CN114444129B - Method and system for dynamically controlling electronic seal - Google Patents

Method and system for dynamically controlling electronic seal Download PDF

Info

Publication number
CN114444129B
CN114444129B CN202111627736.8A CN202111627736A CN114444129B CN 114444129 B CN114444129 B CN 114444129B CN 202111627736 A CN202111627736 A CN 202111627736A CN 114444129 B CN114444129 B CN 114444129B
Authority
CN
China
Prior art keywords
electronic seal
request
file
electronic
initiator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111627736.8A
Other languages
Chinese (zh)
Other versions
CN114444129A (en
Inventor
牛攀峰
刘静
赵帅兵
常海兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202111627736.8A priority Critical patent/CN114444129B/en
Publication of CN114444129A publication Critical patent/CN114444129A/en
Application granted granted Critical
Publication of CN114444129B publication Critical patent/CN114444129B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method and a system for dynamically controlling an electronic seal, wherein the method comprises the following steps: acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request initiator, and determining whether a time interval in the request content meets the requirement according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content; when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier of the request initiator and the limited file range in the electronic seal; the electronic seal is assigned to the requesting initiator so that the requesting initiator can use the electronic seal on electronic files belonging to a defined file range before the lifetime of the electronic seal expires.

Description

Method and system for dynamically controlling electronic seal
Technical Field
The invention relates to the technical field of information processing, in particular to a method and a system for dynamically controlling an electronic seal.
Background
The current market economy is credit economy, a market main body needs to establish a contractual relationship to realize off-line or on-line transaction, and the establishment of the contractual relationship firstly needs to establish a credit relationship between contractual parties. The seal is a representation of the credit relationship of the two parties of the guarantee transaction in the contract relationship, and influences the contract relationship to be contracted and executed. Therefore, the seal is not only a symbol in the self identity group of the market subject, but also a token for establishing the credit relationship. If the seal is forged, stolen and priced, the effectiveness of the seal will inevitably destroy the credit relationship between the economic main bodies of the market and disturb the normal order of the market operation.
In order to solve the problems of seal forging, embezzlement and private carving, electronic seals are currently arranged on the market, but most of the current electronic seals provide electronic seal services for application systems such as enterprise internal ERP, financial systems, contracts and the like, and lack of electronic seal mutual recognition mechanisms among enterprises, so that the enterprise electronic seals have serious 'island' phenomenon, and great inconvenience is brought to on-line business handling of enterprises in cross-industry, cross-region and cross-field.
Disclosure of Invention
In summary, in order to fundamentally solve the defects of the current electronic seal, the invention provides an enterprise electronic seal platform oriented to credit economy, which provides electronic seal services capable of mutual identification, anti-counterfeiting, anti-theft and anti-private for market subjects.
The platform uses digital technology with electronic authentication, electronic signature and electronic storage as cores, uses block chain as a bottom layer supporting system, and combines information provided by departments such as market bureau, public security and administrative bureau to treat data together. The platform not only solves the problems of social credibility, legal effectiveness, safety, mutual recognition and the like of the enterprise electronic seal, but also provides the capability of a third party organization for accessing the enterprise electronic seal, expands the application of the platform in the aspect of the electronic seal and realizes the mutual data communication and mutual recognition added into the platform organization.
The enterprise electronic seal platform comprises enterprise electronic seal management, enterprise electronic certificate storage management, enterprise electronic seal verification management, enterprise electronic seal application, an open platform based on Internet +, a trusted electronic authentication service platform, a blockchain service platform and a micro service platform.
According to one aspect of the present invention, there is provided a method of dynamically controlling an electronic seal, the method comprising:
In response to receiving the electronic seal use request, the enterprise server parses the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and request content, the request content including: time interval and file range;
Acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request party, determining whether a file range in the electronic seal dynamic configuration file is consistent with a file range in request content, and determining whether a time interval in the request content meets requirements according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
When the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier of the request initiator and the limited file range in the electronic seal;
The electronic seal is assigned to the requesting initiator so that the requesting initiator can use the electronic seal on electronic files belonging to a defined file range before the lifetime of the electronic seal expires.
Preferably, before the electronic seal dynamic configuration file of the requesting party is obtained according to the user identifier of the requesting party,
The enterprise server authenticates the request originator based on the user identifier of the request originator.
Preferably, the enterprise server performs identity authentication on the request initiator based on the user identifier of the request initiator, including:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
Preferably, the enterprise server performs identity authentication on the request initiator based on the user identifier of the request initiator, including:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
Preferably, the method further comprises the steps of obtaining a seal name of each electronic seal in at least one electronic seal in the electronic seal dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
Preferably, the determining whether the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content includes:
Taking a file range in the dynamic configuration file of the electronic seal as a first file set;
Taking the file range in the request content as a second file set;
When the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content;
when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
Preferably, the determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file includes:
Determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal;
determining a second time length according to the time interval in the request content;
when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement;
and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
Preferably, the electronic seal is automatically de-registered when the lifetime of the electronic seal expires.
Preferably, when the request initiator wishes to use the electronic seal on the specific file, determining whether the specific file belongs to the limited file range according to the limited file range of the electronic seal;
when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file;
When the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file.
Preferably, after the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises:
the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
According to another aspect of the present invention, there is provided a system for dynamically controlling an electronic stamp, the system comprising:
The enterprise server analyzes the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal and request content in response to receiving the electronic seal use request, wherein the request content comprises: time interval and file range;
The determining device is used for acquiring the electronic seal dynamic configuration file of the requesting party according to the user identifier of the requesting party, determining whether the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content, and determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
the setting device is used for generating the electronic seal for the request initiator when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, setting the life time for the electronic seal based on the time interval in the request content and setting the user identifier of the request initiator and the limited file range in the electronic seal;
And the distribution device is used for distributing the electronic seal to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the life time of the electronic seal expires.
Preferably, authentication means are also included for causing
The enterprise server authenticates the request originator based on the user identifier of the request originator.
Preferably, the authentication device is specifically configured to:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
Preferably, the authentication means is particularly for
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
Preferably, the electronic seal verification device is used for obtaining the seal name of each electronic seal in at least one electronic seal in the electronic seal dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
Preferably, the determining device is specifically configured to:
Taking a file range in the dynamic configuration file of the electronic seal as a first file set;
Taking the file range in the request content as a second file set;
When the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content;
when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
Preferably, the determining means is specifically for:
Determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal;
determining a second time length according to the time interval in the request content;
when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement;
and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
Preferably, the electronic seal is automatically de-registered when the lifetime of the electronic seal expires.
Preferably, when the request initiator wishes to use the electronic seal on the specific file, determining whether the specific file belongs to the limited file range according to the limited file range of the electronic seal;
when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file;
When the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file.
Preferably, after the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises:
the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
The technical key points of the invention are as follows: 1. and constructing a trusted electronic authentication platform by using a block chain technology, and realizing a digital certificate mutual authentication mechanism between electronic authentication service institutions. 2. And the intercommunication and mutual recognition of the enterprise electronic seal are realized based on the trusted authentication service platform. 3. The block chain technology is utilized to enable the information of the enterprise electronic seal to be linked and record the use electronic certificate of the enterprise electronic seal every time, so that the artificial data tampering is avoided, and the enterprise electronic seal is safer.
The technical scheme of the invention has the following advantages: 1. the electronic seal platform for enterprises facing credit economy is constructed by departments of united market bureaus, public security and the like, has social credibility and legal effectiveness, and solves the problem of inter-recognition of electronic signature intercommunication across industries and regions. 2. The provided electronic seal service function has the characteristics of history tracing, tamper resistance and the like, and solves the problems of forging, embezzling and prizing of enterprises using traditional entity seals. 3. The third party access capability of the electronic seal service is provided, the mechanism added to the platform can share information with enterprises and mutually recognize services, a good credit economic system is built, and the enterprise Li Guoli is served.
Drawings
Exemplary embodiments of the present invention may be more completely understood in consideration of the following drawings:
FIG. 1 is a flow chart of a method of dynamically controlling an electronic seal according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an implementation structure of an enterprise electronic seal platform application method oriented to credit economy according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a system for dynamically controlling an electronic stamp according to an embodiment of the present invention.
Detailed Description
Fig. 1 is a flowchart of a method of dynamically controlling an electronic stamp according to an embodiment of the present invention. The method 100 comprises the following steps: step 101, in response to receiving an electronic seal use request, the enterprise server parses the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and request content, where the request content includes: time interval and file range.
In one embodiment, before the electronic seal dynamic configuration file of the requesting party is obtained according to the user identifier of the requesting party, the enterprise server performs identity authentication on the requesting party based on the user identifier of the requesting party.
In one embodiment, the enterprise server authenticating the request originator based on the user identifier of the request originator comprises: the enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
In one embodiment, the enterprise server authenticating the request originator based on the user identifier of the request originator comprises: the enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
Step 102, acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request party, determining whether a file range in the electronic seal dynamic configuration file is consistent with a file range in request content, and determining whether a time interval in the request content meets requirements according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content.
In one embodiment, the method further comprises the step of obtaining a stamp name of each electronic stamp in at least one electronic stamp in the electronic stamp dynamic configuration file; determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file; if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
In one embodiment, the determining whether the file range in the electronic seal dynamic configuration file is consistent with the file range in the requested content includes: taking a file range in the dynamic configuration file of the electronic seal as a first file set; taking the file range in the request content as a second file set; when the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content; when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
Step 103, when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier and the limited file range of the request initiator in the electronic seal.
In one embodiment, the determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file includes: determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal; determining a second time length according to the time interval in the request content; when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement; and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
Step 104, the electronic seal is allocated to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the lifetime of the electronic seal expires.
In one embodiment, the electronic stamp automatically de-registers when the lifetime of the electronic stamp expires. In one embodiment, when the request initiator wishes to use the electronic seal on a particular document, determining whether the particular document belongs to a defined document range based on the defined document range of the electronic seal; when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file; when the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file.
In one embodiment, after the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises: the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
Fig. 2 is a schematic diagram of an implementation structure of an enterprise electronic seal platform application method oriented to credit economy according to an embodiment of the present invention. The utility model provides an enterprise electronic seal platform towards credit economy, has realized enterprise electronic seal synchronization, enterprise electronic seal preparation, state release, seal management, document electronic signature, enterprise signature examine, digital certificate discernment and verify, functions such as timestamp service are carried out adaptation and unified encapsulation, provide unified electronic signature service ability to business application, specifically includes:
1. Enterprise electronic seal management
The enterprise electronic seal management module is responsible for accepting related business applications of the enterprise electronic seal and providing generation of the enterprise electronic seal, issuing of the enterprise electronic seal and state management of the enterprise electronic seal.
(1) Generation of enterprise electronic seal
The trusted government digital certificate system and the province public security hall seal record system are established to respectively conduct the declaration and the electronic Zhang Mo acquisition of the enterprise digital certificate, and the generation of the enterprise electronic seal is completed through the binding of the electronic seal module and the digital certificate.
(2) And issuing the enterprise electronic seal.
The life cycle management of the electronic seal is completed, and the electronic seal comprises the functions of issuing, canceling, issuing and managing an abnormal state list.
(3) Enterprise electronic seal status management
And the electronic seal management system is responsible for safely submitting enterprise registration information submitted by an issuing enterprise to a seal issuing module to complete business acceptations such as application, change, cancellation and migration of the electronic seal, and simultaneously synchronizes the information to a public security system to keep consistency with physical seal state management.
2. Electronic certificate management
The electronic evidence-storing platform is constructed based on the blockchain technology, has the characteristics of decentralization, tamper resistance and the like, and provides the services of evidence storing, evidence obtaining, verification, evidence showing and the like of the basis of electronic contracts, government service, electronic accounting files and the like for each enterprise.
3. Electronic seal application
The electronic seal application consists of a mobile terminal applet and a server terminal, and mainly provides enterprise-oriented account and authorization management and daily use of the electronic seal.
The account authorization mainly provides electronic seal account management and use authorization for enterprise users; the use of the seal mainly refers to the use of the electronic seal by means of generating or scanning a two-dimensional code and the like, such as electronic seal, electronic seal verification, electronic seal file reservation and the like related in the online working process.
4. Electronic seal verification
(1) The true validity verification of the electronic seal provides verification of the authenticity of the electronic seal for cross-department application scenes and the like based on the Internet, namely whether the electronic seal is issued by market supervision departments; and verifying the state of the electronic seal, namely whether to cancel or cancel, and putting into an abnormal operation state.
(2) Verification of electronic signature provides verification services for enterprise electronic signature behavior. When the third party system receives the signature data of the enterprise electronic seal, the information such as the electronic seal, the signature data, the signature value and the like is submitted to the electronic seal system to verify the validity and the integrity of the electronic signature.
(3) Electronic seal information verification, namely providing enterprise electronic seal information and authorization relationship checking service, and verifying the authenticity (truly existing and legally continued) of the existence of the enterprise through the enterprise name or the enterprise unified social credit code; and inquiring and returning an authorization relationship between the enterprise and the office through the identity card number of the office, namely whether the office is a legal authorized representative authorized by the enterprise.
5. Open platform technology based on Internet +'
The open platform technology is to provide public services, components and models, and by opening the standard SDK and standard API of the open platform technology, a third party application developer can generate new applications by using and assembling interfaces of the third party application developer and other third party service interfaces, and simultaneously the applications can uniformly run on the platform, thereby providing more applications for enterprises and creating a digital and platform economic system.
6. Trusted electronic authentication service platform
And binding the enterprise electronic business license, the enterprise legal person, the enterprise sponsor and the electronic authentication service organization information together by utilizing the blockchain service platform to construct a trusted electronic authentication service platform, and providing mutually-recognized digital certificate service for the enterprise electronic seal. In addition, besides the mutual authentication mechanism of the digital certificates, which is realized by the electronic authentication service institutions added to the platform, the unique situation of the electronic authentication service institutions is avoided, the monopoly situation of the market is prevented, and the development of the market economy is not facilitated.
7. Block chain service platform
And the service provided by the blockchain service platform provided by the space information institute is utilized to provide applications for the upper layer, including binding and uplink of an electronic authentication service organization and enterprise information, uplink of an enterprise electronic seal, uplink of an enterprise electronic business license, providing information traceability and tamper-proof mechanisms and the like.
8. Micro service platform
The micro-service platform provided by the space information institute is utilized to lay a foundation for upper-layer application construction, including an electronic certification authority verification service, an enterprise electronic seal verification service, an enterprise electronic business license verification service and the like.
Fig. 3 is a schematic structural diagram of a system for dynamically controlling an electronic stamp according to an embodiment of the present invention. The system 300 includes: a parsing means 301, a determining means 302, a setting means 303, a distributing means 304, an authenticating means 305 and a verifying means 306.
The parsing means 301 is configured to parse the electronic seal usage request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and a request content in response to receiving the electronic seal usage request, where the request content includes: time interval and file range;
A determining device 302, configured to obtain an electronic seal dynamic configuration file of the requesting party according to a user identifier of the requesting party, determine whether a file range in the electronic seal dynamic configuration file is consistent with a file range in the requested content, and determine whether a time interval in the requested content meets a requirement according to a time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the requested content;
setting means 303, configured to generate an electronic seal for a request initiator when it is determined that a time interval in a request content meets a requirement according to a time authority in a dynamic configuration file of the electronic seal, set a lifetime for the electronic seal based on the time interval in the request content, and set a user identifier of the request initiator and a limited file range in the electronic seal;
and the allocation means 304 is used for allocating the electronic seal to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the life time of the electronic seal expires.
Authentication means 305 for causing the enterprise server to authenticate the requesting originator based on the user identifier of the requesting originator. The authentication device 305 specifically serves to: the enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
The authentication device 305 is specifically configured to retrieve, by the enterprise server, a content database based on the user identifier of the request initiator, so as to obtain a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
A verification device 306, configured to obtain a stamp name of each electronic stamp in at least one electronic stamp in the electronic stamp dynamic configuration file; determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file; if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
The determining means 302 is specifically configured to: taking a file range in the dynamic configuration file of the electronic seal as a first file set; taking the file range in the request content as a second file set; when the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content; when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
The determining means 302 is specifically configured to: determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal; determining a second time length according to the time interval in the request content; when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement; and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
When the life time of the electronic seal expires, the electronic seal automatically logs off. When a request initiator wishes to use the electronic seal on a specific file, determining whether the specific file belongs to a limited file range according to the limited file range of the electronic seal; when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file; when the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file. After the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises the following steps: the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.

Claims (10)

1. A method of dynamically controlling an electronic seal, the method comprising:
In response to receiving the electronic seal use request, the enterprise server parses the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and request content, the request content including: time interval and file range;
Acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request party, determining whether a file range in the electronic seal dynamic configuration file is consistent with a file range in request content, and determining whether a time interval in the request content meets requirements according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
When the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier of the request initiator and the limited file range in the electronic seal;
The electronic seal is assigned to the requesting initiator so that the requesting initiator can use the electronic seal on electronic files belonging to a defined file range before the lifetime of the electronic seal expires.
2. The method of claim 1, further comprising, prior to obtaining the electronic seal dynamic profile of the requesting party based on the user identifier of the requesting party, the enterprise server authenticating the requesting party based on the user identifier of the requesting party.
3. The method of claim 2, the enterprise server authenticating the request originator based on a user identifier of the request originator comprising:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
4. The method of claim 2, the enterprise server authenticating the request originator based on a user identifier of the request originator comprising:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
5. The method of claim 1, further comprising obtaining a stamp name for each electronic stamp in at least one electronic stamp in the electronic stamp dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
6. A system for dynamically controlling an electronic seal, the system comprising:
The enterprise server analyzes the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal and request content in response to receiving the electronic seal use request, wherein the request content comprises: time interval and file range;
The determining device is used for acquiring the electronic seal dynamic configuration file of the requesting party according to the user identifier of the requesting party, determining whether the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content, and determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
the setting device is used for generating the electronic seal for the request initiator when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, setting the life time for the electronic seal based on the time interval in the request content and setting the user identifier of the request initiator and the limited file range in the electronic seal;
And the distribution device is used for distributing the electronic seal to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the life time of the electronic seal expires.
7. The system of claim 6, further comprising authentication means for causing the
The enterprise server authenticates the request originator based on the user identifier of the request originator.
8. The system of claim 7, the authentication device being specifically configured to:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
9. The system of claim 7, the authentication device being specifically adapted to
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
10. The system of claim 6, further comprising a verification device for obtaining a stamp name for each of at least one electronic stamp in the electronic stamp dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
CN202111627736.8A 2021-12-28 2021-12-28 Method and system for dynamically controlling electronic seal Active CN114444129B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111627736.8A CN114444129B (en) 2021-12-28 2021-12-28 Method and system for dynamically controlling electronic seal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111627736.8A CN114444129B (en) 2021-12-28 2021-12-28 Method and system for dynamically controlling electronic seal

Publications (2)

Publication Number Publication Date
CN114444129A CN114444129A (en) 2022-05-06
CN114444129B true CN114444129B (en) 2024-04-19

Family

ID=81366624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111627736.8A Active CN114444129B (en) 2021-12-28 2021-12-28 Method and system for dynamically controlling electronic seal

Country Status (1)

Country Link
CN (1) CN114444129B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003337875A (en) * 2002-05-20 2003-11-28 Sony Corp System, method of electronic approval and terminal
EP1387551A1 (en) * 2002-07-30 2004-02-04 Security and Standards Limited Electronic sealing for electronic transactions
CN1838163A (en) * 2006-01-17 2006-09-27 沈前卫 Universal electronic stamping system based on PKI
CN101017544A (en) * 2007-02-15 2007-08-15 江苏国盾科技实业有限责任公司 Conflated seal affix authentication method having electronic seal digital certification
CN101329750A (en) * 2008-07-24 2008-12-24 武汉理工大学 Method for generating and verifying anti-false stamp with file content protection function
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
CN109861823A (en) * 2018-12-20 2019-06-07 航天信息股份有限公司 Application method, device, storage medium and the electronic equipment of E-seal
CN109903057A (en) * 2019-02-21 2019-06-18 清华大学 Contract conclusion method and apparatus
CN111143807A (en) * 2019-12-13 2020-05-12 航天信息股份有限公司 Method and system for generating electronic seal
CN111581653A (en) * 2020-04-30 2020-08-25 平安科技(深圳)有限公司 Contract document signing method, device, equipment and computer readable storage medium
CN112597455A (en) * 2020-12-29 2021-04-02 中国农业银行股份有限公司 Document anti-counterfeiting method and device
CN112907225A (en) * 2021-03-26 2021-06-04 中国建设银行股份有限公司 Entity seal management control method, device, equipment and storage medium
CN113619299A (en) * 2021-07-06 2021-11-09 珠海思格特智能系统有限公司 Seal equipment intelligent control method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980605B (en) * 2017-02-17 2018-01-19 平安科技(深圳)有限公司 contract generation method and device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003337875A (en) * 2002-05-20 2003-11-28 Sony Corp System, method of electronic approval and terminal
EP1387551A1 (en) * 2002-07-30 2004-02-04 Security and Standards Limited Electronic sealing for electronic transactions
CN1838163A (en) * 2006-01-17 2006-09-27 沈前卫 Universal electronic stamping system based on PKI
CN101017544A (en) * 2007-02-15 2007-08-15 江苏国盾科技实业有限责任公司 Conflated seal affix authentication method having electronic seal digital certification
CN101329750A (en) * 2008-07-24 2008-12-24 武汉理工大学 Method for generating and verifying anti-false stamp with file content protection function
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
CN109861823A (en) * 2018-12-20 2019-06-07 航天信息股份有限公司 Application method, device, storage medium and the electronic equipment of E-seal
CN109903057A (en) * 2019-02-21 2019-06-18 清华大学 Contract conclusion method and apparatus
CN111143807A (en) * 2019-12-13 2020-05-12 航天信息股份有限公司 Method and system for generating electronic seal
CN111581653A (en) * 2020-04-30 2020-08-25 平安科技(深圳)有限公司 Contract document signing method, device, equipment and computer readable storage medium
CN112597455A (en) * 2020-12-29 2021-04-02 中国农业银行股份有限公司 Document anti-counterfeiting method and device
CN112907225A (en) * 2021-03-26 2021-06-04 中国建设银行股份有限公司 Entity seal management control method, device, equipment and storage medium
CN113619299A (en) * 2021-07-06 2021-11-09 珠海思格特智能系统有限公司 Seal equipment intelligent control method and system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
OFD的安全应用分析;冯辉;陈留勇;樊孝龙;李海波;王寒冰;;信息技术与标准化;20171110(第11期);第51-55页 *
SEAL: A secure communication library for building dynamic group key agreement applications;Patrick P.C. Lee;The Journal of Systems and Software 80 (2007);20060612;第356-370页 *
会计档案电子化管理的探索与实践;宋吉丽;;办公室业务;20200725(第14期);第55-56页 *
信息化办公平台技术架构优化及实现;王旭东;;上海造船;20090930(第03期);第62-66页 *
基于PKI体系的电子签章系统解析;严凡;;信息与电脑(理论版);20110515(第05期);第68-69页 *

Also Published As

Publication number Publication date
CN114444129A (en) 2022-05-06

Similar Documents

Publication Publication Date Title
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
JP7462910B2 (en) Credential validation and issuance through a Credential Service Provider
CN100469000C (en) System and method for creating a secure network using identity credentials of batches of devices
CN102420690B (en) Fusion and authentication method and system of identity and authority in industrial control system
CN110060037B (en) Distributed digital identity system based on block chain
CN112257110B (en) Electronic signature management method, management system and computer readable storage medium
CN101022339A (en) Electronic sign stamp identifying method combined with digital centifi cate and stamp
CN110120953A (en) A kind of railway passenger identity authorization system towards smart phone client
CN100541532C (en) The method of stamped signature centralized management and delegable Electronic Signature safety
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN111881483B (en) Resource account binding method, device, equipment and medium based on blockchain
CN110969531A (en) Borrowing deposit verification and online checking method and system
CN113239335A (en) Block chain personnel information management system and method based on Baas
CN111914231A (en) Block chain-based identity authentication method, system, equipment and storage medium
Shehu et al. On the interoperability of european national identity cards
US10686777B2 (en) Method for establishing protected electronic communication, secure transfer and processing of information among three or more subjects
Koulolias et al. STORK e-privacy and security
CN114444129B (en) Method and system for dynamically controlling electronic seal
CN111339036A (en) Block chain-based electronic license full life cycle management method and device
CN109600338B (en) Trusted identity management service method and system
CN114444130A (en) Electronic certificate mutual trust and mutual authentication platform based on block chain
CN114565485A (en) Labor contract management method and system based on block chain ipfs storage
EP1779635B1 (en) Method for assigning an authentication certificate and infrastructure for assigning a certificate
CN109753824B (en) Distributed electronic signature method and system
CN111222988A (en) Transaction information distributed management system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant