CN111681141B - File authentication method, file authentication device and terminal equipment - Google Patents

File authentication method, file authentication device and terminal equipment Download PDF

Info

Publication number
CN111681141B
CN111681141B CN202010467224.9A CN202010467224A CN111681141B CN 111681141 B CN111681141 B CN 111681141B CN 202010467224 A CN202010467224 A CN 202010467224A CN 111681141 B CN111681141 B CN 111681141B
Authority
CN
China
Prior art keywords
file
confirmed
template
evidence
generation instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010467224.9A
Other languages
Chinese (zh)
Other versions
CN111681141A (en
Inventor
蔡智才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202010467224.9A priority Critical patent/CN111681141B/en
Publication of CN111681141A publication Critical patent/CN111681141A/en
Application granted granted Critical
Publication of CN111681141B publication Critical patent/CN111681141B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The file authentication method provided by the application comprises the following steps: after a file generation instruction is acquired, extracting a target file template and attribute information of preset parameters in the target file template according to the file template number represented in the file generation instruction; acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter; filling the target file template according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, and extracting and generating operation information; the file to be confirmed is sent to at least one account node related to the file generation instruction; if feedback information of each account node is obtained and each feedback information respectively meets corresponding preset conditions, the confirmation of the file to be confirmed is completed, and an evidence file is generated; and authenticating the evidence file and the file to be confirmed after completion of confirmation to obtain authentication credentials.

Description

File authentication method, file authentication device and terminal equipment
Technical Field
The present application relates to the field of file authentication technologies, and in particular, to a file authentication method, a file authentication device, a terminal device, and a computer readable storage medium.
Background
With the rapid development of national economy and global economy, there are often cases where multiple parties sign or authenticate documents together to take the documents as vouchers when various businesses are developed. In order to ensure the authenticity and effectiveness of the file, a plurality of participants need to send out staff to make a round trip or transfer the file through logistics, so that the process of signing or authentication of the file needs to consume large manpower and material resources, and the processing efficiency is low.
Disclosure of Invention
The embodiment of the application provides a file authentication method, a file authentication device, terminal equipment and a computer readable storage medium, which can solve the problems that in the prior art, a plurality of participants sign or authenticate a plurality of files together, so that the processing process when the files are taken as certificates needs to consume larger manpower and material resources, and the processing efficiency is lower.
In a first aspect, an embodiment of the present application provides a method for authenticating a file, including:
After a file generation instruction is acquired, extracting a target file template and attribute information of preset parameters in the target file template according to the file template number represented in the file generation instruction;
Acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
Filling the target file template according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, and extracting generating operation information, wherein the generating operation information comprises information associated with a generating process for generating the file to be confirmed;
the file to be confirmed is sent to at least one account node related to the file generation instruction;
If the feedback information of each account node is obtained and the feedback information respectively meets the corresponding preset conditions, the confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generating operation information is generated;
and authenticating the evidence file and the file to be confirmed after completion of confirmation, and obtaining authentication credentials about the evidence file and the file to be confirmed after completion of confirmation.
In a second aspect, an embodiment of the present application provides a document authentication apparatus, including:
The first acquisition module is used for extracting a target file template and attribute information of preset parameters in the target file template according to the file template number represented in the file generation instruction after the file generation instruction is acquired;
The second acquisition module is used for acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
the first generation module is used for filling the target file template according to the attribute information and the parameter content of each preset parameter so as to generate a file to be confirmed, and extracting generation operation information, wherein the generation operation information comprises information related to a generation process for generating the file to be confirmed;
The sending module is used for sending the file to be confirmed to at least one account node related to the file generation instruction;
The second generation module is used for completing the confirmation of the file to be confirmed if the feedback information of each account node is obtained and the feedback information respectively meets the corresponding preset conditions, and generating an evidence file containing the feedback information of each account node and the generation operation information;
And the authentication module is used for authenticating the evidence file and the file to be confirmed after the completion of the confirmation, and obtaining authentication credentials about the evidence file and the file to be confirmed after the completion of the confirmation.
In a third aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, a display, and a computer program stored in the memory and executable on the processor, where the processor implements the file authentication method according to the first aspect when executing the computer program.
In a fourth aspect, an embodiment of the present application provides a computer readable storage medium storing a computer program, which when executed by a processor implements the method for authenticating a file according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a computer program product for, when run on a terminal device, causing the terminal device to perform the method for authenticating a file as described in the first aspect above.
Compared with the prior art, the embodiment of the application has the beneficial effects that: in the embodiment of the application, after the file generation instruction is acquired, the target file template and the attribute information of the preset parameters in the target file template are extracted according to the file template number related to the file generation instruction, and the parameter content corresponding to each preset parameter is acquired according to the source corresponding to each preset parameter, so that the target file template is filled according to the attribute information and the parameter content of each preset parameter to generate the file to be confirmed, the file to be confirmed can be quickly and conveniently acquired, the operation flow is simple, manual input is not needed, and flexible configuration is convenient to carry out through the target file template; further, the generation operation information including information related to a generation process of generating the file to be confirmed is obtained, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is obtained, and each feedback information respectively meets corresponding preset conditions, confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generation operation information is generated, and at this time, the evidence file may contain real information of related operation of generating the file to be confirmed and feedback of each account node; further, the evidence file and the confirmed file to be confirmed are authenticated, authentication certificates of the evidence file and the confirmed file to be confirmed can be obtained, the evidence file and the confirmed file to be confirmed are guaranteed to be untampered, and accordingly authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and follow-up verification is facilitated. The embodiment of the application can conveniently realize the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants, and has lower cost of manpower and material resources and higher processing efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for authenticating a document according to an embodiment of the present application;
FIG. 2 is a flowchart of step S104 according to an embodiment of the present application;
FIG. 3 is a flowchart of step S106 according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a document authentication device according to an embodiment of the present application;
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in the present description and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
The file authentication method provided by the embodiment of the application can be applied to terminal equipment such as a server, a desktop computer, a mobile phone, a tablet personal computer, wearable equipment, vehicle-mounted equipment, augmented reality (augmented reality, AR)/Virtual Reality (VR) equipment, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA) and the like, and the embodiment of the application does not limit the specific type of the terminal equipment.
Specifically, fig. 1 shows a flowchart of a file authentication method provided by an embodiment of the present application, where the file authentication method may be applied to a terminal device.
The file authentication method may include:
step S101, after a file generation instruction is acquired, extracting a target file template and attribute information of preset parameters in the target file template according to the file template number characterized in the file generation instruction.
In the embodiment of the application, the file generation instruction can instruct to generate the file to be confirmed. The document to be confirmed may be a legal document to be authenticated by a contract to be signed or a document requiring authentication by a plurality of participants, and when the document to be confirmed is applied in the financial field, the document to be confirmed may also be a contract or analysis document including macroscopic economic data such as currency and exchange rate, finance, stock fingers, financial products, futures, options, bonds, banks, enterprise/financial risk assessment, and the like.
In the embodiment of the present application, there may be various ways of obtaining the file generation instruction, for example, the terminal device executing the embodiment of the present application may receive the file generation instruction through a preset information transmission manner; further, the specific operation of the user may be received from the application page or the web page by the terminal device. By way of example, the specific operation may be a touch operation on a specific virtual key or a press operation on an entity key, or the like. At this time, after the file generation instruction is acquired, the file template number related to the file generation instruction may be acquired from an application page or a web page associated with a file generation preset instruction.
Wherein the file template number associated with the file generation instruction may uniquely determine the target file template. The target file template may be preset with preset parameters. In some cases, the preset parameters may be presented to the user in the form of a name plus the portion to be filled. The attribute information of the preset parameters may include one or more of such as name, identification value in the target file template, field filling type (selection box, text box, input box, etc.), field content length, field content format (regular expression), source, etc.
The size type, the name and the like of the preset parameters can be determined according to actual needs. For example, if the target document template is used to generate a contract, the preset parameters may include one or more of a related party name, address, contact address, and contract terms, among others.
In the embodiment of the application, the target file template can be preconfigured and stored in the preset database, so that the target file template can be quickly called in application and is used for quickly generating the required file to be confirmed.
Step S102, obtaining the parameter content of each preset parameter according to the source corresponding to each preset parameter.
In this embodiment, the source corresponding to the preset parameter may be configured in the target file template in advance, or may be input by the user during the use process. By way of example, the source may be a particular database link, a web page or terminal device local storage space, and so forth.
For example, in a specific application scenario, the file generation instruction is used for generating contracts to be confirmed (i.e. files to be confirmed) that are participated by multiple participants, and in a preset database, client information of each client (such as each enterprise, supervisor, etc.) is pre-stored, and preset parameters in the target file template include client information preset parameters such as client name, client address, contact information, etc., and storage addresses (i.e. sources corresponding to each preset parameter) of each client information in the preset database are pre-configured.
In the application process, after the file generation instruction is acquired, the client associated with the file to be confirmed can be acquired, so that the parameter content of the preset parameters of each client information, such as the contact mode, the client name, the client address and the like of the client associated with the file to be confirmed, is acquired from the preset database according to the storage address of the client information of each client in the preset database.
It should be noted that the above examples are given by way of illustration only and are not limiting of the present embodiments.
Step S103, filling the target file template according to the attribute information and the parameter content of each preset parameter, so as to generate a file to be confirmed, and extracting generating operation information, wherein the generating operation information comprises information associated with a generating process for generating the file to be confirmed.
In the embodiment of the application, the target file template after filling is completed can be used as the file to be confirmed. The generating operation information may be obtained in real time during the process of generating the file to be confirmed, for example, the generating operation information may be obtained in real time by means of screenshot, screen recording, extracting a web page or application information, etc.
The generating operation information may include, for example, one or more of an initiator that generates the file to be confirmed (such as an account number that issues the file generating instruction), a generating time (which may be represented by a timestamp), a generating content of the file to be confirmed, a number of the file to be confirmed, and a related operation page. The specific storage form of the generated operation information can be determined according to the actual application scene, and for example, the specific storage form can be a screenshot of a related operation page or a document, a table, a video and the like.
The generated operation information can be used as a certificate of the file to be confirmed later so as to identify whether the file to be confirmed is tampered later or not.
Step S104, the file to be confirmed is sent to at least one account node related to the file generation instruction.
In the embodiment of the application, at least one account node related to the file generation instruction can be determined according to the content of the file to be confirmed, the account related to the initiating account initiating the file generation instruction, the prestored customer account information and the like. By way of example, the account nodes may include audit account nodes, review account nodes, document signing account nodes for trusted clients/core enterprises/supervisors/after-sales branch of core enterprises, and the like. In a specific application scenario, if the document to be confirmed is a contract to be signed, the at least one account node related to the document generation instruction may include an internal audit account node (such as a department manager account node) of an initiator of the contract to be signed and account nodes of other signers.
It should be noted that, the file to be confirmed may be sequentially sent to at least part of account nodes according to a preset sequence, so as to implement at least part of the hierarchical audit process; in addition, the file to be confirmed can be sent to at least part of account nodes in parallel, so that the account nodes of the part can process the file to be confirmed in parallel, and the processing efficiency is improved.
As shown in fig. 2, in some embodiments, the account nodes include an audit account node and a document signing account node;
the sending the file to be confirmed to at least one account node related to the file generation instruction includes:
Step S201, according to a preset auditing sequence and the confirmation information of the front account nodes corresponding to each auditing account node respectively, sequentially sending the file to be confirmed to each auditing account node;
Step S202, after receiving the confirmation information of each audit account node in turn, the file to be confirmed is sent to each file signing account node.
In the embodiment of the application, the auditing account node can audit the file to be confirmed, and the file signing account node can sign and confirm the file to be confirmed.
Illustratively, the audit account node may include a superior account node to the account node initiating the file generation instruction, and the file signing account node may include, for example, an external customer account node, a supervisor account node, and the like.
In this embodiment, according to a preset audit sequence and the confirmation information of the pre-account nodes corresponding to each audit account node, the file to be confirmed is sequentially sent to each audit account node, and after the confirmation information of each audit account node is obtained at one time, an audit process of the file to be confirmed can be implemented. Further, the file to be confirmed after the completion of the verification can be sent to each file signing account node. At this time, the file to be confirmed after the completion of the verification may be sent to each file signing account node in parallel, so that each file signing account node may process the file to be confirmed in parallel, thereby improving information processing efficiency.
Step S105, if feedback information of each account node is obtained, and each feedback information respectively meets a corresponding preset condition, the confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generating operation information is generated.
In the embodiment of the application, the respective satisfaction of the respective preset conditions by the feedback information can be determined according to the requirements, attributes and the like corresponding to the account nodes. For example, for a certain feedback information, the feedback information meeting a corresponding preset condition may include: if the feedback information includes the confirmation information and the specific information of the corresponding account node, the feedback information can be confirmed to meet the corresponding preset condition. Of course, the preset conditions can be adjusted according to specific application scenarios. It should be noted that, the confirmation of the document to be confirmed may be determined according to the actual operation of the document to be confirmed. For example, if the document to be confirmed is a contract to be signed, the completing the confirmation of the document to be confirmed may include completing the signing of the contract to be signed.
In the embodiment of the application, the preset conditions corresponding to different account nodes can be different.
For example, for an audit account node, if the feedback information of the audit account node includes audit confirmation information of the audit account node on the file to be confirmed, the feedback information of the audit account node can be considered to meet corresponding preset conditions;
For the document signing account node, the document signing account node may be an account node of an external client, so that in some specific application scenarios, signature texts of the document to be confirmed can be signed through a USBKEY certificate, and signature ciphertext is obtained, so that the security of feedback information of the account node of the external client is ensured. At this time, the feedback information may include the signature ciphertext information, corresponding USBKEY certificate verification information, signing operation information of the document signing account node, and the like, and if the USBKEY certificate verification information indicates that the USBKEY certificate verification passes, the signing operation information of the document signing account node indicates that the document signing account node confirms that the document to be confirmed is signed, the feedback information of the document signing account node may be considered to satisfy corresponding preset conditions.
The specific storage form of the evidence file may be determined according to the actual application scene, and may include one or more of documents, tables, videos, pictures (such as a screenshot of a related operation page), and the like. The evidence file includes the feedback information and the generating operation information, so that the evidence file may include evidence about related operation processes, and may include evidence such as signature texts, ciphertext, related files and the like of related clients, so that a relatively comprehensive evidence chain may be formed, and the effectiveness of evidence in subsequent evidence is improved.
In some embodiments, after generating the evidence file including the feedback information of each account node and the generating operation information, the method further includes:
uploading the evidence file to a preset platform for storage, wherein the preset platform is a data storage platform built based on a block chain.
In the embodiment of the application, the preset platform can be a data storage platform built based on a block chain, and the like. Based on the characteristics of block chain decentralization, non-falsification, whole-course trace and the like, the evidence file can be uploaded to a preset platform for storage, so that subsequent evidence collection can be facilitated, and meanwhile, the preset platform can be used for centralized storage of the evidence file, so that excessive storage space occupied in terminal equipment for executing the embodiment of the application is avoided.
And step S106, authenticating the evidence file and the file to be confirmed after the completion of the confirmation, and obtaining authentication credentials about the evidence file and the file to be confirmed after the completion of the confirmation.
In the embodiment of the application, the mode of authenticating the file to be confirmed and the evidence file can be various, and the method can be specifically determined according to the actual application scene. In some cases, a third party authentication mode with higher public trust may be used to authenticate the document to be confirmed and the evidence document, at this time, the document to be confirmed and the evidence document may be sent to a third party, and an authentication certificate fed back by the third party may be received as an authentication certificate related to the document to be confirmed and the evidence document. Of course, in some cases, the document to be confirmed and the evidence document may also be authenticated by using a user-defined authentication method commonly recognized by a plurality of participants according to the embodiment of the present application.
As shown in fig. 3, in some embodiments, the authenticating the evidence file and the confirmed completed file to be confirmed, obtaining authentication credentials about the evidence file and the confirmed completed file to be confirmed, includes:
step S301, the evidence file and the file to be confirmed after the completion of the confirmation are sent to an authentication platform;
Step S302, receiving a digital certificate obtained after the authentication platform authenticates the evidence file and the file to be confirmed after the confirmation is completed, and taking the digital certificate as the authentication credential.
In the embodiment of the present application, the authentication platform may be a third party authentication platform except for the related party involved in steps S101 to S105. For example, the authentication platform may be a China financial authentication center (CHINA FINANCIAL Certification Authority, CFCA), or the like.
The specific acquisition mode of the digital certificate can be determined by the authentication platform according to actual requirements. In some embodiments, the digital certificate may be obtained after the authentication platform processes the evidence file and the file to be confirmed after confirmation by using various encryption algorithms.
In the embodiment of the application, after the evidence file and the confirmed file to be confirmed are obtained, the evidence file and the confirmed file to be confirmed are authenticated through the authentication platform, so that an evidence acquirer and an evidence authenticator are effectively separated, and the authenticity and the validity of related evidence information are ensured.
In some embodiments, before extracting the target file template and the attribute information of the preset parameters in the target file template according to the file template number characterized in the file generation instruction, the method further includes:
Generating a file template set, wherein the file template set comprises at least one file template and file template numbers corresponding to the file templates respectively, each file template number identifies each file template respectively, and the target file template is at least one of the file templates.
In the embodiment of the application, each file template can be uniquely identified by a corresponding file template number.
In the embodiment of the application, the types of the file templates in the file template set can be determined according to the actual application scene, wherein the preset parameters and the attribute information thereof in each file template can be respectively set in a personalized way, thereby realizing flexible configuration of the file templates, having better applicability, improving the development efficiency, needing no repeated development and having lower maintenance cost.
In some embodiments, after the file generation instruction is acquired, extracting the target file template and attribute information of preset parameters in the target file template according to the file template number characterized in the file generation instruction, including:
After acquiring a file generation instruction, acquiring a file template number related to the file generation instruction from a display page related to the file generation instruction;
and acquiring a target file template from the file template set according to the file template number related to the file generation instruction, and acquiring attribute information of preset parameters in the target file template.
In the embodiment of the present application, the display page may be an application page, a web page, or the like, and in some embodiments, the user may trigger the file generation instruction by performing a specific operation (such as a selection operation, an operation of inputting a text, or the like) on the display page, where the display page may be a display page associated with the file generation instruction, and the terminal device may obtain, through information such as a script of the corresponding display page, a file template number associated with the file generation instruction, so that a corresponding file template is searched through the file template number, so as to obtain a target file template.
In some embodiments, each of the above-described file authentication methods may be applied to a blockchain (Blockchain), where the blockchain in this embodiment is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, and the like. The blockchain is essentially a decentralised database, and is a series of data blocks which are generated by association by using a cryptography method, and each data block contains information of a batch of network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The above embodiments of the method for authenticating the files are realized through the blockchain, so that various operations and the authenticity such as generating operation information, feeding back information and authentication can be ensured, and information verification, transmission, sharing and the like of various account nodes are facilitated.
In the embodiment of the application, after the file generation instruction is acquired, the target file template and the attribute information of the preset parameters in the target file template are acquired according to the file template number related to the file generation instruction, and the parameter content corresponding to each preset parameter is acquired from the source corresponding to each preset parameter, so that the target file template is filled according to the attribute information and the parameter content of each preset parameter to generate the file to be confirmed, the file to be confirmed can be quickly and conveniently acquired, the operation flow is simple, manual input is not needed, and flexible configuration is convenient to carry out through the target file template; further, the generation operation information including information related to a generation process of generating the file to be confirmed is obtained, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is obtained, and each feedback information respectively meets corresponding preset conditions, confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generation operation information is generated, and at this time, the evidence file may contain real information of related operation of generating the file to be confirmed and feedback of each account node; further, the evidence file and the confirmed file to be confirmed are authenticated, authentication certificates of the evidence file and the confirmed file to be confirmed can be obtained, the evidence file and the confirmed file to be confirmed are guaranteed to be untampered, and accordingly authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and follow-up verification is facilitated. The embodiment of the application can conveniently realize the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants, and has lower cost of manpower and material resources and higher processing efficiency.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
Corresponding to the file authentication method described in the above embodiments, fig. 4 shows a block diagram of a file authentication device according to an embodiment of the present application, and for convenience of explanation, only a portion related to the embodiment of the present application is shown.
Referring to fig. 4, the document authentication apparatus 4 includes:
The first obtaining module 401 is configured to extract, after obtaining a file generation instruction, a target file template and attribute information of preset parameters in the target file template according to a file template number represented in the file generation instruction;
a second obtaining module 402, configured to obtain parameter contents of each preset parameter according to a source corresponding to each preset parameter;
A first generating module 403, configured to populate the target file template according to the attribute information and the parameter content of each preset parameter, so as to generate a file to be confirmed, and extract generating operation information, where the generating operation information includes information associated with a generating process for generating the file to be confirmed;
a sending module 404, configured to send the file to be confirmed to at least one account node related to the file generation instruction;
The second generating module 405 is configured to complete the confirmation of the file to be confirmed if feedback information of each account node is obtained and each feedback information respectively meets a corresponding preset condition, and generate an evidence file including feedback information of each account node and the generated operation information;
and the authentication module 406 is configured to authenticate the evidence file and the to-be-confirmed file after completion of confirmation, and obtain authentication credentials about the evidence file and the to-be-confirmed file after completion of confirmation.
Optionally, the document authentication device 4 further includes:
The third generation module is used for generating a file template set, the file template set comprises at least one file template and file template numbers corresponding to the file templates respectively, the file template numbers respectively identify the file templates, and the target file template is at least one of the file templates.
Optionally, the first obtaining module 401 specifically includes:
a first acquisition unit configured to acquire a file template number related to a file generation instruction from a display page associated with the file generation instruction after acquiring the file generation instruction;
The second obtaining unit is used for obtaining a target file template from the file template set according to the file template number related to the file generation instruction and obtaining attribute information of preset parameters in the target file template.
Optionally, the account node includes an audit account node and a document signing account node;
the sending module 404 specifically includes:
The first sending unit is used for sequentially sending the file to be confirmed to each audit account node according to a preset audit sequence and confirmation information of the front account node corresponding to each audit account node respectively;
And the second sending unit is used for sending the file to be confirmed to each file signing account node after receiving the confirmation information of each audit account node in sequence.
Optionally, the document authentication device 4 further includes:
and the uploading module is used for uploading the evidence file to a preset platform for storage, wherein the preset platform is a data storage platform built based on a block chain.
Optionally, the authentication module 406 specifically includes:
the sending unit is used for sending the file to be confirmed and the evidence file to an authentication platform;
And the receiving unit is used for receiving the digital certificate obtained after the authentication platform authenticates the file to be confirmed and the evidence file, and taking the digital certificate as the authentication certificate.
In the embodiment of the application, after the file generation instruction is acquired, the target file template and the attribute information of the preset parameters in the target file template are acquired according to the file template number related to the file generation instruction, and the parameter content corresponding to each preset parameter is acquired from the source corresponding to each preset parameter, so that the target file template is filled according to the attribute information and the parameter content of each preset parameter to generate the file to be confirmed, the file to be confirmed can be quickly and conveniently acquired, the operation flow is simple, manual input is not needed, and flexible configuration is convenient to carry out through the target file template; further, the generation operation information including information related to a generation process of generating the file to be confirmed is obtained, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is obtained, and each feedback information respectively meets corresponding preset conditions, confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generation operation information is generated, and at this time, the evidence file may contain real information of related operation of generating the file to be confirmed and feedback of each account node; further, the evidence file and the confirmed file to be confirmed are authenticated, authentication certificates of the evidence file and the confirmed file to be confirmed can be obtained, the evidence file and the confirmed file to be confirmed are guaranteed to be untampered, and accordingly authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and follow-up verification is facilitated. The embodiment of the application can conveniently realize the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants, and has lower cost of manpower and material resources and higher processing efficiency.
It should be noted that, because the content of information interaction and execution process between the above devices/units is based on the same concept as the method embodiment of the present application, specific functions and technical effects thereof may be referred to in the method embodiment section, and will not be described herein.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 5, the terminal device 5 of this embodiment includes: at least one processor 50 (only one is shown in fig. 5), a memory 51, and a computer program 52 stored in the memory 51 and executable on the at least one processor 50, the steps of any of the respective file authentication method embodiments described above being implemented when the processor 50 executes the computer program 52.
The terminal device 5 may be a server, a mobile phone, a wearable device, an Augmented Reality (AR)/Virtual Reality (VR) device, a desktop computer, a notebook computer, a desktop computer, a palm computer, or other computing devices. The terminal device may include, but is not limited to, a processor 50, a memory 51. It will be appreciated by those skilled in the art that fig. 5 is merely an example of the terminal device 5 and is not limiting of the terminal device 5, and may include more or fewer components than shown, or may combine certain components, or different components, such as may also include input devices, output devices, network access devices, etc. The input device may include a keyboard, a touch pad, a fingerprint collection sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, a camera, and the like, and the output device may include a display, a speaker, and the like.
The Processor 50 may be a central processing unit (Central Processing Unit, CPU), the Processor 50 may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may in some embodiments be an internal storage unit of the terminal device 5, such as a hard disk or a memory of the terminal device 5. The memory 51 may also be an external storage device of the terminal device 5 in other embodiments, for example, a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the terminal device 5. Further, the memory 51 may include both the internal storage unit and the external storage device of the terminal device 5. The memory 51 is used for storing an operating system, an application program, a Boot Loader (Boot Loader), data, other programs, and the like, such as program codes of the computer programs. The above-described memory 51 may also be used to temporarily store data that has been output or is to be output.
In addition, although not shown, the terminal device 5 may further include a network connection module, such as a bluetooth module Wi-Fi module, a cellular network module, and so on, which will not be described herein.
In the embodiment of the present application, when the processor 50 executes the computer program 52 to implement the steps in any of the embodiments of the method for authenticating files, after a file generation instruction is acquired, attribute information of a target file template and preset parameters in the target file template are acquired according to a file template number related to the file generation instruction, and parameter contents corresponding to each preset parameter are acquired from sources corresponding to each preset parameter, so that the target file template is filled according to the attribute information and the parameter contents of each preset parameter to generate a file to be confirmed, so that the file to be confirmed can be quickly and conveniently acquired, the operation flow is simple, manual input is not required, and flexible configuration is convenient to be performed through the target file template; further, the generation operation information including information related to a generation process of generating the file to be confirmed is obtained, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is obtained, and each feedback information respectively meets corresponding preset conditions, confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generation operation information is generated, and at this time, the evidence file may contain real information of related operation of generating the file to be confirmed and feedback of each account node; further, the evidence file and the confirmed file to be confirmed are authenticated, authentication certificates of the evidence file and the confirmed file to be confirmed can be obtained, the evidence file and the confirmed file to be confirmed are guaranteed to be untampered, and accordingly authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and follow-up verification is facilitated. The embodiment of the application can conveniently realize the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants, and has lower cost of manpower and material resources and higher processing efficiency.
The embodiments of the present application also provide a computer readable storage medium storing a computer program which, when executed by a processor, implements steps for implementing the various method embodiments described above.
Embodiments of the present application provide a computer program product enabling a terminal device to carry out the steps of the method embodiments described above when the computer program product is run on the terminal device.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, and may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, where the computer program, when executed by a processor, may implement the steps of each of the method embodiments described above. The computer program comprises computer program code, and the computer program code can be in a source code form, an object code form, an executable file or some intermediate form and the like. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing device/terminal apparatus, recording medium, computer Memory, read-Only Memory (ROM), random access Memory (RAM, random Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. Such as a U-disk, removable hard disk, magnetic or optical disk, etc. In some jurisdictions, computer readable media may not be electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other manners. For example, the apparatus/network device embodiments described above are merely illustrative, e.g., the division of modules or elements described above is merely a logical functional division, and there may be additional divisions in actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (8)

1. A document authentication method, comprising:
After a file generation instruction is acquired, extracting a target file template and attribute information of preset parameters in the target file template according to the file template number represented in the file generation instruction;
Acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
Filling the target file template according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, and extracting generating operation information, wherein the generating operation information comprises information associated with a generating process for generating the file to be confirmed;
the file to be confirmed is sent to at least one account node related to the file generation instruction;
If the feedback information of each account node is obtained and the feedback information respectively meets the corresponding preset conditions, the confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generating operation information is generated;
Authenticating the evidence file and the confirmed file to be confirmed to obtain authentication credentials about the evidence file and the confirmed file to be confirmed;
before extracting the target file template and the attribute information of the preset parameters in the target file template according to the file template number characterized in the file generation instruction, the method further comprises the following steps:
Generating a file template set, wherein the file template set comprises at least one file template and file template numbers corresponding to the file templates respectively, each file template number identifies each file template respectively, and the target file template is at least one of the file templates;
after the file generation instruction is acquired, extracting the target file template and attribute information of preset parameters in the target file template according to the file template number represented in the file generation instruction, wherein the attribute information comprises:
After acquiring a file generation instruction, acquiring a file template number related to the file generation instruction from a display page related to the file generation instruction;
and acquiring a target file template from the file template set according to the file template number related to the file generation instruction, and acquiring attribute information of preset parameters in the target file template.
2. The document authentication method of claim 1, wherein the account nodes include audit account nodes and document signing account nodes;
the sending the file to be confirmed to at least one account node related to the file generation instruction includes:
According to a preset auditing sequence and the confirmation information of the front account nodes corresponding to each auditing account node respectively, the file to be confirmed is sequentially sent to each auditing account node;
And after the confirmation information of each audit account node is received in turn, the file to be confirmed is sent to each file signing account node.
3. The document authentication method according to claim 1, further comprising, after generating the evidence file containing the feedback information of each account node and the generation operation information:
uploading the evidence file to a preset platform for storage, wherein the preset platform is a data storage platform built based on a block chain.
4. A document authentication method according to any one of claims 1 to 3, wherein the authenticating the evidence document and the document to be confirmed for which confirmation is completed, obtaining authentication credentials concerning the evidence document and the document to be confirmed for which confirmation is completed, comprises:
Sending the evidence file and the file to be confirmed after completion of confirmation to an authentication platform;
And receiving a digital certificate obtained after the authentication platform authenticates the evidence file and the file to be confirmed after completion of confirmation, and taking the digital certificate as the authentication certificate.
5. A document authentication apparatus, comprising:
The first acquisition module is used for extracting a target file template and attribute information of preset parameters in the target file template according to the file template number represented in the file generation instruction after the file generation instruction is acquired;
The second acquisition module is used for acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
the first generation module is used for filling the target file template according to the attribute information and the parameter content of each preset parameter so as to generate a file to be confirmed, and extracting generation operation information, wherein the generation operation information comprises information related to a generation process for generating the file to be confirmed;
The sending module is used for sending the file to be confirmed to at least one account node related to the file generation instruction;
The second generation module is used for completing the confirmation of the file to be confirmed if the feedback information of each account node is obtained and the feedback information respectively meets the corresponding preset conditions, and generating an evidence file containing the feedback information of each account node and the generation operation information;
The authentication module is used for authenticating the evidence file and the file to be confirmed after the completion of the confirmation, and obtaining authentication credentials about the evidence file and the file to be confirmed after the completion of the confirmation;
Wherein, the file authentication device further includes:
The third generation module is used for generating a file template set, wherein the file template set comprises at least one file template and file template numbers corresponding to the file templates respectively, the file template numbers respectively identify the file templates, and the target file template is at least one of the file templates;
The first acquisition module specifically includes:
a first acquisition unit configured to acquire a file template number related to a file generation instruction from a display page associated with the file generation instruction after acquiring the file generation instruction;
The second obtaining unit is used for obtaining a target file template from the file template set according to the file template number related to the file generation instruction and obtaining attribute information of preset parameters in the target file template.
6. The document authentication device of claim 5, wherein the authentication module specifically comprises:
the sending unit is used for sending the file to be confirmed and the evidence file to an authentication platform;
And the receiving unit is used for receiving the digital certificate obtained after the authentication platform authenticates the file to be confirmed and the evidence file, and taking the digital certificate as the authentication certificate.
7. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the file authentication method according to any of claims 1 to 4 when executing the computer program.
8. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the method of document authentication according to any one of claims 1 to 4.
CN202010467224.9A 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment Active CN111681141B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010467224.9A CN111681141B (en) 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010467224.9A CN111681141B (en) 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment

Publications (2)

Publication Number Publication Date
CN111681141A CN111681141A (en) 2020-09-18
CN111681141B true CN111681141B (en) 2024-05-10

Family

ID=72434358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010467224.9A Active CN111681141B (en) 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment

Country Status (1)

Country Link
CN (1) CN111681141B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112561473A (en) * 2020-12-14 2021-03-26 平安国际融资租赁有限公司 Intention file generation method and device, computer equipment and storage medium
CN112783829A (en) * 2021-01-11 2021-05-11 广州中海云科技有限公司 Maritime evidence storage method and device, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
WO2019037396A1 (en) * 2017-08-24 2019-02-28 深圳壹账通智能科技有限公司 Account clearing method, device and equipment and storage medium
CN110443596A (en) * 2019-06-19 2019-11-12 深圳壹账通智能科技有限公司 Data processing method, device, computer equipment and storage medium
WO2020062642A1 (en) * 2018-09-27 2020-04-02 深圳壹账通智能科技有限公司 Blockchain-based method, device, and equipment for electronic contract signing, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
WO2019037396A1 (en) * 2017-08-24 2019-02-28 深圳壹账通智能科技有限公司 Account clearing method, device and equipment and storage medium
WO2020062642A1 (en) * 2018-09-27 2020-04-02 深圳壹账通智能科技有限公司 Blockchain-based method, device, and equipment for electronic contract signing, and storage medium
CN110443596A (en) * 2019-06-19 2019-11-12 深圳壹账通智能科技有限公司 Data processing method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111681141A (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN111859348B (en) Identity authentication method and device based on user identification module and block chain technology
TWI714359B (en) Method and device for uploading electronic certificates
US11190355B2 (en) Secure biometric authentication using electronic identity
CN110046996B (en) Data processing method and device
CN111080295B (en) Electronic contract processing method and device based on blockchain
CN110633963A (en) Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment
US11558199B1 (en) Systems and methods for privacy preserving distributed ledger consensus
CN107171787B (en) Data blind signing and storing method and system based on multiple Hash algorithm
US11436597B1 (en) Biometrics-based e-signatures for pre-authorization and acceptance transfer
CN110598460B (en) Block chain-based electronic signature method and device and storage medium
CN112231769A (en) Block chain-based numerical verification method and device, computer equipment and medium
CN111681141B (en) File authentication method, file authentication device and terminal equipment
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN111444493A (en) Electronic contract signing method and device, electronic equipment and readable storage medium
CN111311259A (en) Bill processing method, device, terminal and computer readable storage medium
CN106559433B (en) Method and system for fixing electronic evidence and user identity by using digital certificate
CN112598502A (en) Evidence obtaining method, device, equipment and storage medium
CN112862589A (en) Identity verification method, device and system in financial scene
CN112115423A (en) Electronic notarization information processing method, device, system, equipment and storage medium
CN114519206B (en) Method for anonymously signing electronic contract and signature system
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
CN114567443A (en) Block chain-based electronic contract signing method and device
CN113783690A (en) Tender inviting method and device based on authentication
KR100788429B1 (en) Dealings details inspection method
JP2023019673A (en) Electronic contract method, electronic contract system, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant