CN113127822A - Enterprise electronic seal management method and system based on enterprise chain code - Google Patents
Enterprise electronic seal management method and system based on enterprise chain code Download PDFInfo
- Publication number
- CN113127822A CN113127822A CN202110313448.9A CN202110313448A CN113127822A CN 113127822 A CN113127822 A CN 113127822A CN 202110313448 A CN202110313448 A CN 202110313448A CN 113127822 A CN113127822 A CN 113127822A
- Authority
- CN
- China
- Prior art keywords
- transaction
- enterprise
- seal
- signature
- electronic seal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 49
- 238000012545 processing Methods 0.000 claims abstract description 9
- 238000000034 method Methods 0.000 claims description 20
- 230000008569 process Effects 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 10
- 230000009471 action Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 6
- 239000003999 initiator Substances 0.000 claims description 6
- 238000013475 authorization Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000012790 confirmation Methods 0.000 claims description 3
- 238000011161 development Methods 0.000 claims description 3
- 210000001503 joint Anatomy 0.000 claims description 3
- 238000003032 molecular docking Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 18
- 238000007789 sealing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an enterprise electronic seal management method based on enterprise chain codes, which adopts a block chain technology to obtain electronic seal information of an enterprise through identity authentication of enterprise legal persons for a given generated enterprise chain code account user. And the use record of the electronic seal and the corresponding signature rule are taken as record data to be stored in the alliance chain, wherein the use record of the electronic seal comprises signature time, an operator, items and feedback; meanwhile, before the electronic seal is used, the seal needs to be applied first, and chain linking processing is carried out on the application record of the electronic seal. The invention can ensure the authenticity and integrity of the use and management of the electronic seal of an enterprise and the undeniability of a signer, electronize and digitize the seal, and strengthen the use and management of the electronic seal.
Description
Technical Field
The invention relates to the field of block chains, in particular to an enterprise electronic seal management method and system based on enterprise chain codes.
Background
The electronic seal technology simulates the traditional physical seal by advanced digital technology, the management and use mode of the electronic seal accords with the habit and experience of the physical seal, and the electronic document stamped by the electronic seal has the same appearance, the same effectiveness and the similar use mode as the paper document stamped by the physical seal.
With the gradual change of the traditional office mode to the information office mode, the circulation form of the paper document is changed to the circulation form of the electronic document, and the electronic seal can ensure the effectiveness of the electronic document and simultaneously ensure that the electronic document has the same public letter visual effect as the traditional paper document.
The electronic seal is used on the basis of an environment which is safe and stable enough, and the electronic seal is ensured to be exclusive to a stamping person (the seal is My), and the stamping is controlled by the stamping person (the seal is My). Due to the easy counterfeiting of the electronic seal, the security of the electronic seal puts higher requirements on the technical application.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide an enterprise electronic seal management method based on enterprise chain codes by using a block chain technology. The enterprise electronic seal of the enterprise chain code uses the PKI public key as the unique identity of the signer, and carries out block chain storage on the core information of the acquisition, authorized use, signing process and the like of the electronic seal, thereby ensuring the integrity, the non-falsification and the non-falsification of the electronic seal, and simultaneously ensuring the authenticity and the integrity of the electronic document and the non-repudiation of the signing behavior.
The invention also aims to provide an enterprise electronic seal management system based on the enterprise chain code.
The purpose of the invention is realized by the following technical scheme:
an enterprise electronic seal management method based on enterprise chain codes comprises the following steps:
for a given generated enterprise chain code account user, after the enterprise chain code account user is authenticated by an enterprise legal person, an available electronic seal of enterprise information is obtained, electronic signature operation is carried out on an electronic information file needing to be stamped, and the electronic seal of the transaction and a corresponding signature rule are stored on a alliance chain as record data; meanwhile, before the electronic seal is used, the seal needs to be applied first, and chain linking processing is carried out on the application record of the electronic seal. One enterprise can apply for five types of seals, namely a company official seal, a financial seal, a contract special seal, an invoice seal and a legal representative name seal. The seal is authenticated and authorized so as to ensure the identity of the seal.
The cochain processing is carried out on the application record of the electronic seal, and the specific process is as follows:
(1) calling a seal application record inquiry interface of a third-party service platform to inquire whether the application action is successful: if not, not linking the chain, if successful, carrying out chain linking operation on the application seal record;
(2) acquiring a serial number of an enterprise chain code account of a currently logged-in enterprise; each account maintains its own serial number, which increases from 1 in turn, one serial number marking a transaction for that account;
(3) assembling storage certificate information operation: this step will use the account address of the partner to define a key and value at the same time to save the evidence; the certificate storage Key is convenient for retrieving certificate storage information, and value stores certificate storage contents, wherein the Key is composed of the current time, month and day and enterprise ids of the first party and the second party; value is a data item of the space asset and is also a data item needing to be linked up;
(4) serializing transactions for network transmission: the contents to be serialized in the step comprise deposit certificate transaction, the value of the obtained serial number increased by 1, the unit price of the transaction fee and the transaction fee; the more the transaction fee of the transaction is, the more the content of the certificate is stored, the more the cost is spent; obtaining a transactioniBlob after serialization certificate-deposit transaction;
(5) signature transaction: after the transaction is serialized, the transaction initiator needs to perform identity authentication on transaction data, signs the data by using a private key, namely signs the transactioniBlob generated in the step (4) by using the private key, and the signature is called as the signature of the data; the signature result comprises signature data and a public key;
(6) submitting a transaction: after the transaction data is signed, the transaction metadata (transactionBlob) and the signature (signatures) need to be submitted (transaction broadcast) to the blockchain network.
(7) And updating the data after successful uplink.
The electronic seal selects the seal required by signature in service, the selected seal is called to seal the data required to be signed when the signature is carried out, when the signature action is completed, the data after the signature and the signature record are linked up, and the link up process of the signature record is as follows:
(1) calling a query signature record interface of a third-party service platform to query whether the signature action is completed or not: if not, not linking the chain, if the completion, performing the chain linking operation on the signature record;
(2) acquiring a serial number of an enterprise chain code account of a currently logged-in enterprise; each account maintains its own serial number, which increases from 1 in turn, one serial number marking a transaction for that account;
(3) assembling storage certificate information; this step will use the account address of the partner to define a key and value at the same time to save the evidence; the certificate storage Key is convenient for retrieving certificate storage information, and value stores certificate storage contents, wherein the Key is composed of the current time, month and day and enterprise ids of the first party and the second party; value is a data item of the space asset and is also a data item needing to be linked up;
(4) serializing the transaction for network transmission; the contents to be serialized in the step comprise deposit certificate transaction, the value of the obtained serial number increased by 1, the unit price of the transaction fee and the transaction fee; the more the transaction fee of the transaction is, the more the content of the certificate is stored, the more the cost is spent; obtaining a transactioniBlob after serialization certificate-deposit transaction;
(5) signature transaction: after the transaction is serialized, the transaction initiator needs to perform identity authentication on transaction data, signs the data by using a private key, namely signs the transactioniBlob in the step (4) by using the private key, which is called as the signature of the data; the signature result comprises signature data and a public key;
(6) submitting a transaction: after the transaction data is signed, transaction metadata (transactionBlob) and signatures (signatures) need to be submitted (transaction broadcast) to the blockchain network;
(7) updating the data after successful uplink; so far, the signature and certificate transaction is successful.
The enterprise electronic seal management method based on the enterprise chain code comprises the following steps of: the application system sends an application request to the credible authentication platform, the credible authentication platform acquires the seal information from the government block chain, the serial number of the applied service is returned to the application system, the government block chain inquires the service data of the applied seal according to the serial number, and the credible service provider makes a seal and completes an intelligent contract to store the seal information on the government block chain; after the application system sends a request for inquiring the application condition to the trusted authentication platform, the trusted authentication platform acquires the seal information from the administration block chain and returns the application condition to the citation system, and the user can obtain the seal.
The enterprise electronic seal management method based on the enterprise chain code comprises the following steps of: the application system sends a request for applying electronic signature transaction to the trusted authentication platform, and the trusted authentication platform uploads the request to a government affair block chain and returns a transaction serial number to the citation system; after the user confirms or authorizes the transaction after passing identity authentication, the trusted authentication platform can upload the updated transaction intention information to the government affair block chain and return a confirmation or authorization result to the user, and then the trusted service provider obtains a confirmed or authorized transaction record in the government affair block chain; the trusted service provider signs the transaction records, submits the signature information to the government affair block chain, and the trusted authentication platform acquires the transaction results on the government affair block chain, combines the transaction results and signs the transaction results into a PDF file; the application system can inquire the transaction result, and the credible authentication platform acquires the transaction result on the government affair block chain and returns the transaction result to the application system; and finally, the application system can acquire the signed PDF file through the trusted authentication platform.
The enterprise electronic seal management method based on the enterprise chain code comprises the following steps of accessing a unified electronic seal platform: consulting, docking and communicating with a management department and an operation platform by using a chapter unit to determine the requirements; then, the unit of the seal is required to submit application data to a management department for examination, the management department notifies the unit of the seal after examination is passed, if examination is not passed, the unit of the seal is notified to modify, and if examination is passed, the unit of the seal is notified to an operation platform for business handling; then, carrying out system butt joint by using a seal unit and an operation platform, wherein the operation platform provides technical support to assist in carrying out integrated development and test by using the seal unit; and then the operation platform provides operation guarantee after online operation.
The enterprise electronic seal management method based on the enterprise chain code has the following electronic seal platform calling mode: the electronic seal platform as the called party registers application and applies for service on the public supporting platform, and the customer service as the calling party registers application and applies for service on the public supporting platform; then the public supporting platform checks the service application of the called party; then, the calling party initiates a request and carries with signature information (using an API gateway signature algorithm), the gateway carries with the signature information (using the API gateway signature algorithm) to a service request, a request header, a called party responds to the request and carries with a signature (using a response header and the API gateway signature algorithm), and the API gateway receives the response and sends the response request to the calling party (using the response header and the API gateway signature algorithm).
The other purpose of the invention is realized by the following technical scheme:
an enterprise electronic seal management system based on enterprise chain codes comprises a legal person verification login module and an enterprise electronic seal management module; wherein,
the legal person verification login module is used for verifying login of a user of the enterprise chain code account which is generated in a set mode after the user of the enterprise chain code account is authenticated by face recognition real name;
the enterprise electronic seal management module is used for acquiring enterprise information after legal persons verify and log in, carrying out electronic signature operation on an electronic information file to be stamped according to an available electronic seal of the current enterprise, and storing a transacted electronic seal and a corresponding signature rule as recording data on a alliance chain; meanwhile, before the electronic seal is used, the seal needs to be applied first, and chain linking processing is carried out on the application record of the electronic seal.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention combines the block chain technology with the use and management of the electronic seal, can ensure the belonging of the seal based on the enterprise chain code, the electronic seal is used firstly, the identity authentication of an enterprise legal person is needed, the seal application can be carried out after the authentication and authorization pass, and the identity of an applicant is ensured to be the belonging of the seal. The electronic seal signing based on the enterprise chain code can safely and reliably record the use and signature content of the electronic seal in the whole process, and improves the safety and the convenience.
Drawings
Fig. 1 is a flow chart of the electronic seal access according to the present invention.
FIG. 2 is a flow chart of the specific use of the electronic seal according to the present invention.
FIG. 3 is a flowchart of applying for an electronic seal according to the enterprise chain code-based enterprise electronic seal management method of the present invention.
FIG. 4 is a flowchart of applying for an electronic signature of the enterprise electronic seal management method based on enterprise chain codes according to the present invention.
Fig. 5 is a flowchart of the method for managing an enterprise electronic seal based on an enterprise chain code according to the present invention accessing a unified electronic seal platform.
Fig. 6 is a flowchart of electronic seal platform invocation of the enterprise electronic seal management method based on enterprise chain codes according to the present invention.
FIG. 7 is a flow chart of the present invention for a credit transaction.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
An enterprise electronic seal management method based on enterprise chain codes refers to an enterprise chain code account user in a system, after the user login is authenticated by face recognition real name, a legal person verifies the login to obtain enterprise information, electronic signature operation is carried out on an electronic information file needing to be stamped according to a current available electronic seal of an enterprise, and authenticity and integrity of electronic information and non-repudiation of a signer are guaranteed.
The electronic seal has the basic characteristics that:
firstly, new concepts such as certificates and CA are not involved in the whole using process, and the electronic signature technology is completely hidden behind the electronic seal, so that people can use the electronic seal by relying on daily experience without learning and understanding the arduous technologies and concepts additionally.
And secondly, ensuring that the seal becomes an effective expression form of the signature. That is, the seal is normally displayed only when the electronic signature technology is used to verify that a certain electronic document is true and valid. Therefore, text data needs to be protected by an electronic signature technology, and a seal needs to be protected, so that the phenomenon that a legal seal is displayed on an illegal electronic file after being embezzled by a lawbreaker is avoided, and the confusion is not.
And thirdly, one physical seal can only correspond to one electronic seal. On one hand, the seal box accords with the daily use habit of people, on the other hand, leaders know that a plurality of seals are required to be managed according to daily experience, and the situation that the seal out of control flies all day is avoided.
And fourthly, the electronic seal must be stored on a removable medium (such as a USB flash disk). The removable medium storing the electronic seal is equivalent to a physical seal and can be kept as the physical seal is kept. Even a common office worker who cannot know the technical problem at once can lock the seal in the safe as before, take the corresponding seal out of the cabinet for use after seeing a leader's approval and signature, and put the seal back after the seal is used up. The mobile media must be subject to a national crypto authority audit.
Fifth, in order to make the electronic document with the electronic seal have the same appearance and other characteristics as the paper document, it is necessary to adopt the digital paper technology (CEB technology, CEBX technology, PDF technology, or SEP technology). The digital paper technology is a technical platform which is built by using the digital technology and accords with the characteristics of traditional paper, not only has strong layout description capacity, but also can be represented by drawing on paper no matter how complex the layout is, and more importantly, has layout consistency, non-tamper-ability and non-separability. For example, although the Word is very powerful, the Word can not be guaranteed, sometimes a 100-page Word document is sent to others, the other party becomes 101 pages when receiving the Word document, although the content is unchanged, the typesetting position of characters, graphics and the like is changed. The inseparability is more useful, it ensures that anyone cannot separate the seal from the document after sealing, and then seal to another document. Digital paper technology is an important foundation for electronic seal technology.
The electronic seal using process comprises the following steps:
1. the electronic seal is applied by using the organization (or individual) of the electronic seal to firstly apply for the electronic seal to an electronic seal (management) center (platform), under the condition of fulfilling normal procedures and confirming no error and legality, the electronic seal is made for an applicant, and the made electronic seal is guided into a specific storage medium, such as a USB-Key or an IC card, and submitted to the applicant.
2. Electronic seal client system
The electronic seal product provider provides an electronic seal for a user, and also provides a set of electronic seal client systems. The system should be installed in a terminal computer used by the custodian of the electronic seal. The electronic seal client system is mainly used for stamping, checking and electronic seal management and other functions.
3. Use of electronic seal
The electronic seal is used in the same way as a traditional seal. As described above, there is a need for a dedicated electronic seal client system, which is provided by an electronic seal management platform (electronic seal center) and installed on a specific computer terminal. The next steps are generally:
(1) get approval about the leader of the supervisor.
(2) And inserting an entity (such as USBKey) with the electronic seal into a USB interface of the computer terminal.
(3) And starting an electronic seal client system.
(4) And reading the electronic document needing to be stamped with the electronic seal.
(5) And clicking a 'stamping' function button on a menu at a place where an electronic seal needs to be stamped in the electronic document.
(6) The system prompts to input the pin code of the seal entity.
(7) And inputting the correct pin code used by the electronic seal, and then the document is covered with the electronic seal.
4. Verification of electronic seal
When the electronic document with the electronic seal is verified, a terminal computer provided with an electronic seal client system is also needed. When the electronic document with the electronic seal is opened, the electronic seal client system can automatically verify whether the electronic seal of the electronic document is effective. If the electronic document is modified without authorization or the electronic seal is copied and pasted on the current electronic document, the electronic seal client system can find and immediately warn the user that the electronic document is modified or the electronic document is stamped with an invalid electronic seal, and the electronic seal cannot be normally displayed, so that the aims of protecting the integrity of the electronic document and verifying that the electronic seal and the specific electronic document are related are fulfilled.
5. Loss of electronic seal
If the electronic seal is lost, the electronic seal platform (center) should be immediately lost, and the process is basically similar to the certificate revocation processing mode.
And (3) accessing the electronic seal, as shown in figure 1.
The specific use flow of the electronic seal is shown in fig. 2.
When the electronic seal is used, the electronic seal needs to be registered and logged in by a legal person first, after the electronic seal is opened and enters an enterprise chain code identity platform, the electronic seal module is logged in, the electronic seal which is successfully applied by the current enterprise can be checked, when the electronic information needs to be signed, the electronic seal which is successfully applied can be signed for the electronic information, and authenticity and integrity of the electronic information are guaranteed, and non-repudiation of the signer is realized.
The process of using the electronic seal for the first time comprises the following steps:
as shown in fig. 3, the enterprise electronic seal management method based on the enterprise chain code includes the following processes: the application system sends an application request to the credible authentication platform, the credible authentication platform acquires the seal information from the government block chain, the serial number of the applied service is returned to the application system, the government block chain inquires the service data of the applied seal according to the serial number, and the credible service provider makes a seal and completes an intelligent contract to store the seal information on the government block chain; after the application system sends a request for inquiring the application condition to the trusted authentication platform, the trusted authentication platform acquires the seal information from the administration block chain and returns the application condition to the citation system, and the user can obtain the seal.
As shown in fig. 4, the process of applying for the electronic signature of the enterprise electronic seal management method based on the enterprise chain code is as follows: the application system sends a request for applying electronic signature transaction to the trusted authentication platform, and the trusted authentication platform uploads the request to a government affair block chain and returns a transaction serial number to the citation system; after the user confirms or authorizes the transaction after passing identity authentication, the trusted authentication platform can upload the updated transaction intention information to the government affair block chain and return a confirmation or authorization result to the user, and then the trusted service provider obtains a confirmed or authorized transaction record in the government affair block chain; the trusted service provider signs the transaction records, submits the signature information to the government affair block chain, and the trusted authentication platform acquires the transaction results on the government affair block chain, combines the transaction results and signs the transaction results into a PDF file; the application system can inquire the transaction result, and the credible authentication platform acquires the transaction result on the government affair block chain and returns the transaction result to the application system; and finally, the application system can acquire the signed PDF file through the trusted authentication platform.
As shown in fig. 5, the process of accessing the unified electronic seal platform in the enterprise electronic seal management method based on the enterprise chain code is as follows: consulting, docking and communicating with a management department and an operation platform by using a chapter unit to determine the requirements; then, the unit of the seal is required to submit application data to a management department for examination, the management department notifies the unit of the seal after examination is passed, if examination is not passed, the unit of the seal is notified to modify, and if examination is passed, the unit of the seal is notified to an operation platform for business handling; then, carrying out system butt joint by using a seal unit and an operation platform, wherein the operation platform provides technical support to assist in carrying out integrated development and test by using the seal unit; and then the operation platform provides operation guarantee after online operation.
As shown in fig. 6, in the enterprise electronic seal management method based on the enterprise chain code, the electronic seal platform is called in the following manner: the electronic seal platform as the called party registers application and applies for service on the public supporting platform, and the customer service as the calling party registers application and applies for service on the public supporting platform; then the public supporting platform checks the service application of the called party; then, the calling party initiates a request and carries with signature information (using an API gateway signature algorithm), the gateway carries with the signature information (using the API gateway signature algorithm) to a service request, a request header, a called party responds to the request and carries with a signature (using a response header and the API gateway signature algorithm), and the API gateway receives the response and sends the response request to the calling party (using the response header and the API gateway signature algorithm).
The electronic seal module is used for managing the electronic seal and the corresponding signature rule of the transaction in the system by using an enterprise chain code account user generated in the system, and storing the record data in a alliance chain, wherein the stored record data can not be tampered, so that the transparency, the fairness and the impossibility of data are achieved. Before the electronic seal is used, a seal needs to be applied first, the application record of the electronic seal is subjected to chain linking processing, and the chain linking process of the seal application record is as follows:
1. and calling an inquiry seal application record interface of a third-party service platform, inquiring whether the application action is successful, if not, not chaining, and if so, performing chaining operation on the application seal record.
2. And acquiring the serial number of the enterprise chain code account of the current login enterprise. Each account maintains its own serial number, which is incremented from 1, one serial number identifying a transaction for that account. The first step is to obtain the serial number of the enterprise chain code account from the federation chain.
3. And assembling, storing and storing certificate information. This step will use the partner account address to define both a key and value for the credentialing operation. And the certificate storage Key is convenient for retrieving certificate storage information, and the value stores the certificate storage content, wherein the Key is composed of the current time, month and day and enterprise ids of the first party and the second party. Value is a data item of the space asset and is also a data item that needs to be linked up.
4. The transactions are serialized for network transmission. The content required to be serialized in the step comprises deposit certificate transaction, the value obtained by adding 1 to the serialization acquired in the step 1, the unit price of the transaction fee, and the transaction fee. It should be noted that: the more the transaction fee of the transaction is, the more the content of the certificate is stored, and the more the fee is spent. After the serialized deposit transaction, a transactionBlob is obtained.
5. And (4) signing the transaction. After the transaction is serialized, the transaction initiator needs to perform identity authentication on the transaction data (the data is signed by a private key, namely, the transactionBlob in step 4 is signed by the private key), which is generally called the signature of the data. The signature result includes signature data and a public key.
6. And submitting the transaction. After the transaction data is signed, the transaction metadata (transactionBlob) and the signature (signatures) need to be submitted (transaction broadcast) to the blockchain network.
7. And updating the data after successful uplink into the BCS system.
The electronic seal can select the required seal of signing and sealing in the service, can call the data that selected seal need signed and seal when signing and sealing, when signing and sealing the action and accomplish, can be with data and the record chain of signing and sealing after signing and sealing, the record chain process of signing and sealing is as follows:
1. calling a query signature record interface of a third-party service platform to query whether the signature action is completed or not, if not, not chaining, and if so, performing chaining operation on the signature record
2. And acquiring the serial number of the enterprise chain code account of the current login enterprise. Each account maintains its own serial number, which is incremented from 1, one serial number identifying a transaction for that account. The first step is to obtain the serial number of the enterprise chain code account from the federation chain.
3. And assembling, storing and storing certificate information. This step will use the partner account address to define both a key and value for the credentialing operation. And the certificate storage Key is convenient for retrieving certificate storage information, and the value stores the certificate storage content, wherein the Key is composed of the current time, month and day and enterprise ids of the first party and the second party. Value is a data item of the space asset and is also a data item that needs to be linked up.
4. The transactions are serialized for network transmission. The content required to be serialized in the step comprises deposit certificate transaction, the value obtained by adding 1 to the serialization acquired in the step 1, the unit price of the transaction fee, and the transaction fee. It should be noted that: the more the transaction fee of the transaction is, the more the content of the certificate is stored, and the more the fee is spent. After the serialized deposit transaction, a transactionBlob is obtained.
5. And (4) signing the transaction. After the transaction is serialized, the transaction initiator needs to perform identity authentication on the transaction data (the data is signed by a private key, namely, the transactionBlob in step 4 is signed by the private key), which is generally called the signature of the data. The signature result includes signature data and a public key.
6. And submitting the transaction. After the transaction data is signed, the transaction metadata (transactionBlob) and the signature (signatures) need to be submitted (transaction broadcast) to the blockchain network.
7. And updating the data after successful uplink into the BCS system.
So far, the signature and certificate transaction is successful.
The transaction flow of deposit certificate is shown in fig. 7.
After the transaction is verified, the data record is stored in the alliance chain to be verified, so that the undeniability of the electronic signature record is verified conveniently.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.
Claims (8)
1. An enterprise electronic seal management method based on enterprise chain codes is characterized by comprising the following steps:
for a given generated enterprise chain code account user, the enterprise chain code account is subjected to an available electronic seal of enterprise legal identity authentication, electronic signature operation is carried out on an electronic information file needing to be stamped, and the electronic seal of the transaction and a corresponding signature rule are stored on a alliance chain as recording data; meanwhile, before the electronic seal is used, the seal needs to be applied first, and chain linking processing is carried out on the application record of the electronic seal.
2. The enterprise electronic seal management method based on the enterprise chain code according to claim 1, wherein the uplink processing is performed on the application record of the electronic seal, and the specific process is as follows:
(1) calling a seal application record inquiry interface of a third-party service platform to inquire whether the application action is successful: if not, not linking the chain, if successful, carrying out chain linking operation on the application seal record;
(2) acquiring a serial number of an enterprise chain code account of a currently logged-in enterprise; each account maintains its own serial number, which increases from 1 in turn, one serial number marking a transaction for that account;
(3) assembling storage certificate information operation: this step will use the account address of the partner to define a key and value at the same time to save the evidence; the certificate storage Key is convenient for retrieving certificate storage information, and value stores certificate storage contents, wherein the Key is composed of the current time, month and day and enterprise ids of the first party and the second party; value is a data item of the space asset and is also a data item needing to be linked up;
(4) serializing transactions for network transmission: the contents to be serialized in the step comprise deposit certificate transaction, the value of the obtained serial number increased by 1, the unit price of the transaction fee and the transaction fee; the more the transaction fee of the transaction is, the more the content of the certificate is stored, the more the cost is spent; obtaining a transactioniBlob after serialization certificate-deposit transaction;
(5) signature transaction: after the transaction is serialized, the transaction initiator needs to perform identity authentication on transaction data, signs the data by using a private key, namely signs the transactioniBlob generated in the step (4) by using the private key, and the signature is called as the signature of the data; the signature result comprises signature data and a public key;
(6) submitting a transaction: after the transaction data is signed, the transaction metadata and the signature need to be submitted to a block chain network;
(7) and updating the data after successful uplink.
3. The enterprise electronic seal management method based on enterprise chain codes according to claim 1, wherein the electronic seal selects a seal required by signature in service, the selected seal is called to seal data required to be signed when the signature is signed, when the signature action is completed, the signed data and the signature record are linked up, and the link-up process of the signature record is as follows:
(1) calling a query signature record interface of a third-party service platform to query whether the signature action is completed or not: if not, not linking the chain, if the completion, performing the chain linking operation on the signature record;
(2) acquiring a serial number of an enterprise chain code account of a currently logged-in enterprise; each account maintains its own serial number, which increases from 1 in turn, one serial number marking a transaction for that account;
(3) assembling storage certificate information; this step will use the account address of the partner to define a key and value at the same time to save the evidence; the certificate storage Key is convenient for retrieving certificate storage information, and value stores certificate storage contents, wherein the Key is composed of the current time, month and day and enterprise ids of the first party and the second party; value is a data item of the space asset and is also a data item needing to be linked up;
(4) serializing the transaction for network transmission; the contents to be serialized in the step comprise deposit certificate transaction, the value of the obtained serial number increased by 1, the unit price of the transaction fee and the transaction fee; the more the transaction fee of the transaction is, the more the content of the certificate is stored, the more the cost is spent; obtaining a transactioniBlob after serialization certificate-deposit transaction;
(5) signature transaction: after the transaction is serialized, the transaction initiator needs to perform identity authentication on transaction data, signs the data by using a private key, namely signs the transactioniBlob in the step (4) by using the private key, which is called as the signature of the data; the signature result comprises signature data and a public key;
(6) submitting a transaction: after the transaction data is signed, the transaction metadata and the signature need to be submitted to a block chain network;
(7) updating the data after successful uplink; so far, the signature and certificate transaction is successful.
4. The enterprise electronic seal management method based on enterprise chain codes according to claim 1, characterized in that the process of applying for the electronic seal is as follows: the application system sends an application request to the credible authentication platform, the credible authentication platform acquires the seal information from the government block chain, the serial number of the applied service is returned to the application system, the government block chain inquires the service data of the applied seal according to the serial number, and the credible service provider makes a seal and completes an intelligent contract to store the seal information on the government block chain; after the application system sends a request for inquiring the application condition to the trusted authentication platform, the trusted authentication platform acquires the seal information from the administration block chain and returns the application condition to the citation system, and the user can obtain the seal.
5. The enterprise electronic seal management method based on enterprise chain codes according to claim 1, characterized in that the process of applying for electronic signature is as follows: the application system sends a request for applying electronic signature transaction to the trusted authentication platform, and the trusted authentication platform uploads the request to a government affair block chain and returns a transaction serial number to the citation system; after the user confirms or authorizes the transaction after passing identity authentication, the trusted authentication platform can upload the updated transaction intention information to the government affair block chain and return a confirmation or authorization result to the user, and then the trusted service provider obtains a confirmed or authorized transaction record in the government affair block chain; the trusted service provider signs the transaction records, submits the signature information to the government affair block chain, and the trusted authentication platform acquires the transaction results on the government affair block chain, combines the transaction results and signs the transaction results into a PDF file; the application system can inquire the transaction result, and the credible authentication platform acquires the transaction result on the government affair block chain and returns the transaction result to the application system; and finally, the application system can acquire the signed PDF file through the trusted authentication platform.
6. The enterprise electronic seal management method based on enterprise chain codes according to claim 1, characterized in that the process of accessing the unified electronic seal platform is as follows: consulting, docking and communicating with a management department and an operation platform by using a chapter unit to determine the requirements; then, the unit of the seal is required to submit application data to a management department for examination, the management department notifies the unit of the seal after examination is passed, if examination is not passed, the unit of the seal is notified to modify, and if examination is passed, the unit of the seal is notified to an operation platform for business handling; then, carrying out system butt joint by using a seal unit and an operation platform, wherein the operation platform provides technical support to assist in carrying out integrated development and test by using the seal unit; and then the operation platform provides operation guarantee after online operation.
7. The enterprise electronic seal management method based on the enterprise chain code according to claim 1, wherein the electronic seal platform is called in a manner of: the electronic seal platform as the called party registers application and applies for service on the public supporting platform, and the customer service as the calling party registers application and applies for service on the public supporting platform; then the public supporting platform checks the service application of the called party; then the calling party initiates a request to the public supporting platform and carries the signature information, the gateway requests the service request and carries the signature information, the called party responds the request and carries the signature, and the API gateway receives the response and sends the response request to the calling party.
8. An enterprise electronic seal management system based on enterprise chain code for implementing the enterprise chain code based enterprise electronic seal management method according to any one of claims 1 to 7, characterized in that: the system comprises a legal person verification login module and an enterprise electronic seal management module; wherein,
the legal person verification login module is used for verifying login of a user of the enterprise chain code account which is generated in a set mode after the user of the enterprise chain code account is authenticated by face recognition real name;
the enterprise electronic seal management module is used for acquiring enterprise information after legal persons verify and log in, carrying out electronic signature operation on an electronic information file to be stamped according to an available electronic seal of the current enterprise, and storing a transacted electronic seal and a corresponding signature rule as recording data on a alliance chain; meanwhile, before the electronic seal is used, the seal needs to be applied first, and chain linking processing is carried out on the application record of the electronic seal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110313448.9A CN113127822A (en) | 2021-03-24 | 2021-03-24 | Enterprise electronic seal management method and system based on enterprise chain code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110313448.9A CN113127822A (en) | 2021-03-24 | 2021-03-24 | Enterprise electronic seal management method and system based on enterprise chain code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113127822A true CN113127822A (en) | 2021-07-16 |
Family
ID=76774032
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110313448.9A Pending CN113127822A (en) | 2021-03-24 | 2021-03-24 | Enterprise electronic seal management method and system based on enterprise chain code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113127822A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978528A (en) * | 2022-04-29 | 2022-08-30 | 琢创网络科技(上海)有限公司 | High-reliability mechanism intelligent mobile digital signature method and system |
CN116187955A (en) * | 2023-04-19 | 2023-05-30 | 南方电网调峰调频发电有限公司 | Electronic signature method and system based on electronic name authentication |
CN116226096A (en) * | 2023-05-09 | 2023-06-06 | 北京惠朗时代科技有限公司 | Electronic signature data maintenance management system based on data processing |
CN117196621A (en) * | 2023-08-23 | 2023-12-08 | 大唐微电子技术有限公司 | Digital currency payment evidence-accessing system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070181736A1 (en) * | 2000-05-01 | 2007-08-09 | Shaikh Mohammed N S | Method and apparatus for remote filing and recordation of documents |
CN110287732A (en) * | 2019-05-15 | 2019-09-27 | 杭州趣链科技有限公司 | One kind depositing card method based on block chain electronic contract |
-
2021
- 2021-03-24 CN CN202110313448.9A patent/CN113127822A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070181736A1 (en) * | 2000-05-01 | 2007-08-09 | Shaikh Mohammed N S | Method and apparatus for remote filing and recordation of documents |
CN110287732A (en) * | 2019-05-15 | 2019-09-27 | 杭州趣链科技有限公司 | One kind depositing card method based on block chain electronic contract |
Non-Patent Citations (1)
Title |
---|
李强等: "一种基于区块链的电子签章验证平台设计", 《信息安全研究》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978528A (en) * | 2022-04-29 | 2022-08-30 | 琢创网络科技(上海)有限公司 | High-reliability mechanism intelligent mobile digital signature method and system |
CN114978528B (en) * | 2022-04-29 | 2023-12-22 | 上海印洽数字技术有限公司 | High-reliability mechanism intelligent mobile digital signature method and system |
CN116187955A (en) * | 2023-04-19 | 2023-05-30 | 南方电网调峰调频发电有限公司 | Electronic signature method and system based on electronic name authentication |
CN116187955B (en) * | 2023-04-19 | 2023-09-15 | 南方电网调峰调频发电有限公司工程建设管理分公司 | Electronic signature method and system based on electronic name authentication |
CN116226096A (en) * | 2023-05-09 | 2023-06-06 | 北京惠朗时代科技有限公司 | Electronic signature data maintenance management system based on data processing |
CN117196621A (en) * | 2023-08-23 | 2023-12-08 | 大唐微电子技术有限公司 | Digital currency payment evidence-accessing system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240169457A1 (en) | Systems and methods for executing and delivering electronic documents | |
US9886684B2 (en) | File vault and cloud based document notary service | |
WO2020108046A1 (en) | Cross-block chain interaction method and system, computer device, and storage medium | |
JP5154636B2 (en) | System and method for electronic transmission, storage and retrieval of authenticated electronic original documents | |
EP1393144B9 (en) | Web-based method and system for applying a legally enforceable signature on an electronic document | |
KR102137115B1 (en) | System and method for certificate easily submission service support | |
CN113127822A (en) | Enterprise electronic seal management method and system based on enterprise chain code | |
US20090271321A1 (en) | Method and system for verification of personal information | |
US20130318619A1 (en) | Encapsulated security tokens for electronic transactions | |
CN111415233B (en) | Bank electronic certificate inquiry function generation method based on blockchain multiparty authorization | |
CN101022339A (en) | Electronic sign stamp identifying method combined with digital centifi cate and stamp | |
US11663595B1 (en) | Blockchain transactional identity verification | |
JP6042766B2 (en) | Electronic trading system, electronic trading method, and program | |
KR20190107601A (en) | Method and system for the generation of user-initiated federated identities | |
CN110674531B (en) | Residential information management method, device, server and medium based on block chain | |
KR102131206B1 (en) | Method, service server and authentication server for providing corporate-related services, supporting the same | |
KR102166690B1 (en) | Management server and method of digital signature for electronic document | |
CN114303129A (en) | Document authentication method and system | |
Do et al. | B4E: A System for Creating and Validating Digital Credentials using Remote Signing and Blockchain | |
CN114565485A (en) | Labor contract management method and system based on block chain ipfs storage | |
Dijkhuis et al. | When Willeke can get rid of paperwork: a lean infrastructure for qualified information exchange based on trusted identities | |
JP2003108708A (en) | Security application framework and electronic application system, device, method, and program using security application framework | |
AU2020202543A1 (en) | Unauthenticated access to artifacts in commerce networks | |
KR20090003449A (en) | System for insurance contract using authorized electronic document by electric signature and public electric documents depository | |
CN114444103A (en) | Data credible sharing method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210716 |