CN112948882A - Electronic contract encryption method and device and storage medium - Google Patents

Electronic contract encryption method and device and storage medium Download PDF

Info

Publication number
CN112948882A
CN112948882A CN202110300187.7A CN202110300187A CN112948882A CN 112948882 A CN112948882 A CN 112948882A CN 202110300187 A CN202110300187 A CN 202110300187A CN 112948882 A CN112948882 A CN 112948882A
Authority
CN
China
Prior art keywords
electronic contract
time
electronic
signing
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110300187.7A
Other languages
Chinese (zh)
Inventor
李旭东
权琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Huibo Wending Information Technology Co Ltd
Original Assignee
Xi'an Huibo Wending Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Huibo Wending Information Technology Co Ltd filed Critical Xi'an Huibo Wending Information Technology Co Ltd
Priority to CN202110300187.7A priority Critical patent/CN112948882A/en
Publication of CN112948882A publication Critical patent/CN112948882A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an electronic contract encryption method, an electronic contract encryption device and a storage medium, and belongs to the technical field of communication. The method comprises the following steps: receiving a first electronic contract and executing signing; acquiring signing time and sending the signing time to an electronic signer, wherein the electronic signer comprises a time encryption algorithm and a first electronic contract; the electronic signer encrypts the signing time according to the time encryption algorithm to generate a corresponding time identifier; and storing the time identification into the first electronic contract, generating a second electronic contract, and sending the second electronic contract to the user terminal. According to the invention, after the signing time of the first electronic contract is acquired, the signing time is encrypted by adopting a time encryption algorithm to generate a corresponding time identifier, the corresponding time identifier is stored in the first electronic contract to generate the second electronic contract, and the current time parameter is adopted, so that the time is not repeated, and the signing time can represent the uniqueness of the electronic contract, thereby reflecting the safety and the uniqueness of the electronic contract.

Description

Electronic contract encryption method and device and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an electronic contract encryption method, apparatus, and storage medium.
Background
With the development of electronic technology, electronic contracts appear with the characteristics of convenience in transmission, saving and the like, and the electronic contracts transmit information through electronic pulses, but do not use a piece of paper as an original credential any more, but only a group of electronic information. The most important step in the signing process of an electronic contract is the signing and verification of the document. The electronic contract document must have tamper-resistant, queryable, traceable characteristics. Therefore, there is a need for an electronic contract encryption method, apparatus and storage medium.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides an electronic contract encryption method, an electronic contract encryption device and a storage medium.
In a first aspect, an electronic contract encryption method is provided, the method including:
receiving a first electronic contract and executing signing;
obtaining a signing time and sending the signing time to an electronic signer, the electronic signer comprising a time encryption algorithm and the first electronic contract;
the electronic signer encrypts the signing time according to the time encryption algorithm to generate a corresponding time identifier;
and storing the time identification into the first electronic contract, generating a second electronic contract, and sending the second electronic contract to a user terminal.
Further, the method further comprises: after the second electronic contract is sent to the user terminal,
and generating an evidence chain for the second electronic contract, and storing the evidence chain to a database so as to perform a signature verification process based on the evidence chain in the database when a signature verification request of the second electronic contract is received.
Further, generating the chain of evidence for the second electronic contract comprises:
hashing the second electronic contract through a hashing algorithm to generate a first hashing value;
and associating the first hash value with the second electronic contract and storing the first hash value and the second electronic contract into the database, so that when the second electronic contract signature verification request is received, a signature verification process is carried out based on the first hash value in the database.
Further, the signature verification process comprises the following steps:
when a signature checking request is received, acquiring the second electronic contract to be checked according to the signature checking request, and hashing the second electronic contract to be checked through a hashing algorithm to generate a second hashing value;
querying whether the first hash value and the second hash value in the database are the same;
if not, the signature verification fails;
if yes, the signature verification is successful.
Further, the generating the corresponding time identification comprises:
and selecting a plurality of coordinate points in the first electronic contract by using time year, month, day, time, minute and second as parameters, and carrying out XOR modification on pixel points of the coordinate points to generate the corresponding time identifier.
In a second aspect, there is provided an electronic-contract encryption apparatus, the apparatus including:
the receiving module is used for acquiring a first electronic contract;
the time acquisition module is used for acquiring signing time to the electronic signer;
the encryption module is used for encrypting the signing time according to a time encryption algorithm in the electronic signer to obtain a time identifier;
a storage module: the time identifier is stored in the first electronic contract, and a second electronic contract is generated;
a sending module: for sending the second electronic contract to the user terminal.
Further, the apparatus further comprises:
an evidence chain generating module, configured to generate an evidence chain for the second electronic contract;
the verification module is used for verifying the signature based on the evidence chain in the database when the verification of the second electronic contract is received;
correspondingly, the storage module is further used for storing the evidence chain to a database;
the receiving module is further used for receiving a signature verification request of the second electronic contract and obtaining the second electronic contract to be verified according to the signature verification request.
In a third aspect, there is provided a computer-readable storage medium having stored therein computer-executable instructions for implementing the electronic contract encryption method of any one of claims 1 to 5 when executed by a processor.
The technical scheme provided by the embodiment of the invention has the following beneficial effects: the invention provides an electronic contract encryption method, an electronic contract encryption device and a storage medium. According to the method, after the signing time of the first electronic contract is obtained, the signing time is encrypted by adopting a time encryption algorithm to generate a corresponding time identifier, the corresponding time identifier is stored in the first electronic contract to generate the second electronic contract, the current time parameter is adopted, the time is not repeated, so that the signing time can represent the uniqueness of the electronic contract, and the safety and the uniqueness of the electronic contract can be reflected.
In addition, the invention also comprises a signature checking process, which carries out hash on the second electronic contract, and the authenticity of the electronic contract can be verified by adopting the hash value during signature checking, thereby ensuring the safety, reliability and non-tamper property of the electronic contract again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an electronic contract encryption method provided by the present invention.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
In the prior art, the electronic contract is easy to be tampered after the signing process of the electronic contract. In order to solve the technical problem, the present application provides the following technical solutions.
Fig. 1 is a flowchart of an electronic contract encryption method provided by the present invention. Referring to fig. 1, the method comprises the steps of:
step S201: and receiving the first electronic contract and executing signing.
Step S202: the signing time is obtained and sent to the electronic signer, which comprises a time encryption algorithm and a first electronic contract.
Step S203: and the electronic signer encrypts the signing time according to the time encryption algorithm to generate a corresponding time identifier.
Step S204: and storing the time identification into the first electronic contract, generating a second electronic contract, and sending the second electronic contract to the user terminal.
The following description is made with respect to step S201: the electronic contract includes basic information of both parties of the contract, for example, the basic information includes name, telephone, ID card number, contract clause, etc.
The following description is made with respect to step S202:
the server acquires the signing time corresponding to the signing execution time from the Beidou satellite, and the time is not repeated, so the signing time can represent the uniqueness of the electronic contract, and the safety and the reliability of the electronic contract can be reflected.
The following description is made with respect to step S203:
the algorithm of the signer includes, but is not limited to, asymmetric algorithm, symmetric algorithm, and hash function and key generation algorithm, wherein MD5, SHA256, SHA512, and SM3 cryptographic algorithms are supported in the hash function library, and the hash algorithm used in the future is selected in the configuration compilation.
The following description is made with respect to step S204:
the signing client software adds the time identification encrypted by the special time into the electronic contract by utilizing the pdf and ofd technology to generate a second electronic contract, so that the electronic contract has the characteristics of tamper resistance, inquiry ability and traceability.
Further, the method further comprises:
step S205: and generating an evidence chain for the second electronic contract, and storing the evidence chain to the database so as to perform a signature verification process based on the evidence chain in the database when a signature verification request of the second electronic contract is received.
The operation method can be as follows: the signer is inserted, the signing system is opened, the electronic contract to be signed is opened, the seal is stamped, the signing is executed, the uniqueness of the file can be verified after the signing is successful, the electronic contract can be prevented from being tampered, the effectiveness of the electronic contract is further ensured, and the benefits of both parties of the electronic contract are ensured.
Further, generating the chain of evidence for the second electronic contract comprises: the second electronic contract is hashed through a hash algorithm to generate a first hash value; and associating the first hash value with the second electronic contract and storing the association result in a database, so that when a second electronic contract signature verification request is received, a signature verification process is performed based on the first hash value in the database.
It should be noted that Hash, which is generally translated as Hash, or transliteration into Hash, is to convert an input with an arbitrary length (also called pre-mapped pre-image) into an output with a fixed length through a Hash algorithm, and the output is a Hash value. The Hash algorithm may convert a data into a flag that is closely related to each byte of the source data. The Hash algorithm also has a characteristic that it is difficult to find a reverse rule.
Further, the signature verification process comprises the following steps: when a signature checking request is received, acquiring a second electronic contract to be checked according to the signature checking request, and hashing the second electronic contract to be checked through a hashing algorithm to generate a second hashing value; inquiring whether the first hash value and the second hash value in a database are the same; if not, the signature verification fails; if yes, the signature verification is successful. The hash algorithm here may be selected from SM3 hash algorithm, but the present invention is not limited thereto.
Further, generating the respective time stamp includes: and selecting a plurality of coordinate points in the first electronic contract by using the year, month, day, hour, minute and second of time as parameters, and carrying out XOR modification on pixel points of the coordinate points to generate corresponding time identifications.
The invention also provides an electronic contract encryption device, which comprises:
the receiving module is used for acquiring a first electronic contract; the time acquisition module is used for acquiring signing time to the electronic signer; the encryption module is used for encrypting the signing time according to a time encryption algorithm in the electronic signer to obtain a time identifier; a storage module: the time identification is stored in the first electronic contract, and a second electronic contract is generated; a sending module: for sending the second electronic contract to the user terminal.
Further, the evidence chain generating module is used for generating an evidence chain from the second electronic contract; the system comprises a signature verification module, a signature verification module and a signature verification module, wherein the signature verification module is used for verifying a signature based on an evidence chain in the database when receiving a signature verification of a second electronic contract; correspondingly, the storage module is also used for storing the evidence chain to the database; the receiving module is further used for receiving the signature verification request of the second electronic contract and obtaining the electronic contract to be verified according to the signature verification request.
The secure electronic contract encryption apparatus of the present invention may be used to implement the technical solution in the foregoing secure electronic contract encryption method embodiment of the present invention, and the implementation principle and technical effect are similar, which are not described herein again.
The embodiment of the present application further provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement any one of the above electronic contract encryption methods.
The embodiment of the present application further provides a computer program product, which includes computer executable instructions, and the computer executable instructions are executed by a processor to implement any one of the above-mentioned electronic contract encryption methods.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. An electronic contract encryption method, characterized in that the method comprises:
receiving a first electronic contract and executing signing;
obtaining a signing time and sending the signing time to an electronic signer, the electronic signer comprising a time encryption algorithm and the first electronic contract;
the electronic signer encrypts the signing time according to the time encryption algorithm to generate a corresponding time identifier;
and storing the time identification into the first electronic contract, generating a second electronic contract, and sending the second electronic contract to a user terminal.
2. The electronic contract encryption method according to claim 1, further comprising: after the second electronic contract is sent to the user terminal,
and generating an evidence chain for the second electronic contract, and storing the evidence chain to a database so as to perform a signature verification process based on the evidence chain in the database when a signature verification request of the second electronic contract is received.
3. The electronic contract encryption method according to claim 2, wherein generating the second electronic contract into an evidence chain comprises:
hashing the second electronic contract through a hashing algorithm to generate a first hashing value;
and associating the first hash value with the second electronic contract and storing the first hash value and the second electronic contract into the database, so that when the second electronic contract signature verification request is received, a signature verification process is carried out based on the first hash value in the database.
4. The electronic contract encryption method according to claim 3, wherein the signature verification process includes:
when a signature checking request is received, acquiring the second electronic contract to be checked according to the signature checking request, and hashing the second electronic contract to be checked through a hashing algorithm to generate a second hashing value;
querying whether the first hash value and the second hash value in the database are the same;
if not, the signature verification fails;
if yes, the signature verification is successful.
5. The electronic contract encryption method according to claim 4, wherein said generating the corresponding time stamp includes:
and selecting a plurality of coordinate points in the first electronic contract by using time year, month, day, time, minute and second as parameters, and carrying out XOR modification on pixel points of the coordinate points to generate the corresponding time identifier.
6. An electronic contract encryption apparatus, characterized in that the apparatus comprises:
the receiving module is used for acquiring a first electronic contract;
the time acquisition module is used for acquiring signing time to the electronic signer;
the encryption module is used for encrypting the signing time according to a time encryption algorithm in the electronic signer to obtain a time identifier;
a storage module: the time identifier is stored in the first electronic contract, and a second electronic contract is generated;
a sending module: for sending the second electronic contract to the user terminal.
7. The electronic contract encryption apparatus according to claim 6, further comprising:
an evidence chain generating module, configured to generate an evidence chain for the second electronic contract;
the verification module is used for verifying the signature based on the evidence chain in the database when the verification of the second electronic contract is received;
correspondingly, the storage module is further used for storing the evidence chain to a database;
the receiving module is further used for receiving a signature verification request of the second electronic contract and obtaining the second electronic contract to be verified according to the signature verification request.
8. A computer-readable storage medium having computer-executable instructions stored therein, which when executed by a processor, are configured to implement the electronic contract encryption method of any one of claims 1 to 5.
CN202110300187.7A 2021-03-22 2021-03-22 Electronic contract encryption method and device and storage medium Pending CN112948882A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110300187.7A CN112948882A (en) 2021-03-22 2021-03-22 Electronic contract encryption method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110300187.7A CN112948882A (en) 2021-03-22 2021-03-22 Electronic contract encryption method and device and storage medium

Publications (1)

Publication Number Publication Date
CN112948882A true CN112948882A (en) 2021-06-11

Family

ID=76227328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110300187.7A Pending CN112948882A (en) 2021-03-22 2021-03-22 Electronic contract encryption method and device and storage medium

Country Status (1)

Country Link
CN (1) CN112948882A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114492355A (en) * 2021-12-30 2022-05-13 博思数采科技发展有限公司 Method and system for generating electronic bidding invitation letter and response receipt letter in OFD format
CN116032476A (en) * 2023-03-30 2023-04-28 北京点聚信息技术有限公司 Electronic contract content intelligent encryption method based on sequence decomposition

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114492355A (en) * 2021-12-30 2022-05-13 博思数采科技发展有限公司 Method and system for generating electronic bidding invitation letter and response receipt letter in OFD format
CN116032476A (en) * 2023-03-30 2023-04-28 北京点聚信息技术有限公司 Electronic contract content intelligent encryption method based on sequence decomposition

Similar Documents

Publication Publication Date Title
US8693690B2 (en) Organizing an extensible table for storing cryptographic objects
JP4593533B2 (en) System and method for updating keys used for public key cryptography
EP2095288B1 (en) Method for the secure storing of program state data in an electronic device
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
CN111464315B (en) Digital signature processing method, device, computer equipment and storage medium
US20060101271A1 (en) Method and system for conveying alternate acceptable canonicalizations of a digitally signed piece of electronic mail
CN109978543B (en) Contract signing method and device, electronic equipment and storage medium
CN112948882A (en) Electronic contract encryption method and device and storage medium
Lax et al. Digital document signing: Vulnerabilities and solutions
CN113961956B (en) Method, device, equipment and medium for generating and applying labeled network information service
CN113347143A (en) Identity authentication method, device, equipment and storage medium
CN115442047A (en) Electronic signature method and system for business management file
CN113900772A (en) Mirror image file transmission method, device, equipment and storage medium
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN113221188A (en) AIS data evidence storing method, AIS data evidence obtaining device and AIS data evidence storing medium
CN109450643B (en) Signature verification method realized on Android platform based on native service
CN114143098B (en) Data storage method and data storage device
KR20140033824A (en) Encryption systems and methods using hash value as symmetric key in the smart device
CN116069856A (en) Data integrity verification method and system based on blockchain
CN115766270A (en) File decryption method, file encryption method, key management method, device and equipment
CN115442046A (en) Signature method, signature device, electronic equipment and storage medium
Bojanova et al. Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
CN112866209B (en) Dialysis data safety management system and method
CN111953495B (en) Private-key-free signing method under electronic signature mixed cloud scene
CN111478948B (en) Block chain access method, internet of things equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination