CN113961905B - Storage method of on-line agreement signing data - Google Patents
Storage method of on-line agreement signing data Download PDFInfo
- Publication number
- CN113961905B CN113961905B CN202111557832.XA CN202111557832A CN113961905B CN 113961905 B CN113961905 B CN 113961905B CN 202111557832 A CN202111557832 A CN 202111557832A CN 113961905 B CN113961905 B CN 113961905B
- Authority
- CN
- China
- Prior art keywords
- image
- data
- character string
- pixel
- signing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 claims description 9
- 238000004422 calculation algorithm Methods 0.000 claims description 6
- 230000011218 segmentation Effects 0.000 claims description 5
- 239000011159 matrix material Substances 0.000 claims description 3
- 230000001815 facial effect Effects 0.000 claims 1
- 238000004364 calculation method Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformations in the plane of the image
- G06T3/40—Scaling of whole images or parts thereof, e.g. expanding or contracting
- G06T3/4038—Image mosaicing, e.g. composing plane images from plane sub-images
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a storage method of on-line protocol signing data, which comprises the following steps: collecting an electronic protocol data set X; converting each character string type element in the data set X to generate a character string pixel map; splicing the generated character string pixel image and the image type elements in the data set X to form a final data image, and storing the final data image in a file system; and calculating a hash value of the final data graph, and storing the hash value in the block chain network. The invention saves the information as the image instead of directly storing the image in the database, thereby reducing the performance pressure of the database and being capable of storing more information; the signed data is stored as an image, and the data cannot be seen without a special tool; the data signature is stored in the block chain network, and the signature of the signed data can be calculated and compared with the signature of the block chain certificate if necessary, so that the authenticity of the original data is judged, the signed data is prevented from being falsified, and the integrity and the safety of the data are improved.
Description
Technical Field
The invention relates to the field of data storage, in particular to a storage method of online protocol signing data.
Background
With the popularization of the e-commerce platform, more and more users use the e-commerce platform. According to the requirements of national laws and regulations, the e-commerce platform can pop up an electronic agreement for a user to sign in some cases. The user completes the signing of the electronic agreement by selecting the agreement selection box on the interface and clicking the submission button, and the system stores the signing situation. The scene is mainly characterized in that: the number of users who sign is large; each user only needs to sign each agreement once; there is less chance that the user signing data really needs to be verified.
The current mainstream signing method is mainly to prompt the protocol content of the user through an interface, submit the selection information of the user to a background server, and finally store the selection information in a back-end database or other permanent storage equipment of the platform so as to serve as evidence informed and agreed by the user when in later time. However, the way of storing the database information by the platform has several problems, one is that the stored data information is few, and generally only has basic information such as a mobile phone number, a signature mark, a timestamp and the like of a user; secondly, the information is mainly stored in a database, and the performance of the database is reduced due to excessive information of each user; and thirdly, information is easy to be tampered or leaked, and a person with database authority can see or modify the data content. Particularly, when the platform and the user have disputes, the platform is difficult to prove whether the database data stored by the platform is the submitted data of the user at that time, and the platform is difficult to self-prove and clear.
Therefore, the invention provides an online protocol signing data storage mode based on the image technology and the block chain technology, which ensures the security of data, cannot be tampered, does not influence the performance of a database and a block chain system, and can be accessed and stored quickly.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a storage method of online agreement signing data.
The purpose of the invention is realized by the following technical scheme:
a method of storing online agreement signing data, comprising the steps of:
step 1: collecting an electronic protocol data set X, wherein the set X comprises a character string type element and an image type element;
step 2: converting each character string type element in the data set X to generate a character string pixel map;
and step 3: splicing the generated character string pixel image and the image type elements in the data set X to form a final data image, and storing the final data image in a file system;
and 4, step 4: and calculating a hash value of the final data graph, and storing the hash value in the block chain network.
Further, the step 1 comprises the following substeps:
step 101: the front-end program acquires the electronic protocol from the protocol server and displays the protocol for a user to read;
step 102: the front-end program records basic behavior information of a user, including protocol reading starting time, protocol reading ending time, signing marks, longitude and latitude information and identity authentication information;
step 103: when a user clicks and submits, the front-end program collects user signing data to form a data set, and after the user signing data are encrypted, the data are uploaded to an application server;
step 104: the application server receives the encrypted data sent by the front-end program, decrypts the data and acquires user signed data;
step 105: the application server carries out validity check on the user signed data to form compliance check data;
step 106: the application server returns a signing success message to the front-end program; and simultaneously, the application server sends the verified compliance verification data to the protocol server, and the protocol server puts the verified data into a character string processing queue of the system to wait for subsequent processing.
Further, the user signing data comprises a mobile phone number, signing time, an IMEI number of the mobile phone, a mobile phone model, longitude and latitude during signing, an agreement mark, a handwritten signature image, an identity card and a face image.
Further, the step 2 comprises the following sub-steps:
step 201: starting a character string processing module on the protocol server, wherein the character string processing module reads compliance verification data to be processed from a character string processing queue;
step 202: for each element of the character string type in the data set X, respectively calculating the BASE58 encoding of the character string represented by each character string element to form a BASE58 encoding character string; then all BASE58 code character strings form a new set Y; each element of the set Y corresponds to a character string of one element in the set X after being encoded by BASE 58;
step 203: calculating the ASCII value of each element in the set Y, and expressing the ASCII value in a 10-ary system; the ASCII values of all elements in Y form a final ASCII value set Z;
step 204: each element of the set Z comprises a group of ASCII codes, each ASCII code in the elements is regarded as an image pixel, and the ASCII code is used as gray scale to generate a character string pixel image; each element in the set Z contains different ASCII codes, and the number of correspondingly generated pixel points is different; for the generated graph, the width is set as w pixels, and the length is increased according to actual data, specifically: the pixel sequence starts from the first row of the image, the pixels of the image are sequentially filled according to the sequence of the elements in the set Z and the sequence of the ASCII code of each element from left to right, each pixel corresponds to each ASCII code of the elements in the set Z, when the width w of each pixel is reached, the pixel is switched to the beginning of the next row, and each element is divided by a pixel with the gray value of 0;
step 205: storing the character string pixel map generated in step 204 in a file system, and generating a corresponding character string pixel map each time each user signs an agreement;
step 206: the character string processing module sends a notification message to the image processing module, which indicates that a new character string pixel image is generated and needs to be processed by the image processing module.
Further, the step 3 comprises the following substeps:
step 301: judging whether an image type element exists in the data set X, if so, cutting the image in the data set X to ensure that pixels with the gray value of 0 do not exist at the edge of the image, namely, the gray values of the first row, the last row, the first column and the last column of the pixel matrix of the image are not 0;
step 302: scaling the cut image to form an image with the length and width of w x w pixels;
step 303: repeating the step 301 and the step 302, cropping and scaling all the images in the data set X, splicing the cropped images from top to bottom according to the sequence of the elements in the set X, and forming a spliced image by using 1 line of pixels with the gray value of all 0 as segmentation between the two images, i.e. splicing all the image type elements in the data set X into an image with the width of w pixels and the length of (w +1) × n, wherein n is the number of the image type elements in X, and w +1 represents the sum of the height w of a single image and 1 line of the segmented pixels with the gray value of 0;
step 304: reading a character string pixel image from a file system by an image processing module;
step 305: splicing the read character string pixel image with the spliced image generated in the step 303; the image takes 1 line of pixels with all gray values of 0 as segmentation, and the images are spliced together to form a signature data graph;
step 306: processing the signed data graph through an image encryption algorithm to form a final data graph;
step 307: the image processing module saves the generated final data image to the file system, and then deletes the spliced image in step 303, the signed data image in step 305 and the character string pixel image generated in step 2 respectively.
Further, the step 4 comprises the following sub-steps:
step 401: the image processing module calculates the Hash value of the picture by utilizing a Hash algorithm on the final data picture generated in the step 3
Step 402: saving the Hash value corresponding to each graph to the block chain network;
step 403: and finally, writing the signing mark and the Hash value data of the user into a database for subsequent business service inquiry.
The invention has the beneficial effects that:
1. storing the information as an image, rather than into a database, reduces the performance pressure on the database, while also storing more information.
2. The main processing logic is separated from the service logic, asynchronous execution and off-line calculation can be realized, the coupling degree of the service system is reduced, and the throughput of the service system is not influenced.
3. The signed data is stored as an image, and the data cannot be seen without a special tool. Data leakage is reduced, and data security is improved.
4. Due to the characteristics of the Hash value, the Hash value can be changed a little bit of data, and the image data is prevented from being modified and forged.
5. The Hash value of the image is stored in a block chain system, so that the Hash value is guaranteed to be not falsified. And the subsequent certification can prove the authenticity of the signature only by checking whether the Hash value on the block chain is consistent with the Hash value of the signature data image stored by the system. The speed is simple and fast.
6. The blockchain system only needs to store the Hash value, so that the performance influence on the blockchain system is reduced.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In this embodiment, as shown in fig. 1, a method for storing online agreement signing data includes the following steps:
step 1: collecting an electronic protocol data set X, wherein the set X comprises a character string type element and an image type element;
wherein, step 1 specifically includes: step 101: the front-end program acquires the electronic protocol from the protocol server and displays the protocol for the user to read.
Step 102: the front-end program records basic behavior information of the user, including protocol reading starting time, reading ending time, signing marks, longitude and latitude information and identity authentication information, and can also collect user identity card information or other necessary information such as human faces and the like according to business needs.
Step 103: when a user clicks and submits, the front-end program collects user signing data to form a data set, and after the user signing data are encrypted, the data are uploaded to an application server; the user signing data collected by the front-end program comprises: the method comprises the steps of mobile phone number, signing time, mobile phone IMEI number, mobile phone model, longitude and latitude during signing, agreement mark, handwritten signature image, identity card and face image to form a data set X, wherein the types of elements in the set can be character strings or images, and n pieces of information are counted. The specific information quantity n collected by the front-end program can be determined according to actual needs.
Step 104: and the application server receives the encrypted data sent by the front-end program, decrypts the data and acquires the user signed data.
Step 105: the application server carries out validity check on the user signed data to form compliance check data; the checking work comprises the following steps: whether the time format is correct; whether the reading ending time is before the starting time or not, if the identity card information is uploaded, whether a third-party system needs to be called to carry out identity card information verification, longitude and latitude validity verification, mobile phone IMEI number checking and other verification operations or not is judged, and it is ensured that all data are legal and valid.
Step 106: the application server returns a signing success message to the front-end program; and simultaneously, the application server sends the verified compliance verification data to the protocol server, and the protocol server puts the verified data into a character string processing queue of the system to wait for subsequent processing.
Step 2: and converting each character string type element in the data set X to generate a character string pixel map.
Wherein, the step 2 specifically comprises the following steps:
step 201: starting a character string processing module on the protocol server, wherein the character string processing module reads compliance verification data to be processed from a character string processing queue;
step 202: for the elements of the m (m ≦ n) string type in the data set X, BASE58 encoding of the string represented by each string element is calculated, and the result is a new string, referred to herein as a BASE58 encoded string. Calculating BASE58 code strings of all the string elements in X, wherein the BASE58 code strings form a new set Y; each element of the set Y corresponds to a character string of one element in the set X after being encoded by BASE 58;
step 203: calculating the ASCII value of each element in the set Y, and expressing the ASCII value in a 10-ary system; the ASCII values of all elements in Y form a final ASCII value set Z;
step 204: each element of the set Z comprises a group of ASCII codes, each ASCII code in the elements is regarded as an image pixel, and the ASCII code is used as gray scale to generate a character string pixel image; each element in the set Z contains different ASCII codes, and the number of correspondingly generated pixel points is different; for the generated graph, the width is set as w pixels, and the length is increased according to actual data, specifically: the pixel sequence starts from the first row of the image, the pixels of the image are sequentially filled according to the sequence of the elements in the set Z and the sequence of the ASCII code of each element from left to right, each pixel corresponds to each ASCII code of the elements in the set Z, when the width w of each pixel is reached, the pixel is switched to the beginning of the next row, and each element is divided by a pixel with the gray value of 0;
for example; the set Z is { a, B, C }, where a = {1,2,3}, B = {4,5,6}, and C = {7,8,9}, assuming that the image width w =5, the generated image pixels are: a first row (1, 2,3,0, 4), a second row (5, 6,0,7, 8), a third row (9, 0,0,0, 0).
Step 205: storing the character string pixel image generated in the step 4 in a file system, and generating a corresponding character string pixel image by each user each time each user performs agreement signing;
step 206: the character string processing module sends a notification message to the image processing module, which indicates that a new character string pixel image is generated and needs to be processed by the image processing module.
And step 3: and splicing the generated character string pixel image and the image type elements in the data set X to form a final data image, and storing the final data image in a file system.
Wherein, the step 3 is specifically as follows:
step 301: reading a character string pixel image from a file system by an image processing module;
step 302: cutting each image in the data set X to ensure that pixels with the gray values of all 0 do not exist at the edge of the image, namely the gray values of the first row, the last row, the first column or the last column of the pixel matrix of the image are not all 0;
step 303: scaling the cut image to form an image with the length and width of w x w pixels;
step 304: splicing the read character string pixel graph with the image with the size of w x w pixels in the step 303; the image takes k (k > 1) lines of pixels with all gray values of 0 as segmentation to form a spliced image;
step 305: repeating steps 2 to 4 for all image components in the data set X to form a signed data map of a certain user.
Step 306: and processing the signed data graph through an image encryption algorithm to form a final data graph.
Step 307: and the image processing module saves the generated final data image to a file system and deletes the character string pixel image generated in the step 2.
And 4, step 4: and calculating a hash value of the final data graph, and storing the hash value in the block chain network.
Wherein, the step 4 is specifically as follows:
step 401: the image processing module calculates the Hash value of the picture by utilizing a Hash algorithm on the final data picture generated in the step 3
Step 402: saving the Hash value corresponding to each graph to the block chain network;
step 403: and finally, writing the signing mark and the Hash value data of the user into a database for subsequent business service inquiry.
The invention reduces the performance pressure of the database by storing the information as images instead of storing the information in the database, and simultaneously can store more information. The main processing logic is separated from the service logic, asynchronous execution and off-line calculation can be realized, the coupling degree of the service system is reduced, and the throughput of the service system is not influenced. The signed data is stored as an image, and the data cannot be seen without a special tool. Data leakage is reduced, and data security is improved. Due to the characteristics of the Hash value, the Hash value can be changed a little bit of data, and the image data is prevented from being modified and forged. The Hash value of the image is stored in a block chain system, so that the Hash value is guaranteed to be not falsified. And the subsequent certification can prove the authenticity of the signature only by checking whether the Hash value on the block chain is consistent with the Hash value of the signature data image stored by the system. The speed is simple and fast. The blockchain system only needs to store the Hash value, so that the performance influence on the blockchain system is reduced.
It should be noted that, for simplicity of description, the above-mentioned embodiments of the method are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the order of acts described, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and elements referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a ROM, a RAM, etc.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.
Claims (5)
1. A storage method of online agreement signing data is characterized by comprising the following steps:
step 1: collecting an electronic protocol data set X, wherein the set X comprises a character string type element and an image type element;
step 2: converting each character string type element in the data set X to generate a character string pixel map;
the step 2 comprises the following substeps:
step 201: starting a character string processing module on the protocol server, wherein the character string processing module reads compliance verification data to be processed from a character string processing queue;
step 202: for each element of the character string type in the data set X, respectively calculating the BASE58 encoding of the character string represented by each character string element to form a BASE58 encoding character string; then all BASE58 code character strings form a new set Y; each element of the set Y corresponds to a character string of one element in the set X after being encoded by BASE 58;
step 203: calculating the ASCII value of each element in the set Y, and expressing the ASCII value in a 10-ary system; the ASCII values of all elements in Y form a final ASCII value set Z;
step 204: each element of the set Z comprises a group of ASCII codes, each ASCII code in the elements is regarded as an image pixel, and the ASCII code is used as gray scale to generate a character string pixel image; each element in the set Z contains different ASCII codes, and the number of correspondingly generated pixel points is different; for the generated graph, the width is set as w pixels, and the length is increased according to actual data, specifically: the pixel sequence starts from the first row of the image, the pixels of the image are sequentially filled according to the sequence of the elements in the set Z and the sequence of the ASCII code of each element from left to right, each pixel corresponds to each ASCII code of the elements in the set Z, when the width w of each pixel is reached, the pixel is switched to the beginning of the next row, and each element is divided by a pixel with the gray value of 0;
step 205: storing the character string pixel map generated in step 204 in a file system, and generating a corresponding character string pixel map each time each user signs an agreement;
step 206: the character string processing module sends a notification message to the image processing module, which indicates that a new character string pixel image is generated and needs to be processed by the image processing module;
and step 3: splicing the generated character string pixel image and the image type elements in the data set X to form a final data image, and storing the final data image in a file system;
and 4, step 4: and calculating a hash value of the final data graph, and storing the hash value in the block chain network.
2. The method for storing the on-line agreement signing data of claim 1, wherein the step 1 comprises the following sub-steps:
step 101: the front-end program acquires the electronic protocol from the protocol server and displays the protocol for a user to read;
step 102: the front-end program records basic behavior information of a user, including protocol reading starting time, protocol reading ending time, signing marks, longitude and latitude information and identity authentication information;
step 103: when a user clicks and submits, the front-end program collects user signing data to form a data set, and after the user signing data are encrypted, the data are uploaded to an application server;
step 104: the application server receives the encrypted data sent by the front-end program, decrypts the data and acquires user signed data;
step 105: the application server carries out validity check on the user signed data to form compliance check data;
step 106: the application server returns a signing success message to the front-end program; and simultaneously, the application server sends the verified compliance verification data to the protocol server, and the protocol server puts the verified data into a character string processing queue of the system to wait for subsequent processing.
3. The method for storing the on-line protocol signing data as claimed in claim 2, wherein the user signing data comprises a mobile phone number, signing time, mobile phone IMEI number, mobile phone model, longitude and latitude when signing, agreement mark, handwritten signature image, identity card and facial image.
4. The method for storing the on-line agreement signing data of claim 1, wherein the step 3 comprises the following sub-steps:
step 301: judging whether an image type element exists in the data set X, if so, cutting the image in the data set X to ensure that pixels with the gray value of 0 do not exist at the edge of the image, namely, the gray values of the first row, the last row, the first column and the last column of the pixel matrix of the image are not 0;
step 302: scaling the cut image to form an image with the length and width of w x w pixels;
step 303: repeating the step 301 and the step 302, cropping and scaling all the images in the data set X, splicing the cropped images from top to bottom according to the sequence of the elements in the set X, and forming a spliced image by using 1 line of pixels with the gray value of all 0 as segmentation between the two images, i.e. splicing all the image type elements in the data set X into an image with the width of w pixels and the length of (w +1) × n, wherein n is the number of the image type elements in X, and w +1 represents the sum of the height w of a single image and 1 line of the segmented pixels with the gray value of 0;
step 304: reading a character string pixel image from a file system by an image processing module;
step 305: splicing the read character string pixel image with the spliced image generated in the step 303; the image takes 1 line of pixels with all gray values of 0 as segmentation, and the images are spliced together to form a signature data graph;
step 306: processing the signed data graph through an image encryption algorithm to form a final data graph;
step 307: the image processing module saves the generated final data image to the file system, and then deletes the spliced image in step 303, the signed data image in step 305 and the character string pixel image generated in step 2 respectively.
5. The method for storing the on-line agreement signing data of claim 1, wherein the step 4 comprises the following sub-steps:
step 401: the image processing module calculates the Hash value of the image by using a Hash algorithm on the final data image generated in the step 3;
step 402: saving the Hash value corresponding to each graph to the block chain network;
step 403: and finally, writing the signing mark and the Hash value data of the user into a database for subsequent business service inquiry.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111557832.XA CN113961905B (en) | 2021-12-20 | 2021-12-20 | Storage method of on-line agreement signing data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111557832.XA CN113961905B (en) | 2021-12-20 | 2021-12-20 | Storage method of on-line agreement signing data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113961905A CN113961905A (en) | 2022-01-21 |
CN113961905B true CN113961905B (en) | 2022-03-11 |
Family
ID=79473265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111557832.XA Active CN113961905B (en) | 2021-12-20 | 2021-12-20 | Storage method of on-line agreement signing data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113961905B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101689203A (en) * | 2007-06-29 | 2010-03-31 | 佳能株式会社 | Image processing apparatus, image processing method, and computer program |
CN107483181A (en) * | 2017-08-28 | 2017-12-15 | 北京金股链科技有限公司 | Measure of managing contract, device and terminal |
CN109255530A (en) * | 2018-08-28 | 2019-01-22 | 河北七米科技发展有限公司 | A kind of purchase, sales and inventory management system |
CN109361654A (en) * | 2018-09-18 | 2019-02-19 | 深圳崀途科技有限公司 | A kind of method and system for negotiating encryption handling business secret based on block chain |
CN109409876A (en) * | 2018-09-27 | 2019-03-01 | 深圳壹账通智能科技有限公司 | Electronic contract signature method, apparatus, equipment and storage medium based on block chain |
CN110135807A (en) * | 2019-05-14 | 2019-08-16 | 极智(上海)企业管理咨询有限公司 | Electronic contract signs method, system, medium and electronic equipment |
CN110235116A (en) * | 2016-11-08 | 2019-09-13 | 皮尔森教育有限公司 | The cloud management content delivery computer ecosystem of safety |
CN110474773A (en) * | 2018-05-11 | 2019-11-19 | 云想科技股份有限公司 | Electronic Signature generation and verification method and electronic device with digital watermarking |
CN110609846A (en) * | 2019-09-19 | 2019-12-24 | 腾讯科技(深圳)有限公司 | Block chain-based performance insurance processing method and device and computer equipment |
CN110674523A (en) * | 2019-09-30 | 2020-01-10 | 民生科技有限责任公司 | Method for confirming electronic contract signer by combining digital signature with handwritten signature |
CN110688668A (en) * | 2019-09-02 | 2020-01-14 | 平安普惠企业管理有限公司 | Electronic contract storage method and device and electronic equipment |
CN111066019A (en) * | 2019-05-15 | 2020-04-24 | 阿里巴巴集团控股有限公司 | Processing data elements stored in a blockchain network |
CN111353893A (en) * | 2020-04-24 | 2020-06-30 | 支付宝(杭州)信息技术有限公司 | Transaction data processing method and device based on block chain |
CN112231771A (en) * | 2020-12-11 | 2021-01-15 | 浙江数秦科技有限公司 | Block chain-based electronic contract online signing and security method |
CN113553627A (en) * | 2021-09-23 | 2021-10-26 | 四川大学 | Block chain-based data integrity verification method, system, device and medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10810325B2 (en) * | 2017-08-18 | 2020-10-20 | Jpmorgan Chase Bank, N.A. | Method for custody and provenance of digital documentation |
CN112751676B (en) * | 2021-01-14 | 2023-05-05 | 上海特高信息技术有限公司 | Signing and certification method, hash value generation method, certification equipment and storage medium |
-
2021
- 2021-12-20 CN CN202111557832.XA patent/CN113961905B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101689203A (en) * | 2007-06-29 | 2010-03-31 | 佳能株式会社 | Image processing apparatus, image processing method, and computer program |
CN110235116A (en) * | 2016-11-08 | 2019-09-13 | 皮尔森教育有限公司 | The cloud management content delivery computer ecosystem of safety |
CN107483181A (en) * | 2017-08-28 | 2017-12-15 | 北京金股链科技有限公司 | Measure of managing contract, device and terminal |
CN110474773A (en) * | 2018-05-11 | 2019-11-19 | 云想科技股份有限公司 | Electronic Signature generation and verification method and electronic device with digital watermarking |
CN109255530A (en) * | 2018-08-28 | 2019-01-22 | 河北七米科技发展有限公司 | A kind of purchase, sales and inventory management system |
CN109361654A (en) * | 2018-09-18 | 2019-02-19 | 深圳崀途科技有限公司 | A kind of method and system for negotiating encryption handling business secret based on block chain |
CN109409876A (en) * | 2018-09-27 | 2019-03-01 | 深圳壹账通智能科技有限公司 | Electronic contract signature method, apparatus, equipment and storage medium based on block chain |
CN110135807A (en) * | 2019-05-14 | 2019-08-16 | 极智(上海)企业管理咨询有限公司 | Electronic contract signs method, system, medium and electronic equipment |
CN111066019A (en) * | 2019-05-15 | 2020-04-24 | 阿里巴巴集团控股有限公司 | Processing data elements stored in a blockchain network |
CN110688668A (en) * | 2019-09-02 | 2020-01-14 | 平安普惠企业管理有限公司 | Electronic contract storage method and device and electronic equipment |
CN110609846A (en) * | 2019-09-19 | 2019-12-24 | 腾讯科技(深圳)有限公司 | Block chain-based performance insurance processing method and device and computer equipment |
CN110674523A (en) * | 2019-09-30 | 2020-01-10 | 民生科技有限责任公司 | Method for confirming electronic contract signer by combining digital signature with handwritten signature |
CN111353893A (en) * | 2020-04-24 | 2020-06-30 | 支付宝(杭州)信息技术有限公司 | Transaction data processing method and device based on block chain |
CN112231771A (en) * | 2020-12-11 | 2021-01-15 | 浙江数秦科技有限公司 | Block chain-based electronic contract online signing and security method |
CN113553627A (en) * | 2021-09-23 | 2021-10-26 | 四川大学 | Block chain-based data integrity verification method, system, device and medium |
Non-Patent Citations (1)
Title |
---|
基于区块链的公平合同签署协议;刘鲁等;《信息安全学报》;20180531;第3卷(第3期);第1-7页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113961905A (en) | 2022-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888557B (en) | Method and system for generating protocol file | |
CN106548092B (en) | File processing method and device | |
CN103729341A (en) | Method and device for positioning electronic seal and device for obtaining electronic seal | |
CN108009445B (en) | Semi-centralized trusted data management system | |
CN112508145B (en) | Electronic seal generation and verification method and device, electronic equipment and storage medium | |
CN112861109B (en) | Digital identity code generated based on CTID platform and front-end system and interaction method | |
CN113901883A (en) | Seal identification method, system and storage medium based on deep learning | |
CN114998922B (en) | Electronic contract generating method based on format template | |
CN115114598A (en) | Watermark generation method, and method and device for file tracing by using watermark | |
CN117560527B (en) | Digital human AIGC video safety anti-counterfeiting method and device | |
CN113961905B (en) | Storage method of on-line agreement signing data | |
CN115983875B (en) | Environment-friendly rights and interests value data tracing method and tracing device | |
CN112598502A (en) | Evidence obtaining method, device, equipment and storage medium | |
CN113177543B (en) | Certificate identification method, device, equipment and storage medium | |
CN112307518B (en) | Signature information processing method, signature information display method, signature information processing device, signature information display device, electronic equipment and storage medium | |
CN113536782B (en) | Sensitive word recognition method and device, electronic equipment and storage medium | |
CN113032707B (en) | Method and device for generating webpage screenshot and electronic equipment | |
CN115511030A (en) | Anti-counterfeiting verification method and device and electronic equipment | |
CN112132693A (en) | Transaction verification method, transaction verification device, computer equipment and computer-readable storage medium | |
CN118468355B (en) | Method and system for generating electronic seal of enterprise-related service | |
CN112668990B (en) | Electronic contract online signing method based on process deposit certificate | |
CN118364517B (en) | Block chain-based sales contract certification method and system | |
CN116597259B (en) | Site information verification method and device, equipment, medium and product thereof | |
CN112861107B (en) | Application method for storing credible digital identity file in IC card medium | |
KR20010084889A (en) | A credit card service method using code image and apparatus thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |