CN115442143A - Electronic signature method, device, equipment and readable medium - Google Patents

Electronic signature method, device, equipment and readable medium Download PDF

Info

Publication number
CN115442143A
CN115442143A CN202211079494.8A CN202211079494A CN115442143A CN 115442143 A CN115442143 A CN 115442143A CN 202211079494 A CN202211079494 A CN 202211079494A CN 115442143 A CN115442143 A CN 115442143A
Authority
CN
China
Prior art keywords
signature
client
authentication
signing
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211079494.8A
Other languages
Chinese (zh)
Other versions
CN115442143B (en
Inventor
肖国泉
肖克
梁全锐
关海峰
彭峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cape Digital Technology Guangdong Co ltd
Original Assignee
Cape Digital Technology Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cape Digital Technology Guangdong Co ltd filed Critical Cape Digital Technology Guangdong Co ltd
Priority to CN202211079494.8A priority Critical patent/CN115442143B/en
Publication of CN115442143A publication Critical patent/CN115442143A/en
Application granted granted Critical
Publication of CN115442143B publication Critical patent/CN115442143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to the field of artificial intelligence and discloses an electronic signature method, device, equipment and readable medium. In the scheme of the application, the terminal can acquire the signature request file sent by the client, the terminal can remind the client of identity authentication, after the identity authentication is passed, the client sends the signature request file to the signature end, when the signature end receives the request of opening, the request of opening the signature request file is required to be applied to the terminal, the terminal can remind the user of identity authentication of the signature end, after the authentication is passed, the signature end prompts the signature mode of selecting the signature, after the signature end finishes the signature by using the selected signature mode, the terminal can receive the signature result sent by the signature end and upload the signature result uploaded by the signature end, and therefore the problems that the service efficiency is low and the leakage risk exists due to the adoption of the traditional signature mode in the prior art are solved.

Description

Electronic signature method, device, equipment and readable medium
Technical Field
The present application relates to the field of artificial intelligence technologies, and in particular, to an electronic signature method, apparatus, device, and readable medium.
Background
Along with the related promulgation of global 'electronic signatures', the digitization process of enterprises is rapidly accelerated, and the factors of how to improve the working efficiency, reduce the social cost, and be safe and reliable become the business development direction of the enterprises.
The contract is used as an agreement for establishing, changing and terminating civil relations between the parties, is an effective certificate for determining the right obligations of the parties signing the contract, is protected by law, and can achieve the purposes of ensuring expected benefits, maintaining transaction safety and the like. Therefore, economic transactions of all enterprises or individuals involve contract signing and management, and run through all links of enterprise management and operation of various industries, so that except the scenario that electronic signatures are not allowed to be used by law regulations, paper of other scenarios can be replaced by electronic materials, and therefore, the electronic signing has numerous potential application scenarios and large potential market space.
In the traditional signature mode, individuals or enterprises sign through paper contracts, so that the service efficiency is low, the potential safety hazard is large, and safety risks such as illegal tampering, counterfeiting and information leakage can be involved; contracts relate to confidential data inside enterprises, and core business secrets are leaked, so that the traditional technology has defects and needs to be improved.
Disclosure of Invention
The application mainly aims to provide an electronic signature method, device, equipment and readable medium, and aims to solve the problems of low business efficiency and leakage risk caused by the adoption of a traditional signature mode.
In order to achieve the above object, the present application provides an electronic signature method, including:
acquiring a signature request file sent by a client, and prompting the client to perform identity authentication;
if the client identity authentication passes, judging whether the client passes a preset level authentication;
if the client passes the preset grade authentication, the signature request file is sent to a signature end;
receiving a request for signing the signing request file sent by the signing terminal, and prompting the signing terminal to perform identity authentication;
if the identity authentication of the signature end is passed, prompting the signature end to select a preset signature mode for signature;
receiving a signature result of the signature end, and uploading the signature result;
receiving a request for opening a signature result sent by a client, and performing identity authentication on the client;
and if the client passes the identity authentication, sending a signature result to the client.
Further, the step of prompting the signing terminal to select a preset signing mode for signing comprises:
receiving a signature adding mode request sent by a signature end;
judging whether the signature end is a personal user or a legal user;
if the signature end is the individual user, prompting the individual user to add a signature mode of the individual signature;
and if the signature end is a legal user, prompting the individual legal user to add a signature mode of the seal.
Further, the step of determining whether the client passes the preset level authentication includes:
judging whether the client uploads the photos of the front side and the back side of the identity card;
if the client uploads the photos of the front side and the back side of the identity card, judging whether the client performs face real-name authentication or not;
and if the client side carries out the face real-name authentication, judging that the client side passes the preset grade authentication.
Further, before the step of receiving the request for signing the signature request file sent by the signature terminal, the method includes:
judging whether the signature end passes a preset grade authentication;
and if the signature end passes the preset grade authentication, receiving a signature request sent by the signature end for signing the signature request file.
Further, the identity authentication method includes:
performing identity authentication by inputting a preset account and a preset password; or
Identity authentication is carried out in a way of WeChat authentication; or
Performing identity authentication by identifying a preset fingerprint or face identification mode; or
Identity authentication is performed by inputting a mobile phone number to acquire a verification code.
Further, before the step of prompting the signing terminal to select a preset signing mode for signing, the method comprises the following steps:
judging whether the signature request file sets a fixed position of a signature or not;
if not, the signature is carried out according to the position selected by the signature end.
Further, the signature mode of the seal includes: a perforation seal, a single-page seal or a multi-page seal.
The embodiment of the present application further provides an electronic signature device, including:
the acquisition module is used for acquiring a signature request file sent by the client and prompting the client to perform identity authentication;
the judging module is used for judging whether the client passes the preset grade authentication or not if the client passes the identity authentication;
the first sending module is used for sending the signature request file to a signature end if the client passes the preset grade authentication;
the receiving and prompting module is used for receiving a request for signing the signing request file sent by the signing terminal and prompting the signing terminal to perform identity authentication;
the prompting module is used for prompting the signature end to select a preset signature mode for signature if the identity authentication of the signature end passes;
the uploading module is used for receiving the signature result of the signature end and uploading the signature result;
the authentication module is used for receiving a request for opening a signature result sent by a client and authenticating the identity of the client;
and the second sending module is used for sending the signature result to the client if the client passes the identity authentication.
The present application further provides a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of any of the above methods when executing the computer program.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of any one of the above.
The electronic signature method of the embodiment of the application comprises the steps that a terminal can obtain a signature request file sent by a client, wherein the client is indicated as a party needing to be signed, the file or the contract needing to be signed is uploaded by sending, the terminal can remind the client of authentication needing to be carried out, the client is prompted to carry out grade authentication after the identity of the client passes the authentication, when the grade authentication of the client passes the authentication, the client does not have problems in personal information, the signature request file of the current time is sent to a signature end after the grade authentication passes, when the client sends the signature request file to the signature end, the signature end receives an opening operation, the request of printing the signature request file is required to be applied to the terminal, the terminal can remind the user of carrying out identity authentication on the signature end, if the identity of the signature end passes the authentication, the client can prompt a mode of selecting a signature to the signature end, after the signature end finishes using the selected signature mode, the terminal can receive the signature result and upload the signature result to the client, when the signature end receives the signature result, the signature process of the conventional signature process that the signature process is required by the client can pass the signature process, and the problem of the conventional signature process that the signature process is leaked once is solved.
Drawings
FIG. 1 is a schematic flow chart illustrating an electronic signature method according to an embodiment of the present application;
FIG. 2 is a block diagram of an electronic signature device according to an embodiment of the present disclosure;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides an electronic signature method for a flat ink screen, including the steps of:
s1, acquiring a signature request file sent by a client, and prompting the client to perform identity authentication;
s2, if the identity authentication of the client passes, judging whether the client passes the preset grade authentication;
s3, if the client passes through the preset grade authentication, the signature request file is sent to a signature end;
s4, receiving a request for signing the signature request file sent by the signature end, and prompting the signature end to perform identity authentication;
s5, if the identity authentication of the signature end is passed, prompting the signature end to select a preset signature mode for signature;
s6, receiving a signature result of the signature end, and uploading the signature result;
s7, receiving a request for opening a signature result sent by a client, and performing identity authentication on the client;
and S8, if the client passes the identity authentication, sending a signature result to the client.
As described in the foregoing steps S1 and S2, the terminal may obtain a signature request file sent by the client, where the client is a party that needs to be signed, and by sending and uploading a file or a contract that needs to be signed, the terminal may remind the client of authentication that the client needs to perform identity authentication, and by authenticating whether the identity of the client has passed, where the primary role of authenticating the identity is to enable the client to pass a related account number of an authenticated user, where the account number may be logged in through a WeChat or a mobile phone number, and so on, so that the current signature ensures security.
As described in the foregoing steps S3 to S4, when the level authentication of the client passes, it indicates that there is no problem in the personal information of the client, when the client passes the level authentication, the next login does not need to perform the level authentication, and only the client is certified as the user account through the identity authentication, the signature request file of this time is sent to the signature end after the level authentication passes, and when the client sends the signature request file to the signature end and the signature end receives the opening request, the signature end applies to the terminal to issue the request for opening the signature request file, and the terminal will prompt the user to perform the identity authentication at the signature end, thereby authenticating whether the signature end is the user and performing the corresponding operation.
As described in the foregoing steps S5-S8, if the identity of the signature end is authenticated and passed, the terminal may prompt the signature end to select a signature mode, where the signature mode may be signature, seal, or select another mode, and after the signature end completes the signature using the selected signature mode, the terminal will receive a signature result sent by the signature end, where the signature result may be that the signature passes or the signature does not pass, and the terminal uploads the signature result, the client will receive the signature result uploaded by the signature end, when the client needs to open the signature result, the client needs to perform identity authentication again, and when the identity of the client passes again, the client may receive the signature result, where the client may check, download, or share the received signature result, and if downloading is a file downloaded into pdf, the client may store the signature result locally.
The electronic signature method of the embodiment of the application can be used for a terminal to acquire a signature request file sent by a client, wherein the client is indicated as a party needing to be signed, the client is prompted to carry out grade authentication after the client passes the grade authentication by sending and uploading the file or the contract needing to be signed, the client is prompted to carry out the grade authentication after the client passes the grade authentication, the client is indicated to have no problem in personal information, the signature request file of the current time is sent to a signature end after the grade authentication passes, the signature end can be prompted to select a signature mode after the client sends the signature request file to the signature end and receives an opening request for applying to the terminal when the signature end receives the opening, the terminal can prompt a user to carry out the identity authentication of the signature end, the signature end can receive the signature result sent by the signature end and upload the signature result if the client passes the authentication of the signature end, the signature result of the signature end can be prompted to the signature end in a mode after the client finishes the application of the application, the signature end receives the signature result of the signature in the signature result of the current signature, the signature process of the signature once more, and the problem of the existing signature process of the signature process can be solved when the signature process of the signature once again.
Further, the step of prompting the signature end to select a preset signature mode for signature includes:
s201, receiving a signature adding mode request sent by a signature end;
s202, judging whether the signature end is a personal user or a legal user;
s203, if the signature end is a personal user, prompting the personal user to add a signature mode of personal signature;
and S204, if the signature end is a legal user, prompting the individual legal user of a signature mode of adding a seal.
In the above step, the terminal prompts the signing terminal to select a preset signing mode to perform signing, the signing terminal needs to be reminded of performing a signing mode adding the signature, the signing mode further comprises an individual signing and a legal person signing, the legal person signing mode is a signing mode adding the seal and needs to upload relevant company information of a company, and if the signing mode is an individual signing, the individual signing mode is a signature.
In another embodiment, if the signature end is a legal person, an operator can be added, the designated operator is set to process the signature of the current time so as to improve the efficiency of the signature, and the operator can also display the name information of the signature of the current time.
Further, the step of determining whether the client passes the preset level authentication includes:
s301, judging whether the client uploads the positive and negative photos of the identity card;
s302, if the client uploads the positive and negative photos of the identity card, judging whether the client performs face real-name authentication;
and S303, if the client side carries out face real-name authentication, judging that the client side passes the preset grade authentication.
In the above steps, in the level authentication of the client, it is required to authenticate whether the photographing treatment of the identity card of the client has been uploaded, if the data of the identity card has been uploaded, face recognition registration real-name authentication needs to be further performed on the client, and if the face real-name authentication has passed, it is determined that the client has passed the preset level limit, and the security of the signature is improved by setting the level authentication, so that the signature is prevented from being revealed.
Further, before the step of receiving the request for signing the signature request file sent by the signature terminal, the method includes:
s401, judging whether the signature end passes a preset grade authentication;
s402, if the signature end passes the preset grade authentication, receiving a request for signing the signature request file sent by the signature end.
As described above, before receiving a request for signing the signature request file from the signing terminal, it is necessary to determine whether the signing terminal has passed the level authentication, so as to save the security of the current signature, and if the level authentication of the signing terminal also passes, the terminal will receive the signature request of the signature request file from the signing terminal, and by setting the level authentication at the client and the signing terminal, the steps of signing can be performed after both sides have set related data, so that the security of the signature is improved, and the signature content is prevented from being stolen by lawless persons.
Further, the identity authentication method includes:
s501, identity authentication is carried out in a mode of inputting a preset account and a preset password; or
S502, identity authentication is carried out in a WeChat authentication mode; or
S503, performing identity authentication by identifying a preset fingerprint or face identification mode; or
S504, identity authentication is carried out in a mode of inputting a mobile phone number to obtain a verification code.
As described in the above steps, the authentication mode includes a mode of setting an account password to log in to implement authentication, and the user can log in to the related personal account and the related personal information terminal according to the preset account password; the method comprises a WeChat authentication login mode, and the WeChat authentication login mode is used for logging in a related account of the user according to an authorization mode of WeChat to realize identity authentication; the method comprises the steps of logging in identity information of a person in a preset fingerprint mode or a mode of directly identifying the face; the identity information authentication method comprises the step of verifying identity information authentication of a person by inputting a mobile phone number and acquiring a verification code.
Further, before the step of prompting the signing terminal to select a preset signing mode for signing, the method includes:
s601, judging whether the signature request file sets a fixed position of a signature or not;
s602, if not, the signature is carried out according to the position selected by the signature end.
As described above, before prompting the signature end to select a preset signature mode for signature, it needs to determine whether a fixed signature position has been set in a signature request file sent by a client, since some contract clients need the signature end to perform signature at the fixed position, the fixed position needs to be set to prompt the signature end to perform signature at the position, the terminal can set a virtual dotted line to prompt the signature end or use a square frame to frame the position to be signed, and if the client does not set the fixed signature position, the signature end can perform signature at the position deemed suitable by the client.
Further, the signature mode of the seal includes: a perforation seal, a single page seal, or multiple pages of seals.
As mentioned above, in the signature mode of the seal, if there are a plurality of pages or signature modes with different requirements, the seal can be set according to different requirements of the user, such as the seal on the perforation, the seal on a single page or the seal on all pages.
It should be noted that the signature mode of adding the personal signature can also be a multi-page signature or a single-page signature, or a perforation mode to ensure that the signature meets the needs of the user.
Referring to fig. 2, an embodiment of the present application further provides an electronic signature apparatus, including:
the acquisition module is used for acquiring a signature request file sent by the client and prompting the client to perform identity authentication;
the judging module is used for judging whether the client passes the preset grade authentication or not if the client passes the identity authentication;
the first sending module is used for sending the signature request file to a signature end if the client passes the preset grade authentication;
the receiving and prompting module is used for receiving a request for signing the signing request file sent by the signing terminal and prompting the signing terminal to perform identity authentication;
the prompting module is used for prompting the signature end to select a preset signature mode for signature if the identity authentication of the signature end passes;
the uploading module is used for receiving the signature result of the signature end and uploading the signature result;
the authentication module is used for receiving a request for opening a signature result sent by a client and authenticating the identity of the client;
and the second sending module is used for sending the signature result to the client if the client passes the identity authentication.
As described above, it can be understood that each component of the apparatus for electronic signature proposed in the present application may implement the function of any one of the above-described electronic signature methods, and the specific structure is not described in detail.
Referring to fig. 3, an embodiment of the present application further provides a computer device, where the computer device may be a server, and an internal structure of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the computer device is used for data such as question and answer data in the corpus. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an electronic signature method.
The processor executes the electronic signature method, and the method comprises the following steps: acquiring a signature request file sent by a client, and prompting the client to perform identity authentication; if the client identity authentication is passed, judging whether the client passes the preset grade authentication; if the client passes the preset grade authentication, the signature request file is sent to a signature end; receiving a request for signing the signing request file sent by the signing terminal, and prompting the signing terminal to perform identity authentication; if the signature end passes the identity authentication, prompting the signature end to select a preset signature mode for signature; receiving a signature result of a signature end, and uploading the signature result; receiving a request for opening a signature result sent by a client, and performing identity authentication on the client; and if the client passes the identity authentication, sending a signature result to the client.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, the computer program, when executed by a processor, implementing an electronic signature method, including the steps of: acquiring a signature request file sent by a client, and prompting the client to perform identity authentication; if the client identity authentication is passed, judging whether the client passes the preset grade authentication; if the client passes the preset grade authentication, the signature request file is sent to a signature end; receiving a request for signing the signing request file sent by the signing terminal, and prompting the signing terminal to perform identity authentication; if the identity authentication of the signature end is passed, prompting the signature end to select a preset signature mode for signature; receiving a signature result of the signature end, and uploading the signature result; receiving a request for opening a signature result sent by a client, and performing identity authentication on the client; and if the client passes the identity authentication, sending a signature result to the client.
In the electronic signature method, the terminal can acquire the signature request file sent by the client, wherein the client is indicated as a party needing to be signed, the terminal can remind the client of identity authentication by sending and uploading the file or the contract needing to be signed, the client is prompted to carry out grade authentication after the identity of the client passes the authentication, the client is indicated to carry out grade authentication after the grade authentication of the client passes the authentication, the client is indicated to have no problem on personal information, the signature request file of the current time is sent to the signature end after the grade authentication passes the authentication, the signature end applies for a request of opening the signature request file to the terminal when the signature end receives an opening after the client sends the signature request file to the signature end, the terminal can remind the user of carrying out identity authentication on the signature end, the terminal can prompt a signature selection mode to the signature end after the identity of the signature end passes the authentication, the signature end receives the signature result of the client sent by the signature end in the selected signature mode, the signature end can solve the problem of the problem that the client needs to carry out identity verification once again when the signature process of the signature by using the signature mode of the signature is completed, and the client can receive the signature result of the signature in the signature once signature verification when the signature verification.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (SSRDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct bused dynamic RAM (DRDRAM), and bused dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of another identical element in a process, apparatus, article, or method comprising the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. An electronic signature method, comprising:
acquiring a signature request file sent by a client, and prompting the client to perform identity authentication;
if the client identity authentication passes, judging whether the client passes a preset level authentication;
if the client passes the preset grade authentication, the signature request file is sent to a signature end;
receiving a request for signing the signing request file sent by the signing terminal, and prompting the signing terminal to perform identity authentication;
if the identity authentication of the signature end is passed, prompting the signature end to select a preset signature mode for signature;
receiving a signature result of a signature end, and uploading the signature result;
receiving a request for opening a signature result sent by a client, and performing identity authentication on the client;
and if the client passes the identity authentication, sending a signature result to the client.
2. The method of claim 1, wherein the step of prompting the signing party to select a predetermined signing manner for signing comprises:
receiving a signature adding mode request sent by a signature end;
judging whether the signature end is a personal user or a legal user;
if the signature end is the individual user, prompting the individual user to add a signature mode of the individual signature;
and if the signature end is the legal person user, prompting the individual legal person user of a signature mode of adding the seal.
3. The method of claim 1, wherein the step of determining whether the client has passed the predetermined level of authentication comprises:
judging whether the client uploads the photos of the front side and the back side of the identity card;
if the client uploads the photos of the front side and the back side of the identity card, judging whether the client performs face real-name authentication or not;
and if the client side carries out the face real-name authentication, judging that the client side passes the preset grade authentication.
4. The electronic signature method of claim 1, wherein before the step of receiving the request for signing the signature request file from the signature end, the method comprises:
judging whether the signature end passes a preset grade authentication;
and if the signature end passes the preset grade authentication, receiving a signature request sent by the signature end for signing the signature request file.
5. The electronic signature method of claim 1, wherein the identity authentication method comprises:
performing identity authentication in a mode of inputting a preset account and a preset password; or
Identity authentication is carried out in a way of WeChat authentication; or
Performing identity authentication by identifying a preset fingerprint or face identification mode; or
Identity authentication is performed by inputting a mobile phone number to acquire a verification code.
6. The method of claim 1, wherein before the step of prompting the signing party to select a predetermined signing manner for signing, the method comprises:
judging whether the signature request file sets a fixed position of a signature or not;
if not, the signature is carried out according to the position selected by the signature end.
7. The electronic signature method of claim 2, wherein the signature manner of the seal comprises: a perforation seal, a single page seal, or multiple pages of seals.
8. An electronic signature apparatus, comprising:
the acquisition module is used for acquiring a signature request file sent by the client and prompting the client to perform identity authentication;
the judging module is used for judging whether the client passes the preset grade authentication or not if the client passes the identity authentication;
the first sending module is used for sending the signature request file to a signature end if the client passes the preset grade authentication;
the receiving and prompting module is used for receiving a request for signing the signing request file sent by the signing terminal and prompting the signing terminal to perform identity authentication;
the prompting module is used for prompting the signature end to select a preset signature mode for signature if the identity authentication of the signature end is passed;
the uploading module is used for receiving the signature result of the signature end and uploading the signature result;
the authentication module is used for receiving a request for opening a signature result sent by a client and authenticating the identity of the client;
and the second sending module is used for sending the signature result to the client if the client passes the identity authentication.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the electronic signature method of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of electronic signature of any one of claims 1 to 7.
CN202211079494.8A 2022-09-05 2022-09-05 Electronic signature method, device, equipment and readable medium Active CN115442143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211079494.8A CN115442143B (en) 2022-09-05 2022-09-05 Electronic signature method, device, equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211079494.8A CN115442143B (en) 2022-09-05 2022-09-05 Electronic signature method, device, equipment and readable medium

Publications (2)

Publication Number Publication Date
CN115442143A true CN115442143A (en) 2022-12-06
CN115442143B CN115442143B (en) 2023-07-28

Family

ID=84248047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211079494.8A Active CN115442143B (en) 2022-09-05 2022-09-05 Electronic signature method, device, equipment and readable medium

Country Status (1)

Country Link
CN (1) CN115442143B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116545697A (en) * 2023-05-09 2023-08-04 东信和平科技股份有限公司 Electronic signature method, terminal, system and storage medium based on hybrid networking
CN116842909A (en) * 2023-06-12 2023-10-03 广东采华网络科技有限公司 Intelligent signature method and system

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647423A (en) * 2012-04-12 2012-08-22 熊楚渝 Identifying method and system of digital signature and seal
CN103501229A (en) * 2013-09-27 2014-01-08 武钢集团昆明钢铁股份有限公司 Supply chain management-based e-commerce platform safety certification system and method
CN104734851A (en) * 2013-12-24 2015-06-24 卓望数码技术(深圳)有限公司 Electronic seal method and system
CN105825446A (en) * 2016-02-23 2016-08-03 济南市天桥区人民法院 Internet jury system
CN106936582A (en) * 2015-12-31 2017-07-07 航天信息股份有限公司 Electronic Seal System and method
CN108320224A (en) * 2018-01-24 2018-07-24 上海百昌拍卖有限公司 Subject matter auction system and device
CN109510813A (en) * 2018-10-18 2019-03-22 张德辉 A kind of authority checking method and system based on variable two-dimension code
CN110532811A (en) * 2019-08-30 2019-12-03 杭州天谷信息科技有限公司 A kind of PDF signature method and PDF sealing system
CN111641605A (en) * 2020-05-16 2020-09-08 中信银行股份有限公司 Electronic signature method and system based on dynamic password
CN111865606A (en) * 2020-06-11 2020-10-30 天地融科技股份有限公司 Electronic signature log generation method and interactive system
CN113282938A (en) * 2021-06-02 2021-08-20 史珺 Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application
CN113886860A (en) * 2021-12-06 2022-01-04 山东确信信息产业股份有限公司 Electronic data security system and method based on mobile terminal
CN114697038A (en) * 2020-12-31 2022-07-01 科大国盾量子技术股份有限公司 Quantum attack resistant electronic signature method and system
CN114697040A (en) * 2020-12-31 2022-07-01 科大国盾量子技术股份有限公司 Electronic signature method and system based on symmetric key
CN114861232A (en) * 2022-03-25 2022-08-05 山东日照发电有限公司 Electronic seal system, electronic seal and electronic signature method
CN114971796A (en) * 2022-05-27 2022-08-30 盐城塔斯科技有限公司 Bidding system based on cloud service platform

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647423A (en) * 2012-04-12 2012-08-22 熊楚渝 Identifying method and system of digital signature and seal
CN103501229A (en) * 2013-09-27 2014-01-08 武钢集团昆明钢铁股份有限公司 Supply chain management-based e-commerce platform safety certification system and method
CN104734851A (en) * 2013-12-24 2015-06-24 卓望数码技术(深圳)有限公司 Electronic seal method and system
CN106936582A (en) * 2015-12-31 2017-07-07 航天信息股份有限公司 Electronic Seal System and method
CN105825446A (en) * 2016-02-23 2016-08-03 济南市天桥区人民法院 Internet jury system
CN108320224A (en) * 2018-01-24 2018-07-24 上海百昌拍卖有限公司 Subject matter auction system and device
CN109510813A (en) * 2018-10-18 2019-03-22 张德辉 A kind of authority checking method and system based on variable two-dimension code
CN110532811A (en) * 2019-08-30 2019-12-03 杭州天谷信息科技有限公司 A kind of PDF signature method and PDF sealing system
CN111641605A (en) * 2020-05-16 2020-09-08 中信银行股份有限公司 Electronic signature method and system based on dynamic password
CN111865606A (en) * 2020-06-11 2020-10-30 天地融科技股份有限公司 Electronic signature log generation method and interactive system
CN114697038A (en) * 2020-12-31 2022-07-01 科大国盾量子技术股份有限公司 Quantum attack resistant electronic signature method and system
CN114697040A (en) * 2020-12-31 2022-07-01 科大国盾量子技术股份有限公司 Electronic signature method and system based on symmetric key
CN113282938A (en) * 2021-06-02 2021-08-20 史珺 Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application
CN113886860A (en) * 2021-12-06 2022-01-04 山东确信信息产业股份有限公司 Electronic data security system and method based on mobile terminal
CN114861232A (en) * 2022-03-25 2022-08-05 山东日照发电有限公司 Electronic seal system, electronic seal and electronic signature method
CN114971796A (en) * 2022-05-27 2022-08-30 盐城塔斯科技有限公司 Bidding system based on cloud service platform

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116545697A (en) * 2023-05-09 2023-08-04 东信和平科技股份有限公司 Electronic signature method, terminal, system and storage medium based on hybrid networking
CN116842909A (en) * 2023-06-12 2023-10-03 广东采华网络科技有限公司 Intelligent signature method and system
CN116842909B (en) * 2023-06-12 2024-06-07 广东采华网络科技有限公司 Intelligent signature method and system

Also Published As

Publication number Publication date
CN115442143B (en) 2023-07-28

Similar Documents

Publication Publication Date Title
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
CN115442143A (en) Electronic signature method, device, equipment and readable medium
EP2908261B1 (en) Method for signing electronic documents with an analog-digital signature with additional verification
US11443382B1 (en) Systems and methods for providing a persistent state
US20180302227A1 (en) Method for generating an electronic signature
US10050958B2 (en) Validating biometrics without special purpose readers
CN108734018B (en) Authentication method, device, system and computer readable storage medium
CN110392041B (en) Electronic authorization method, device, storage equipment and storage medium
CN109560934B (en) Data tamper-proof method and device, computer equipment and storage medium
CN111881483A (en) Resource account binding method, device, equipment and medium based on block chain
CN111210190B (en) File signing method, device, computer equipment and storage medium
CN110555669A (en) electronic certificate, electronic seal and application method and equipment for unified identity authentication
CN111901359B (en) Resource account authorization method, device, system, computer equipment and medium
CN109450872A (en) Method for authenticating user identity, system, storage medium and electronic equipment
WO2024001600A1 (en) Identity verification for non-natural person entity operator
CN114936848A (en) Contract flow management method and storage medium
CN113011962B (en) Resource allocation method and device
CN112307445B (en) Identity management method and device based on block chain
CN111209546A (en) Online multi-person identity authentication method, system and device and identity authentication equipment
CN110675170A (en) Credit-based certificate guarantee method and device
CN111259354A (en) Identity verification method, identity verification device and storage medium
CN111712831A (en) Signature method, system and/or device
CN108282340A (en) A kind of block chain signature machine activation system of formalization
CN109714385B (en) Method and device for uploading files, computer equipment and storage medium
CN112836195B (en) Password modification method and device for enterprise bank authentication medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant