CN115330345A - Electronic signature anti-counterfeiting method and system - Google Patents

Electronic signature anti-counterfeiting method and system Download PDF

Info

Publication number
CN115330345A
CN115330345A CN202210986640.9A CN202210986640A CN115330345A CN 115330345 A CN115330345 A CN 115330345A CN 202210986640 A CN202210986640 A CN 202210986640A CN 115330345 A CN115330345 A CN 115330345A
Authority
CN
China
Prior art keywords
electronic signature
counterfeiting
verification
user
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210986640.9A
Other languages
Chinese (zh)
Inventor
李若瑶
李青华
石健昆
石潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangyike Data Technology Co ltd
Original Assignee
Guangyike Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangyike Data Technology Co ltd filed Critical Guangyike Data Technology Co ltd
Priority to CN202210986640.9A priority Critical patent/CN115330345A/en
Publication of CN115330345A publication Critical patent/CN115330345A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the field of electric digital data processing, and discloses an electronic signature anti-counterfeiting method and system, which comprise the following steps: s1: responding to an anti-counterfeiting electronic signature application sent by a user on the master block chain; s2: sending the recorded stamp picture uploaded by the user to a supervision and verification system in butt joint with the ownership block chain; s3: acquiring an anti-counterfeiting electronic signature passing the verification; s4: storing the anti-counterfeiting electronic signature into a main right block chain, and taking the face data of the legal person as a first secret key; s5: when the anti-counterfeiting electronic signature is used, face recognition and short message verification are carried out on a user, and if the verification is passed, the use right of the anti-counterfeiting electronic signature is granted. This scheme is used for prior art can't satisfy simultaneously that anti-fake strong and handle the problem simple and convenient of use, can strengthen the anti-fake effect of electronic signature, effectively prevents to appear forging electronic signature or the electronic signature of counterfeit use, improves the enterprise and to electronic signature trust level, handles simultaneously and uses the flow of electronic signature simpler.

Description

Electronic signature anti-counterfeiting method and system
Technical Field
The invention relates to the field of electric digital data processing, in particular to an electronic signature anti-counterfeiting method and system.
Background
With the development of science and technology, people seek high-efficiency office more and more, and online meeting and electronic contract equivalent technologies are widely applied due to the low requirement characteristic on time and space. When signing an electronic contract, an electronic signature is needed, and an electronic signature commonly used in business activities among enterprises is an electronic signature. The electronic signature is an electronic signature which converts electric digital data into a visual effect of an entity stamping mark, has strong visibility, can be used by depending on life experience, does not need to understand an electronic signature encryption technology, and can be more easily accepted by enterprises. The biggest problem facing the use of electronic signatures is the legal effect of electronic signatures. According to the rules of the electronic signature method, the following conditions are met at the same time to be considered as a valid electronic signature:
1. true identity: when the electronic signature making data is used for electronic signature, the electronic signature making data belongs to the exclusive use of an electronic signer;
(electronic signature is signature data which can be made only by the participation of the attribution person, represents the identity of the attribution person and must be done manually)
2. True will: the electronic signature making data is only controlled by an electronic signer during signing;
(electronic signature can express the consent of the attribution to the content of the document)
3. The contract is not changed: any changes to the electronic signature after signing can be discovered;
(the contents of the electronic contract, once signed, cannot be modified, or the modified part can be found)
4. The signature is not changed: any changes to the content and form of the data message after signing can be discovered.
(electronic signature data of the owner cannot be modified, including accompanying time, address, etc.)
In order to ensure that the signature cannot be changed, currently, most block chain technologies are adopted to store the electronic signature and the contract covered with the electronic signature, and various complex encryption technologies are used for data storage, so that only an owner of the electronic signature can see and modify related data, and privacy and safety are improved. However, although the prior art can effectively prevent the change after the signature, the used electronic signature is difficult to guarantee not to be forged, the authenticity of the electronic signature can only trust the party providing the data storage technology, and the enterprise trust is difficult to obtain.
Disclosure of Invention
The invention aims to provide an electronic signature anti-counterfeiting method and system so as to meet the requirements of strong anti-counterfeiting capability and simple and convenient use.
The basic scheme provided by the invention is as follows: an electronic signature anti-counterfeiting method comprises the following steps:
s1: responding to an anti-counterfeiting electronic signature application sent by a user on the master block chain;
s2: sending the recorded stamp picture uploaded by the user to a supervision and verification system in butt joint with the ownership block chain;
s3: acquiring an anti-counterfeiting electronic signature passing the verification;
s4: storing the anti-counterfeiting electronic signature into a main right block chain, and taking the face data of the legal person as a first secret key;
s5: and carrying out face recognition and short message verification on the user, and if the verification is passed, granting the use right of the anti-counterfeiting electronic signature.
The working principle and the advantages of the invention are as follows:
the invention relates to an electronic signature anti-counterfeiting method, which runs on a master block chain in the whole process and furthest ensures that an electronic signature cannot be forged or falsely used. Generally speaking, in order to improve the legal effect of the electronic signature, most of the third-party platforms need to send the record picture provided by the user to the supervision and auditing system, that is, the electronic signature is endowed with stronger public trust through judicial identification, so that enterprises can approve the legal effect of the electronic signature. According to the scheme, the master block chain is in butt joint with the supervision and verification system, so that all processes from application to use run on the master block chain, the anti-counterfeiting effect of the electronic signature is better, the whole process is greatly simplified, and the application and use of the electronic signature are more convenient.
Further, the method for applying for the anti-counterfeiting electronic signature comprises the following steps:
step 1: confirming and signing the related agreement;
step 2: filling application information including enterprise information, legal person information and application signature types;
and step 3: uploading a signature acquisition table scanning piece;
and 4, step 4: and collecting the face data of the legal person.
Therefore, multiple information of the legal person and the enterprise is collected as application materials, on one hand, the reliability of the anti-counterfeiting electronic signature can be increased, on the other hand, the collected multiple application information can be used as multiple application-preventing information, and the situation of falsely using is prevented.
Further, authorizing the agent, performing face recognition on the agent after obtaining the authorization of the legal person, and taking the face data of the agent as a second secret key;
therefore, the universality of the anti-counterfeiting electronic signature can be improved in a mode that a legal person authorizes the agent person on the premise of ensuring the safety.
Further, in S5, comparing and identifying the face of the user with the first key and the second key stored in the master block chain; if the first secret key passes the verification, sending a short message to the legal person for verification; if the second secret key passes the verification, sending short message verification to the agent, and sending a notification short message to the legal person;
therefore, by means of verification to the legal person, the legal person can know the use condition of the electronic signature at the first time.
Furthermore, a voiceprint, an iris and a fingerprint can be combined to be used as a first secret key;
thus, the combination of voiceprint, iris, fingerprint or face recognition is used as a first key, multiple factors are used as verification conditions, and the anti-counterfeiting electronic signature can be conveniently used by different people;
further, in S5, after the user passes the authentication, the authentication information that passes this time is used as a new first key;
because the human face or other physical signs of the person change with time, if the information of the first key is not updated, the situation that a legal person cannot verify the information may be caused, and if the information is collected again, the situation is troublesome; the application is direct when the verification is directly carried out; according to the method, the key information is updated according to the principle, the key information needs to be audited again, and the information can be directly updated after the legal person verifies and passes the verification during the verification, so that the technical prejudice that the key information needs to be audited again during the updating is overcome.
Further, the method also comprises the step S6: when the anti-counterfeiting electronic signature is used, the anti-counterfeiting electronic signature of the user is identified and distinguished through the supervision and audit system;
therefore, multiple information acquisition is carried out when the electronic anti-counterfeiting signature is applied, and the used anti-counterfeiting electronic signature is identified and distinguished, so that the public trust and the anti-counterfeiting capability of the electronic signature are greatly improved.
Further, when the user uses the electronic signature, a use record is formed in the supervision and verification system, and then the supervision and verification system distinguishes the anti-counterfeiting electronic signature use record according to the proportion;
therefore, on one hand, the monitoring system checks the anti-counterfeiting electronic signature according to the proportion, the checking pressure of the monitoring system is reduced, on the other hand, the formed use record is convenient to trace the source of the electronic signature, and the use record which is not checked out is prevented from causing loss.
Furthermore, the method for using the anti-counterfeiting electronic signature comprises the step of stamping at a designated position or stamping at the same position of a plurality of pages, and the scheme can accelerate the stamping speed.
An electronic signature anti-counterfeiting system applies an electronic signature anti-counterfeiting method.
Drawings
Fig. 1 is a flow chart of an embodiment 1 of the electronic signature anti-counterfeiting method and system of the invention.
Detailed Description
The following is further detailed by the specific embodiments:
example 1:
the embodiment is basically as shown in the attached figure 1: an electronic signature anti-counterfeiting method and system comprises the following steps:
s1: responding to an anti-counterfeiting electronic signature application sent by a user on a master block chain, and specifically comprising the following steps:
step 1: confirming and signing the related agreement;
step 2: filling application information including enterprise information, legal person information and application signature types;
and step 3: uploading a signature acquisition table scanning piece;
and 4, step 4: and collecting the face data of the legal person.
S2: sending the recorded stamp picture uploaded by the user to a supervision and verification system in butt joint with the ownership block chain;
s3: acquiring an anti-counterfeiting electronic signature passing the verification;
s4: storing the anti-counterfeiting electronic signature into a master block chain, and taking the face data of a legal person as a first secret key;
s5: the face recognition is carried out on the user, a CA verification code short message is sent to the user after the verification is passed, and the use right of the anti-counterfeiting electronic signature of the user is granted when the CA verification is passed;
s6: when the anti-counterfeiting electronic signature is used, the anti-counterfeiting electronic signature of the user is identified and distinguished through a supervision and verification system of a supervision end.
In S1, the types of the application signatures comprise enterprise official seals, financial seals, legal seals and the like; when a user uploads a signature acquisition table scanning piece, the electronic signature acquisition table is downloaded from a third-party platform firstly, then the electronic signature acquisition table is stamped at a designated position after printing, and a clear scanning piece is conducted to the third-party platform, so that the prompt of ensuring that the color of a seal in the scanning piece is bright and clear and the background has no cluttered factors can be prompted; when the face data is collected, the user is prompted to process information such as the purpose, the mode, the range and the like of the face information;
in S5, authorization of the agent is also included. And during authorization, firstly, carrying out face recognition on the legal person, then carrying out face data scanning on the agent after the face recognition of the legal person passes, and storing the face data of the agent as a second key in the master block chain. In the subsequent use process, the face of the user is compared with the first key and the second key stored in the master block chain for identification; if the first secret key passes the verification, sending a short message to the legal person for verification; and if the second secret key passes the verification, sending short message verification to the agent, and simultaneously sending a notification short message to the legal person. Specifically, when the anti-counterfeiting electronic signature is used, the pattern of the anti-counterfeiting electronic signature can be clicked to move the anti-counterfeiting electronic signature to the designated position of the electronic contract for stamping, and whether stamping is performed at the same position of other pages can be selected, so that the stamping efficiency is improved, and the processing speed is higher for the contract with multiple copies; when stamping, in order to avoid misoperation, long stamping operation can be set, the stamping can be completed only by keeping the current stamping action larger than a preset stamping time threshold, and the scheme can provide a considered space for a user under the condition of hesitation to sign a contract, and avoid repentance after the user directly stamps.
The specific steps of identifying and distinguishing the authenticity in the S6 comprise that CA digital signature verification is carried out by acquiring the hash value of the file and the MD5 value of the summary information of the file, and if the verification comparison exists, and the record contains a signature certificate, the file is authentic, otherwise, the file is false; in step S6, the monitoring and auditing system does not distinguish all the anti-counterfeit electronic signatures, but performs a spot check on the usage records formed in the monitoring system, wherein the spot check proportion is one fifth of the total amount, so that on one hand, the usage records can be traced to the source, and the spot check reduces the auditing pressure.
Meanwhile, compared with a general block chain characterized by 'going to the center', the master block chain of the scheme is a 'multi-center' block chain taking a user and a monitoring end as centers, when the anti-fake electronic signature is applied, the monitoring end can carry out verification and filing on a filed seal picture submitted by the user, so that the electronic signatures acquired by the user under different platforms can be communicated and used, the situation that the electronic signatures under different third-party platforms cannot be identified can not occur, the electronic signatures do not need to be repeatedly applied to different third-party platforms, the use is more convenient and rapid, the electronic signatures needing to be managed are fewer, and the management difficulty is lower; when the user uses the electronic signature to sign the electronic contract, the electronic signature used by the opposite party on the electronic contract can be identified and distinguished, the electronic signature on the electronic contract is compared with the anti-counterfeiting electronic signature stored in the block chain, whether the electronic signature is the anti-counterfeiting electronic signature which is subjected to judicial identification and filing is judged, and relevant prompts are sent.
Currently, for electronic signatures, a large number of people consider that the legal effectiveness is insufficient and the electronic signatures are easy to be tampered; some proposals combine the block chain with the electronic signature, and the legal effectiveness is improved through the data consistency and the non-tampering property of the block chain, so that the non-tampering property of the electronic signature is realized, and the trust of the user can be obtained;
the scheme is different from the existing electronic signature and block chain, the main right block chain of a third-party platform is in butt joint with a supervision and verification system of a supervision end, and a user or the supervision end can inquire a complete process track of the user on the block chain; the supervision terminal referred in the application can be a reliable third party with public trust and can also be a supervision department with a supervisor function, so that the public trust and legal effectiveness of the electronic signature can be improved;
however, in most cases, the supervising end cannot be directly connected with a plurality of users, on one hand, the overall data volume is huge, and on the other hand, because the data size, data format, data content and the like transmitted by each user are different, the supervising end needs to perform additional screening and repeated auditing when performing data processing, which causes the processing efficiency of the supervising end to be low, so the supervising end cannot be directly connected with a user side;
the application subdivides the storage space of the data uploaded by the user at the supervision end on the main right block chain, and comprises a signature storage area, a face image storage area and a dynamic storage area, wherein each storage area is provided with a respective format; the area division proportion of the storage space is as follows: signature storage area: the verification information storage area: the dynamic storage area is 1; when the system is implemented, the signature storage area is used for storing different types of signatures, the verification information storage area is used for storing various types of verification information of users, and the dynamic storage area is used for storing some data which possibly need to be frequently replaced, wherein the conventionally arranged dynamic storage areas are smaller and exist as temporary storage areas, and the dynamic storage area of the system is the largest in proportion and is a specific setting made by an applicant in combination with the current industrial development and social development, so that sufficient space can be reserved for the future on the premise of not changing the original subarea, and the regulation of a monitoring end is facilitated;
the storage space is set by the supervising end in a partitioning mode, the size and the format of data uploaded by a user are both in accordance with the requirements of the supervising end, the difficulty of verifying the information applied by the user by the supervising end and the difficulty of screening the information uploaded by the user are reduced, and the application speed of electronic signature of the user is further improved; meanwhile, the division of the storage space also facilitates the user to revise the application information in time, and the user can accurately know which part of the application data has bugs, so that the application data is convenient to supplement and replace.
An electronic signature anti-counterfeiting system applies the electronic signature anti-counterfeiting method in the embodiment.
Example 2:
different from the embodiment 1, in the embodiment, when the face data of the legal person is collected in the step 4, the method further includes a legal person identification step, and the legal person identification step specifically adopts living body detection and micro-expression reaction identification; during implementation, the micro expression recognition is mainly used for judging the state of a legal person, and during specific implementation, the micro expression recognition is used for firstly collecting face data of an electronic signature user, specifically eyebrow, eye, mouth and face characteristics, and evaluating the state of the legal person; namely, judging whether the legal person is stressed or the mental state is normal or not from the micro-expression; if the signature is abnormal, the background defaults the signature as an invalid signature, and sends warning information to a preset third person;
at present, when face recognition is carried out or face data information is used as verification information, a user and stored data information are generally matched and compared, and if the user operates, verification can be basically passed, so that when the user is under the stress which directly influences the personal safety of the user, the user can possibly reach an agreement which violates the will of the user under the condition that the user is unavailable, and an electronic signature or even a paper contract can not really judge whether the user is under the stress or not, so that the user suffers inevitable loss, and the state of the user and the like are judged through micro-expression recognition;
during implementation, if a legal person is under stress, the agent uses the electronic signature, the electronic signature can be identified through micro expressions of the agent and the legal person, if the micro expressions identify that the states of the agent and the legal person are abnormal, the signature is judged to be invalid, and warning information is sent to a preset third person.
Example 3:
different from the embodiments 1 and 2, in the present embodiment, the combination of iris, voiceprint, fingerprint and face recognition is used as the first key, and the combination can be performed at will, and the present embodiment is also applicable to users who suffer from accidents or other situations, for example, users who suffer from facial trauma can use voiceprint or fingerprint, and can also be used in combination, and the possibility of being forged is lower;
at present, although the single verification modes are adopted, for the single verification mode, when the verification mode fails, other verification modes need to be selected again for re-auditing and submitting, which is inconvenient, for example, when face recognition is adopted, when the face of a user is burnt or otherwise injured, the user cannot recognize the face, the first key needs to be reset, and the re-submitting of the audit is needed, which is troublesome; of course, multiple verification modes are overlapped, but the data volume and the calculation volume are large, and if the method is used for large-scale verification, the cost is high, or large delay exists, so that the method is not convenient enough;
in the application, when multiple verification information is adopted, the threshold value of the feature matching degree of single verification information is reduced, and when two kinds of information are combined during implementation, the iris feature matching degree is 75%, the voiceprint feature matching degree is 72%, the fingerprint is 75% and the face identification is 80%, so that by adopting the two kinds of verification information, the authenticity, the accuracy and the accuracy of verification can be ensured under the condition of reducing the calculated amount; in the implementation process, if three kinds of verification information are adopted, the matching degree of the iris features is 65%, the matching degree of the voiceprint features is 65%, the matching degree of the fingerprints is 70%, and the face recognition is 70%, so that the matching degree of the verification information is reduced by increasing the types of the verification information, and the calculated amount is reduced on the premise of meeting the recognition accuracy.
When the verification is passed and the signature is successfully carried out, the verification information is used as a new first key, so that the condition that a user or a legal person cannot verify due to body change is avoided, particularly, if voiceprints are adopted, when vocal cord changes of the user accumulate, the voiceprints may not be verified, but if the vocal cord changes, the accumulated difference cannot influence the verification; or when the user slowly becomes fat, if the user uses the originally acquired face all the time, a scene which cannot be verified may exist.
The foregoing are embodiments of the present invention and are not intended to limit the scope of the invention to the particular forms set forth in the specification, which are set forth in the claims below, but rather are to be construed as the full breadth and scope of the claims, as defined by the appended claims, as defined in the appended claims, in order to provide a thorough understanding of the present invention. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. An electronic signature anti-counterfeiting method is characterized by comprising the following steps:
s1: responding to an anti-counterfeiting electronic signature application sent by a user on the master block chain;
s2: sending the recorded stamp picture uploaded by the user to a supervision and verification system in butt joint with the ownership block chain;
s3: acquiring an anti-counterfeiting electronic signature passing the verification;
s4: storing the anti-counterfeiting electronic signature into a master block chain, and taking the face data of a legal person as a first secret key;
s5: and carrying out face recognition and short message verification on the user, and if the verification is passed, granting the use right of the anti-counterfeiting electronic signature.
2. The method of claim 1, wherein the applying step comprises:
step 1: confirming and signing the related agreement;
step 2: filling application information including enterprise information, legal person information and application signature types;
and 3, step 3: uploading a signature acquisition table scanning piece;
and 4, step 4: and collecting the face data of the legal person.
3. The electronic signature anti-counterfeiting method according to claim 1, further comprising authorizing an agent, performing face recognition on the agent after obtaining the authorization of a legal person, and using face data of the agent as a second key.
4. The electronic signature anti-counterfeiting method according to claim 3, wherein in S5, the face of the user is compared and identified with the first key and the second key stored in the master block chain; if the first secret key passes the verification, sending a short message to the legal person for verification; and if the second secret key passes the verification, sending short message verification to the agent, and simultaneously sending a notification short message to the legal person.
5. The method of claim 1, wherein a combination of voiceprint, iris, and fingerprint is used as the first key.
6. The method according to claim 5, wherein in S5, the passing authentication information is used as a new first key after the user authentication passes.
7. The electronic signature anti-counterfeiting method according to claim 1, further comprising S6: when the anti-counterfeiting electronic signature is used, the anti-counterfeiting electronic signature of the user is identified and distinguished through the supervision and audit system.
8. The method according to claim 7, wherein when the user uses the electronic signature, a usage record is formed in the supervision and review system, and then the supervision and review system identifies the usage record of the electronic signature in proportion.
9. The method of claim 1, wherein the method of using the electronic signature includes stamping at a designated location or stamping at the same location of multiple pages.
10. An electronic signature anti-counterfeiting system, which is characterized by applying the electronic signature anti-counterfeiting method as claimed in any one of claims 1 to 9.
CN202210986640.9A 2022-08-17 2022-08-17 Electronic signature anti-counterfeiting method and system Pending CN115330345A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210986640.9A CN115330345A (en) 2022-08-17 2022-08-17 Electronic signature anti-counterfeiting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210986640.9A CN115330345A (en) 2022-08-17 2022-08-17 Electronic signature anti-counterfeiting method and system

Publications (1)

Publication Number Publication Date
CN115330345A true CN115330345A (en) 2022-11-11

Family

ID=83924387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210986640.9A Pending CN115330345A (en) 2022-08-17 2022-08-17 Electronic signature anti-counterfeiting method and system

Country Status (1)

Country Link
CN (1) CN115330345A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116071030A (en) * 2023-03-31 2023-05-05 北京惠朗时代科技有限公司 Electronic signature data access safety control system based on Internet
CN117668805A (en) * 2023-10-19 2024-03-08 中金金融认证中心有限公司 Credibility guaranteeing method for documents in evaluation process of third party evaluation service

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116071030A (en) * 2023-03-31 2023-05-05 北京惠朗时代科技有限公司 Electronic signature data access safety control system based on Internet
CN117668805A (en) * 2023-10-19 2024-03-08 中金金融认证中心有限公司 Credibility guaranteeing method for documents in evaluation process of third party evaluation service

Similar Documents

Publication Publication Date Title
CN115330345A (en) Electronic signature anti-counterfeiting method and system
CN107888557B (en) Method and system for generating protocol file
US7690032B1 (en) Method and system for confirming the identity of a user
US7971063B2 (en) Method and device for safeguarding of a document with inserted signature image and biometric data in a computer system
CN104935438B (en) Method and apparatus for authentication
CN110868300B (en) Block chain evidence-storing method and system
CN105474230A (en) Method, system and computer program for comparing images
CN103841108A (en) Authentication method and system of biological characteristics of user
CN110458662B (en) Anti-fraud wind control method and device
CN110392041B (en) Electronic authorization method, device, storage equipment and storage medium
CN110084708A (en) A kind of insurance management platform based on Internet of Things and block chain technology and Claims Resolution method
CN110941860B (en) Block chain and biological feature based electronic contract associable analysis verification method
CN107688928A (en) Self-service alarm all-in-one and its notes method
CN113343313A (en) Verification report validity identification method, legal service system and readable storage medium
CN114090985A (en) Method and device for setting user operation permission in block chain and electronic equipment
CN112667854A (en) False insurance application processing method and device, computer equipment and storage medium
CN113553555A (en) Client security authentication method and device
CN112598064A (en) Data processing method and device
CN112507309A (en) Method, device, equipment and storage medium for court to remotely obtain procurement insurance pending trial materials
CN115481426A (en) Block chain-based electronic archive management method, system, terminal device and medium
CN115481427A (en) Block chain-based electronic signature management method, system, equipment and storage medium
CN107393065A (en) A kind of marine vessel matches somebody with somebody member's check method and system
EP2254093B1 (en) Method and system for confirming the identity of a user
CN114372248A (en) Intelligent software system for stamp management
CN114936848A (en) Contract flow management method and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination