CN112822195B - Electronic intelligent signing method based on block chain technology - Google Patents

Electronic intelligent signing method based on block chain technology Download PDF

Info

Publication number
CN112822195B
CN112822195B CN202110021652.3A CN202110021652A CN112822195B CN 112822195 B CN112822195 B CN 112822195B CN 202110021652 A CN202110021652 A CN 202110021652A CN 112822195 B CN112822195 B CN 112822195B
Authority
CN
China
Prior art keywords
abstract
user
electronic contract
contract
secondary confirmation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110021652.3A
Other languages
Chinese (zh)
Other versions
CN112822195A (en
Inventor
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hanshuo Computer Technology Co ltd
Original Assignee
Shenzhen Hanshuo Computer Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hanshuo Computer Technology Co ltd filed Critical Shenzhen Hanshuo Computer Technology Co ltd
Priority to CN202110021652.3A priority Critical patent/CN112822195B/en
Publication of CN112822195A publication Critical patent/CN112822195A/en
Application granted granted Critical
Publication of CN112822195B publication Critical patent/CN112822195B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an electronic intelligent signing method based on a block chain technology, wherein a first user terminal generates an electronic contract, a second user terminal confirms that the electronic contract is consistent, the second user terminal acquires the identity of a second user, the first user terminal confirms that the once-confirmed electronic contract is consistent, the first user terminal acquires the identity of the first user, the second user terminal confirms that the twice-confirmed electronic contract is consistent, and the second user terminal sends the twice-confirmed electronic contract and a sixth abstract to a head office. The invention combines the signing method with the block chain, so that the signing process has higher credibility, and the contract content is not uploaded to the block chain network, thereby ensuring the contract privacy. Meanwhile, the main terminal is adopted to record the content of the secondary confirmation electronic contract, and the first user terminal and the second user terminal can check the content of the electronic contract only by corresponding time and the original secondary confirmation electronic contract, so that the safety and the privacy of the electronic contract stored in the main terminal are ensured.

Description

Electronic intelligent signing method based on block chain technology
Technical Field
The invention belongs to the technical field of electronic intelligent signing, and particularly relates to an electronic intelligent signing method based on a block chain technology.
Background
With the progress of the times and the development of society, the times of transactions carried out on the internet are more and more, and the electronic contract also facilitates the signing process of the companies at different places. In the existing electronic contract signing, the biggest concerns of traders of two parties are the privacy of the contract and the security of signing.
For privacy, it is necessary to ensure that other enterprises cannot check contract contents after the electronic contract is uploaded; the electronic contract must be secure and cannot be tampered in the signing process.
Therefore, how to implement electronic contract subscription still needs further improvement and perfection.
Disclosure of Invention
In order to solve the technical problem, the invention provides an electronic intelligent signing method based on a block chain technology. The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview and is intended to neither identify key/critical elements nor delineate the scope of such embodiments. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
The invention adopts the following technical scheme: an electronic intelligent signing method based on block chain technology, a first user terminal generates an electronic contract;
the first user side calculates the electronic contract through a Hash algorithm to obtain a first abstract;
the first user side uploads the first abstract to a block chain network and sends the electronic contract to the second user side;
the second user end calculates the received electronic contract through a Hash algorithm to obtain a second abstract;
the second user terminal downloads the first abstract from the block chain network, compares the first abstract with the second abstract, and confirms that the electronic contracts are consistent if the first abstract and the second abstract are consistent;
the second user side obtains the second user identity, and the second user identity is bound with the electronic contract to generate a one-time confirmation electronic contract;
the second user side calculates the once-confirmed electronic contract through a Hash algorithm to obtain a third abstract;
the second user end uploads the third abstract to the block chain network, and the once-confirmed electronic contract is sent to the first user end;
the first user terminal calculates the received once-confirmed electronic contract through a Hash algorithm to obtain a fourth abstract;
the first user terminal downloads a third abstract from the block chain network; comparing the third abstract with the fourth abstract, and if the third abstract is consistent with the fourth abstract, confirming that the once-confirmed electronic contracts are consistent;
the first user side obtains the first user identity, and the first user identity is bound with the primary confirmation electronic contract to generate a secondary confirmation electronic contract;
the first user side calculates the secondary confirmation electronic contract through a Hash algorithm to obtain a fifth abstract;
the first user side uploads the fifth abstract to a block chain network, and the secondary confirmation electronic contract is sent to the second user side;
the second user end calculates the received secondary confirmation electronic contract through a Hash algorithm to obtain a sixth abstract;
the second user terminal downloads a fifth abstract from the block chain network; comparing the fifth abstract with the sixth abstract, and if the fifth abstract is consistent with the sixth abstract, confirming that the secondary confirmation electronic contract is consistent;
and the second user end sends the secondary confirmation electronic contract and the sixth abstract to the head end.
Wherein, the second user terminal still includes after sending the secondary confirmation electronic contract to the head end:
the head end confirms the authenticity of the secondary confirmation electronic contract, if true:
the main terminal encrypts the secondary confirmation electronic contract and outputs a first ciphertext after encryption is completed;
the master terminal generates first time, calculates to obtain a seventh abstract by taking the first time and the first ciphertext as input parameters of a hash function, stores the seventh abstract and sends the first time to the first user terminal;
and the master terminal generates second time, calculates and obtains an eighth abstract by taking the second time and the first ciphertext as input parameters of a hash function, stores the eighth abstract and sends the second time to the second user terminal.
The method for the first user side to confirm the electronic contract comprises the following steps:
the first user terminal collects the uploading time of the first user and the uploading secondary confirmation electronic contract of the first user;
the first user sends the secondary confirmation contract uploaded by the first user to the head end, the head end encrypts the secondary confirmation contract uploaded by the first user, outputs a second ciphertext after encryption is completed, and sends the second ciphertext to the first user;
the first user terminal takes the uploading time of the first user and the second ciphertext as input parameters of a hash function, calculates to obtain a first verification summary, and sends the first verification summary to the master terminal;
the master checks whether the first verification abstract is the same as the seventh abstract, and if so, the first ciphertext is sent to the first user side.
The method for the second user side to confirm the electronic contract comprises the following steps:
the second user terminal acquires the uploading time of the second user and uploads a secondary confirmation electronic contract;
the second user sends the second user uploading secondary confirmation contract to the master end, the master end encrypts the second user uploading secondary confirmation contract, a third ciphertext is output after encryption is completed, and the third ciphertext is sent to the second user;
the second user terminal takes the second user uploading time and the third ciphertext as input parameters of a hash function, calculates to obtain a second verification summary, and sends the second verification summary to the main terminal;
and the master checks whether the second verification abstract is the same as the eighth abstract or not, and if so, the first ciphertext is sent to the second user side.
The method for confirming the authenticity of the secondary confirmation electronic contract by the head end comprises the following steps:
the head end calculates the received secondary confirmation contract through a Hash algorithm to obtain a verification abstract;
the head end downloads a fifth abstract from the block chain network;
and the master end compares the verification abstract, the fifth abstract and the sixth abstract, if the verification abstract, the fifth abstract and the sixth abstract are consistent, the secondary confirmation electronic contract is determined to be true, and if the verification abstract, the fifth abstract and the sixth abstract are not consistent, the secondary confirmation electronic contract is determined to be false.
The invention has the following beneficial effects: the invention combines the signing method with the block chain, the whole signing process is connected with the block chain for many times, the reliability of the signing process is higher, and the contract content is not uploaded to the block chain network, thereby ensuring the contract privacy. Meanwhile, the main terminal is adopted to record the content of the secondary confirmation electronic contract, and the first user terminal and the second user terminal can check the content of the electronic contract by corresponding time and the original secondary confirmation electronic contract no matter the first user terminal or the second user terminal needs to check the content of the electronic contract, so that the safety and the privacy of the electronic contract stored in the main terminal are ensured.
Drawings
Fig. 1 is a schematic flow chart of an electronic intelligent signing method based on a block chain technology according to the present invention.
Detailed Description
The following description and the drawings sufficiently illustrate specific embodiments of the invention to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others.
As shown in fig. 1, in some illustrative embodiments,
for more comprehensible description, the first party of the electronic contract uses the first user terminal, and the second party of the electronic contract uses the second user terminal. Similarly, the first client may be used by the second party of the electronic contract and the second client may be used by the first party of the electronic contract. For convenience of description, examples are not given, and only the case that the first party of the electronic contract uses the first user side and the second party of the electronic contract uses the second user side is described as an example, and the hash algorithms mentioned in the present invention all use the existing classical hash algorithm, and it is not limited to which hash algorithm is specifically used.
The first party uploads specific contract contents on the first user side by using the first user side, so that the first user side generates an electronic contract;
the first user side calculates the electronic contract through a Hash algorithm to obtain a first abstract;
and the first user side uploads the first abstract to the block chain network, the content uploaded to the block chain network is considered to be credible, and the electronic contract is sent to the second user side, so that the party B signed by the contract can confirm and check the electronic contract.
The second party uses the second user end, the second user end displays the electronic contract after receiving the electronic contract, the second party checks the content of the electronic contract, and further confirms whether the electronic contract is falsified after confirming that the content is correct: the second party operates the second user end to calculate the received electronic contract through a Hash algorithm to obtain a second abstract;
and the second user terminal downloads the first abstract from the block chain network, compares the first abstract with the second abstract, confirms that the electronic contract is consistent if the first abstract and the second abstract are consistent, and proves that the electronic contract is not tampered in the transmission process.
The second party uploads the second user identity to the second user end, the second user end obtains the second user identity, and the second user identity is bound with the electronic contract to generate a one-time confirmation electronic contract; the second user identity can be an electronic signature, an electronic seal, fingerprint information and other identification information which can identify the second user identity.
The second user side calculates the once-confirmed electronic contract through a Hash algorithm to obtain a third abstract;
the second user end uploads the third abstract to the block chain network, and the once-confirmed electronic contract is sent to the first user end;
after the party A receives the primary confirmation electronic contract, operating the first user end to calculate the received primary confirmation electronic contract through a Hash algorithm to obtain a fourth abstract; further checking once confirms whether the electronic contract is tampered.
The first user terminal downloads a third abstract from the block chain network; and comparing the third abstract with the fourth abstract, and if the third abstract is consistent with the fourth abstract, confirming that the once-confirmed electronic contract is consistent and confirming that the once-confirmed electronic contract is not tampered.
Similarly, the first party uploads the first user identity to the first user side, the first user side obtains the first user identity, and the first user identity is bound with the primary confirmation electronic contract to generate a secondary confirmation electronic contract; the first user identity can be an electronic signature, an electronic seal, fingerprint information and other identification information which can identify the first user identity.
The first user side calculates the secondary confirmation electronic contract through a Hash algorithm to obtain a fifth abstract;
and the first user side uploads the fifth abstract to the block chain network, and the secondary confirmation electronic contract is sent to the second user side, so that the second party performs the last confirmation.
After the second party checks the secondary confirmation electronic contract, operating the second user end to calculate the received secondary confirmation electronic contract through a Hash algorithm to obtain a sixth abstract;
the second user terminal downloads a fifth abstract from the block chain network; comparing the fifth abstract with the sixth abstract, and if the fifth abstract is consistent with the sixth abstract, confirming that the secondary confirmation electronic contract is consistent; it is proved that it has not been tampered with.
And the second user side sends the secondary confirmation electronic contract and the sixth abstract to the head side, the head side performs unified management, and meanwhile, the first user side and the second user side do not perform data storage and recording, so that the safety of the electronic contract is ensured.
The method for confirming the authenticity of the secondary confirmation electronic contract by the head end comprises the following steps:
the head end calculates the received secondary confirmation contract through a Hash algorithm to obtain a verification abstract;
the head end downloads a fifth abstract from the block chain network;
and the master end compares the verification abstract, the fifth abstract and the sixth abstract, if the verification abstract, the fifth abstract and the sixth abstract are consistent, the secondary confirmation electronic contract is determined to be true, and if the verification abstract, the fifth abstract and the sixth abstract are not consistent, the secondary confirmation electronic contract is determined to be false. If false, the signing of the contract is stopped.
If true:
the main terminal encrypts the secondary confirmation electronic contract and outputs a first ciphertext after encryption is finished;
and the master terminal generates a first time, calculates to obtain a seventh abstract by taking the first time and the first ciphertext as input parameters of a hash function, stores the seventh abstract by the master terminal, sends the first time to the first user terminal, and stores the first time as a password of the first user terminal after the first user terminal obtains the first time.
And the master terminal generates second time, calculates and obtains an eighth abstract by taking the second time and the first ciphertext as input parameters of a hash function, stores the eighth abstract and sends the second time to the second user terminal. And after the second party acquires the second time, the second time is used as the password of the second party for storage.
Therefore, the first party and the second party obtain different passwords to be used as the passwords for confirming the electronic contract later. The first time and the second time may be transmitted to the first party or the second party in a digital form in a time, minute and second order. Such as: 20200910003355, which is 20 min 55 s at 10 days 00/09/2020/10/09/year. The generation of the first time and the second time may be the current time of the first time generated by the head end, may also be a randomly generated time, and may also be a time parameter added to the current time of the first time generated by the head end. The second time is the same.
The method for confirming the electronic contract by the first user end comprises the following steps:
the first user terminal collects the uploading time of the first user and the uploading secondary confirmation electronic contract of the first user;
the first user sends the secondary confirmation contract uploaded by the first user to the head end, the head end encrypts the secondary confirmation contract uploaded by the first user, outputs a second ciphertext after encryption is completed, and sends the second ciphertext to the first user;
the first user terminal takes the uploading time of the first user and the second ciphertext as input parameters of a hash function, calculates to obtain a first verification summary, and sends the first verification summary to the master terminal;
the master checks whether the first verification abstract is the same as the seventh abstract, and if so, the first ciphertext is sent to the first user side.
The method for the second user side to confirm the electronic contract comprises the following steps:
the second user terminal acquires the uploading time of the second user and uploads a secondary confirmation electronic contract;
the second user terminal sends the second confirmation contract uploaded by the second user to the master terminal, the master terminal encrypts the second confirmation contract uploaded by the second user, outputs a third ciphertext after encryption is completed, and sends the third ciphertext to the second user terminal;
the second user terminal takes the uploading time of the second user and the third ciphertext as input parameters of a hash function, calculates to obtain a second verification summary, and sends the second verification summary to the master terminal;
and the master checks whether the second verification abstract is the same as the eighth abstract or not, and if so, the first ciphertext is sent to the second user side.
Therefore, the first party has to have the original secondary confirmation electronic contract and the first time at the same time, and the second party has to have the original secondary confirmation electronic contract and the second time at the same time. The stored secondary confirmation contract can be viewed from the head end. Therefore, the secondary confirmation contract stored by the main terminal is ensured to be safe and cannot be decoded and obtained through violent cracking modes such as a dictionary and the like.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.

Claims (5)

1. An electronic intelligent signing method based on block chain technology is characterized in that,
the first user terminal generates an electronic contract;
the first user side calculates the electronic contract through a Hash algorithm to obtain a first abstract;
the first user side uploads the first abstract to a block chain network and sends the electronic contract to the second user side;
the second user end calculates the received electronic contract through a Hash algorithm to obtain a second abstract;
the second user terminal downloads the first abstract from the block chain network, compares the first abstract with the second abstract, and confirms that the electronic contracts are consistent if the first abstract and the second abstract are consistent;
the second user side obtains the second user identity, and the second user identity is bound with the electronic contract to generate a one-time confirmation electronic contract;
the second user side calculates the once-confirmed electronic contract through a Hash algorithm to obtain a third abstract;
the second user end uploads the third abstract to the block chain network, and the once-confirmed electronic contract is sent to the first user end;
the first user terminal calculates the received once-confirmed electronic contract through a hash algorithm to obtain a fourth abstract;
the first user terminal downloads a third abstract from the block chain network; comparing the third abstract with the fourth abstract, and if the third abstract is consistent with the fourth abstract, confirming that the electronic contracts are consistent once;
the first user side obtains a first user identity, and binds the first user identity with the primary confirmation electronic contract to generate a secondary confirmation electronic contract;
the first user side calculates the secondary confirmation electronic contract through a Hash algorithm to obtain a fifth abstract;
the first user end uploads the fifth abstract to a block chain network, and the secondary confirmation electronic contract is sent to the second user end;
the second user end calculates the received secondary confirmation electronic contract through a Hash algorithm to obtain a sixth abstract;
the second user terminal downloads a fifth abstract from the block chain network; comparing the fifth abstract with the sixth abstract, and if the fifth abstract is consistent with the sixth abstract, confirming that the secondary confirmation electronic contract is consistent;
and the second user end sends the secondary confirmation electronic contract and the sixth abstract to the head end.
2. The method as claimed in claim 1, wherein the step of sending the secondary confirmation electronic contract to the head end by the second user end further comprises:
the head end confirms the authenticity of the secondary confirmation electronic contract, if true:
the main terminal encrypts the secondary confirmation electronic contract and outputs a first ciphertext after encryption is completed;
the master terminal generates a first time, calculates and obtains a seventh abstract by taking the first time and a first ciphertext as input parameters of a hash function, stores the seventh abstract and sends the first time to the first user terminal;
and the master terminal generates second time, calculates and obtains an eighth abstract by taking the second time and the first ciphertext as input parameters of a hash function, stores the eighth abstract and sends the second time to the second user terminal.
3. The electronic intelligent subscription method based on the blockchain technology as claimed in claim 2, wherein the method for the first user to confirm the electronic contract comprises:
the first user terminal collects the uploading time of the first user and the uploading secondary confirmation electronic contract of the first user;
the first user sends the secondary confirmation contract uploaded by the first user to the head end, the head end encrypts the secondary confirmation contract uploaded by the first user, outputs a second ciphertext after encryption is completed, and sends the second ciphertext to the first user;
the first user terminal takes the uploading time of the first user and the second ciphertext as input parameters of a hash function, calculates to obtain a first verification summary, and sends the first verification summary to a main terminal;
the master checks whether the first verification abstract is the same as the seventh abstract, and if so, the first ciphertext is sent to the first user side.
4. The electronic intelligent subscription method based on the blockchain technology as claimed in claim 2, wherein the method for the second user to confirm the electronic contract comprises:
the second user terminal acquires the uploading time of the second user and uploads a secondary confirmation electronic contract;
the second user terminal sends the second confirmation contract uploaded by the second user to the master terminal, the master terminal encrypts the second confirmation contract uploaded by the second user, outputs a third ciphertext after encryption is completed, and sends the third ciphertext to the second user terminal;
the second user terminal takes the uploading time of the second user and the third ciphertext as input parameters of a hash function, calculates to obtain a second verification summary, and sends the second verification summary to the master terminal;
and the master checks whether the second verification abstract is the same as the eighth abstract or not, and if so, the first ciphertext is sent to the second user side.
5. The electronic intelligent signing method based on block chain technology as claimed in claim 2, wherein the method for the head end to confirm the authenticity of the secondary confirmation electronic contract comprises:
the head end calculates the received secondary confirmation contract through a Hash algorithm to obtain a verification abstract;
the head end downloads a fifth abstract from the block chain network;
and the head end compares the verification abstract, the fifth abstract and the sixth abstract, if the verification abstract, the fifth abstract and the sixth abstract are consistent, the secondary confirmation electronic contract is confirmed to be true, and if not, the secondary confirmation electronic contract is false.
CN202110021652.3A 2021-01-08 2021-01-08 Electronic intelligent signing method based on block chain technology Active CN112822195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110021652.3A CN112822195B (en) 2021-01-08 2021-01-08 Electronic intelligent signing method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110021652.3A CN112822195B (en) 2021-01-08 2021-01-08 Electronic intelligent signing method based on block chain technology

Publications (2)

Publication Number Publication Date
CN112822195A CN112822195A (en) 2021-05-18
CN112822195B true CN112822195B (en) 2022-11-04

Family

ID=75869039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110021652.3A Active CN112822195B (en) 2021-01-08 2021-01-08 Electronic intelligent signing method based on block chain technology

Country Status (1)

Country Link
CN (1) CN112822195B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020014399A1 (en) * 2018-07-10 2020-01-16 Listat Ltd. Decentralized cybersecure privacy network for cloud communication and global e-commerce

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960165B (en) * 2017-03-13 2020-12-22 广东网金控股股份有限公司 Method for realizing multi-party electronic contract countersigning based on block chain intelligent contract
CN108076057B (en) * 2017-12-14 2020-10-09 北京中星仝创科技有限公司 Data security system and method based on block chain
CN109308211B (en) * 2018-09-11 2021-04-23 上海点融信息科技有限责任公司 Method, apparatus and storage medium for processing transaction data in a blockchain
CN110287732A (en) * 2019-05-15 2019-09-27 杭州趣链科技有限公司 One kind depositing card method based on block chain electronic contract
CN111292041B (en) * 2020-02-18 2023-07-11 上海东普信息科技有限公司 Electronic contract generation method, device, equipment and storage medium
CN111224788B (en) * 2020-04-21 2020-07-24 国网区块链科技(北京)有限公司 Electronic contract management method, device and system based on block chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020014399A1 (en) * 2018-07-10 2020-01-16 Listat Ltd. Decentralized cybersecure privacy network for cloud communication and global e-commerce

Also Published As

Publication number Publication date
CN112822195A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
US11070564B2 (en) Electronic interaction authentication and verification, and related systems, devices, and methods
CN113783836B (en) Internet of things data access control method and system based on block chain and IBE algorithm
US10652014B2 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
EP1750389B1 (en) System and method for updating keys used for public key cryptography
CN111242453B (en) Financial evaluation method and evaluation system based on block chain
Sato et al. Long-term public blockchain: Resilience against compromise of underlying cryptography
CN106341493A (en) Entity rights oriented digitalized electronic contract signing method
CN112732695B (en) Cloud storage data security deduplication method based on block chain
CN105635070B (en) Anti-counterfeiting method and system for digital file
Isirova et al. Decentralized public key infrastructure development principles
CN114266069B (en) House transaction electronic data sharing system and method based on blockchain technology
CN114357492A (en) Medical data privacy fusion method and device based on block chain
CN112035894A (en) Electronic evidence trusteeship system
Gulati et al. Self-sovereign dynamic digital identities based on blockchain technology
CN115065480A (en) Electronic contract system and signing method based on block chain certificate storage
CN116226824A (en) Electronic contract signing method and system based on blockchain and CA certificate
CN110827034B (en) Method and apparatus for initiating a blockchain transaction
CN113761578A (en) Document true checking method based on block chain
CN104158662A (en) XAdEs-based multi-user electronic voucher and implementation method
CN112822195B (en) Electronic intelligent signing method based on block chain technology
EP4014428A1 (en) System and method for electronic signature creation and management for long-term archived documents
CN116069856A (en) Data integrity verification method and system based on blockchain
CN106982123B (en) One-way encryption electronic signature method and system
CN112541199A (en) Block chain-based electronic storage certificate integrity verification method and electronic equipment
CN116506104B (en) Method and system for information security interaction of different departments based on cross-chain blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221019

Address after: 518000 235, Block R2-A, High tech Industrial Village, No. 020, Gaoxin South 7th Road, High tech District Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong

Applicant after: Shenzhen Hanshuo Computer Technology Co.,Ltd.

Address before: 510000 Room 501, no.5-3, Lane 1, Zhonghuan street, yushatan dam, Tianhe District, Guangzhou City, Guangdong Province

Applicant before: Guangzhou Juntai Trading Co.,Ltd.

GR01 Patent grant
GR01 Patent grant