first encrypted abstract to the second user equipment,
the online contract server distributes a private key corresponding to the account identifier of the second user device to the second user device,
the second user equipment encrypts the first encrypted digest with the private key to generate a second encrypted digest, and transmits the second encrypted digest to the online contract server,
the online contract server sequentially verifies the second encryption digest by using public keys corresponding to private keys of the second user equipment and the first user equipment, and when judging that the data obtained by verifying the second encryption digest is identical to the prestored contract digest corresponding to the electronic contract data, the online contract server records that the electronic contract data corresponds to the valid state,
the second user equipment also transmits the second encryption digest to the first user equipment, the verification equipment receives a link code indicating the second encryption digest from one of the first user equipment and the second user equipment, the verification equipment is in communication connection with the online contract server according to the link code, the online contract server sequentially decrypts the second encryption digest indicated by the link code with the public key corresponding to the second user equipment and the first user equipment, when the online contract server judges that the information generated after decryption is the same as the contract digest generated by hash operation of the electronic contract data, the online contract server transmits the electronic contract data to the verification equipment,
the verification device reads the execution condition set with respect to the electronic contract data, the first user device and the second user device associate the execution condition agreed by both parties to a timestamp when setting the execution condition with respect to the electronic contract data,
the first user equipment, the second user equipment and the verification equipment can automatically judge the state change corresponding to the execution condition at the time point set by the timestamp,
after completing the execution, the first user equipment uploads a payment certificate with the electronic signature provided by the first user equipment to the online contract server, the second user equipment confirms the payment certificate provided by the first user equipment according to the timestamp, returns a confirmation certificate with the electronic signature provided by the second user equipment to the online contract server,
if the second user equipment confirms that the first user equipment does not provide the payment proof within the period according to the timestamp, the verification equipment judges that the first user equipment does not perform the function within the period through the timestamp, and the online contract server executes deduction on a prestored deposit corresponding to the account identification code of the first user equipment and transfers the deduction to the account identification code corresponding to the second user equipment.
2. The electronic contract signing device of claim 1, wherein the online contract server decrypts the second encrypted digest with a public key corresponding to the private key transmitted to the second user device, decrypts the first encrypted digest with a public key corresponding to the private key transmitted to the first user device after determining that the decrypted data is the first encrypted digest, and records that the electronic contract data corresponds to the valid state when determining that the decrypted data is the same as the contract digest corresponding to the electronic contract data.
3. The electronic contract signing apparatus of claim 1, wherein the first user device hashes the electronic contract data to generate the contract digest.
4. The electronic contract signing apparatus of claim 1, wherein the online contract server hashes the stored electronic contract data to generate the contract digest.
5. The electronic contract signing apparatus of claim 1, further comprising a verification device, wherein the second ue further transmits the second encrypted digest to the first ue, the verification device receives a linking code indicating the second encrypted digest from one of the first ue and the second ue, the verification device is communicatively connected to the online contract server according to the linking code, the linking code has a timestamp indicating an aging interval, when the online contract server determines that a point in time of the communication connection with the verification device is within the aging interval, the online contract server sequentially decrypts the second encrypted digest indicated by the linking code corresponding to the public keys of the second ue and the first ue, and when the online contract server determines that information generated after decryption is identical to the contract digest generated by the hash operation of the electronic contract data, the online contract server transmits the electronic contract data to the verification device.
CN201910290030.3A 2019-01-04 2019-04-11 Electronic contract signing device Active CN111414629B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TW108100398 2019-01-04
TW108100398A TW202026934A (en) 2019-01-04 2019-01-04 Electronic contract signing method and electronic contract signing system capable of preventing electronic contract from being read and altered by illegal users

Publications (2)

Publication Number Publication Date
CN111414629A CN111414629A (en) 2020-07-14
CN111414629B true CN111414629B (en) 2023-11-28

Family

ID=71490772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910290030.3A Active CN111414629B (en) 2019-01-04 2019-04-11 Electronic contract signing device

Country Status (2)

Country Link
CN (1) CN111414629B (en)
TW (1) TW202026934A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873255A (en) * 2014-03-03 2014-06-18 杭州电子科技大学 Electronic contract off-line signing method based on trusted third party
CN106330441A (en) * 2015-06-16 2017-01-11 北京源创云网络科技有限公司 Method, equipment and system for processing trusted time information
CN107579827A (en) * 2017-06-06 2018-01-12 江苏慧世联网络科技有限公司 It is a kind of that method is signed based on the electronic document of trusted third party and facial recognition techniques
CN108092779A (en) * 2018-01-05 2018-05-29 北京汇通金财信息科技有限公司 A kind of method and device for realizing electronic signature
WO2018137316A1 (en) * 2017-01-24 2018-08-02 上海亿账通区块链科技有限公司 Secure transaction method based on block chain, electronic device, system, and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873255A (en) * 2014-03-03 2014-06-18 杭州电子科技大学 Electronic contract off-line signing method based on trusted third party
CN106330441A (en) * 2015-06-16 2017-01-11 北京源创云网络科技有限公司 Method, equipment and system for processing trusted time information
WO2018137316A1 (en) * 2017-01-24 2018-08-02 上海亿账通区块链科技有限公司 Secure transaction method based on block chain, electronic device, system, and storage medium
CN107579827A (en) * 2017-06-06 2018-01-12 江苏慧世联网络科技有限公司 It is a kind of that method is signed based on the electronic document of trusted third party and facial recognition techniques
CN108092779A (en) * 2018-01-05 2018-05-29 北京汇通金财信息科技有限公司 A kind of method and device for realizing electronic signature

Also Published As

Publication number Publication date
CN111414629A (en) 2020-07-14
TW202026934A (en) 2020-07-16

Similar Documents

Publication Publication Date Title
CN108765240B (en) Block chain-based inter-institution customer verification method, transaction supervision method and device
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
US5745574A (en) Security infrastructure for electronic transactions
US7249258B2 (en) Method and system for assuring an original
US20110289318A1 (en) System and Method for Online Digital Signature and Verification
CN109905360B (en) Data verification method and terminal equipment
US20020038290A1 (en) Digital notary system and method
US20020004800A1 (en) Electronic notary method and system
US20070226507A1 (en) Method and System for Depositing Digital Works, A Corresponding Computer Program, and a Corresponding Computer-Readable Storage Medium
US7966300B2 (en) Application processing method, and intermediation server device
CN112699353B (en) Financial information transmission method and financial information transmission system
CN105554018A (en) Network real name verification method
CN111651745B (en) Application authorization signature method based on password equipment
KR100646948B1 (en) A Notarizing center server for notarizing and verifying electronic documents and method using the Same
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN110493011B (en) Block chain-based certificate issuing management method and device
Tiwari et al. India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities
CN115225346B (en) Data evidence storage system oriented to credit investigation big data field
CN108322311B (en) Method and device for generating digital certificate
CN111414629B (en) Electronic contract signing device
TWM579789U (en) Electronic contract signing device
US11343107B2 (en) System for method for secured logging of events
CN113204773A (en) Electronic notarization data credible exchange method based on public network and application thereof
CN111369332A (en) Data processing method and device based on block chain
TWI828001B (en) System for using multiple security levels to verify customer identity and transaction services and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant