CN115442143B - Electronic signature method, device, equipment and readable medium - Google Patents
Electronic signature method, device, equipment and readable medium Download PDFInfo
- Publication number
- CN115442143B CN115442143B CN202211079494.8A CN202211079494A CN115442143B CN 115442143 B CN115442143 B CN 115442143B CN 202211079494 A CN202211079494 A CN 202211079494A CN 115442143 B CN115442143 B CN 115442143B
- Authority
- CN
- China
- Prior art keywords
- signature
- signing
- client
- authentication
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The application relates to the field of artificial intelligence, and discloses an electronic signature method, an electronic signature device, electronic signature equipment and a readable medium. In the scheme of the application, the terminal can remind the client of carrying out authentication of identity by acquiring the signature request file sent by the client, after the identity passes through authentication, the client sends the signature request file to the signature end, when the signature end receives a request for opening the signature request file, the terminal can remind the user of carrying out authentication of the identity by applying for the terminal, the terminal prompts the signature end of a mode for selecting the signature after passing the authentication, after the signature end finishes using the selected signature mode, the terminal can receive and upload the signature result sent by the signature end, and the client can receive the signature result uploaded by the signature end, thereby solving the problems of low service efficiency and leakage risk caused by adopting a traditional signature mode in the prior art.
Description
Technical Field
The present disclosure relates to the field of artificial intelligence, and in particular, to an electronic signature method, apparatus, device, and readable medium.
Background
Along with the related promulgation of global electronic signature, the digitization process of enterprises is rapidly accelerated, and factors such as how to improve the working efficiency, reduce the social cost, safety and reliability become the business development direction of enterprises.
The contract is used as a principal or an agreement between the principal and the party to set up, change and terminate civil relations, is an effective certificate for definitely signing authority obligations of the principal and the party, is legally protected, and can achieve the purposes of guaranteeing expected benefits, maintaining transaction safety and the like. Therefore, all enterprises or individuals can be involved in signing and managing contracts, all links of enterprise management and operation in each industry are penetrated, and therefore, except for the scene that the division law prescribes that electronic signatures are not allowed to be used, paper of other scenes is possibly replaced by electronic materials, and therefore, the electronic signing has a plurality of potential application scenes and a large potential market space.
The traditional signature mode is adopted by individuals or enterprises to sign through paper contracts, so that the business efficiency is low, the potential safety hazard is large, and the security risks such as illegal tampering, fake making and information leakage can be involved; contracts involve confidential data inside enterprises, and core business secrets are leaked, so that the conventional technology has defects and needs to be improved.
Disclosure of Invention
The main purpose of the present application is to provide an electronic signature method, an electronic signature device, and a readable medium, which are aimed at solving the problems of low service efficiency and leakage risk caused by adopting a traditional signature method.
In order to achieve the above object, the present application proposes an electronic signature method, including:
acquiring a signature request file sent by a client, and prompting the client to perform identity authentication;
if the identity authentication of the client passes, judging whether the client passes the preset level authentication;
if the client passes the preset level authentication, the signature request file is sent to a signature end;
receiving a request of signing the signing request file sent by a signing end, and prompting the signing end to carry out identity authentication;
if the identity authentication of the signing end passes, prompting the signing end to select a preset signing mode for signing;
receiving a signature result of a signature end and uploading the signature result;
receiving a request for opening a signature result sent by a client, and carrying out identity authentication on the client;
and if the client passes the identity authentication, sending a signature result to the client.
Further, the step of prompting the signing end to select a preset signing mode to sign includes:
receiving a signature adding mode request sent by a signature end;
judging which signing end is an individual user or a legal user;
if the signing end is a personal user, prompting the personal user to add a signing mode of the personal signature;
if the signature end is a legal user, prompting the legal user to add a signature mode of the seal.
Further, the step of determining whether the client has passed the preset level authentication includes:
judging whether the client side uploads the front and back photos of the identity card or not;
if the client side uploads the photos of the front side and the back side of the identity card, judging whether the client side performs face real name authentication or not;
and if the client side has performed face real name authentication, judging that the client side has passed the preset level authentication.
Further, before the step of receiving the request for signing the signature request file from the signing end, the method includes:
judging whether the signing end passes the preset grade authentication or not;
if the signing end passes the preset grade authentication, the receiving signing end sends out a request for signing the signing request file.
Further, the identity authentication method comprises the following steps:
identity authentication is carried out by inputting a preset account number and a preset password; or (b)
Identity authentication is carried out in a WeChat authentication mode; or (b)
Identity authentication is carried out by identifying a preset fingerprint or face identification mode; or (b)
And carrying out identity authentication by inputting the mobile phone number to obtain the verification code.
Further, before the step of prompting the signing end to select the preset signing mode to perform signing, the method includes:
judging whether the signature request file sets a fixed position of a signature or not;
if not, the signature is performed according to the position selected by the signature end.
Further, the signature mode of the seal comprises: a saddle stitch chapter, a single page chapter, or a multi-page chapter.
The embodiment of the application also provides an electronic signature device, which comprises:
the acquisition module is used for acquiring a signature request file sent by the client and prompting the client to carry out identity authentication;
the judging module is used for judging whether the client passes the preset grade authentication if the identity authentication of the client passes;
the first sending module is used for sending the signature request file to a signature end if the client passes the preset level authentication;
the receiving prompt module is used for receiving a request for signing the signature request file sent by the signing end and prompting the signing end to carry out identity authentication;
the prompting module is used for prompting the signing end to select a preset signing mode for signing if the identity authentication of the signing end is passed;
the uploading module is used for receiving the signature result of the signature end and uploading the signature result;
the authentication module is used for receiving a request for opening a signature result sent by the client and authenticating the identity of the client;
and the second sending module is used for sending a signature result to the client if the client passes the identity authentication.
The present application also provides a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the methods described above when the computer program is executed by the processor.
The present application also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of any of the above.
According to the electronic signature method, a terminal can obtain a signature request file sent by a client, wherein the client is indicated as a party needing to be signed, the terminal can prompt the client to authenticate the identity by sending a file or contract needing to be signed, after the identity of the client is authenticated, the client is prompted to authenticate the level again, after the level authentication of the client is passed, the personal information of the client is indicated to have no problem, after the level authentication is passed, the current signature request file is sent to the signature end, when the client sends the signature request file to the signature end, after the signature end receives a request for opening, the terminal can prompt the user of the signature end to authenticate the identity, if the identity of the signature end is authenticated, the signature end can prompt the signature end of a mode of selecting the signature, after the signature end is signed by the selected signature mode, the terminal can receive a signature result sent by the signature end and upload, after the level authentication is passed, after the signature end is signed, the signature end is required to be opened again, and the conventional problem is solved, and when the identity is required to be authenticated again, the problem is solved, and the conventional problem is solved.
Drawings
FIG. 1 is a flow chart of an electronic signature method according to an embodiment of the present application;
FIG. 2 is a block diagram schematically illustrating an electronic signature apparatus according to an embodiment of the present application;
fig. 3 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present application.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides an electronic signature method for a flat panel ink screen, including the steps of:
s1, acquiring a signature request file sent by a client, and prompting the client to perform identity authentication;
s2, if the identity authentication of the client passes, judging whether the client passes the preset level authentication;
s3, if the client passes the preset level authentication, the signature request file is sent to a signature end;
s4, the receiving signing end sends out a request for signing the signing request file, and prompts the signing end to conduct identity authentication;
s5, if the identity authentication of the signing end is passed, prompting the signing end to select a preset signing mode for signing;
s6, receiving a signature result of the signature end, and uploading the signature result;
s7, receiving a request for opening a signature result sent by the client, and performing identity authentication on the client;
and S8, if the client passes the identity authentication, sending a signature result to the client.
As described in the steps S1 and S2, the terminal may obtain the signature request file sent by the client, where the client is indicated as the party needing to be signed, and send the file or the contract needing to be signed to upload, where the terminal will remind the client of authentication of the identity, and pass the authentication of the identity of the client, where the main function of verifying the identity is to enable the client to pass the relevant account number of the authenticated user, where the account number may log in through a WeChat or a mobile phone number, etc., so that the security of the signature is ensured, and after the identity of the client passes the authentication, the client is prompted to perform level authentication, where the level authentication is detailed information of the authenticated client, such as shooting authentication or facial recognition of an identity card, so that both parties are signed more securely.
As described in the above steps S3-S4, when the level authentication of the client passes, it indicates that the personal information of the client has no problem, when the client passes the level authentication and then logs in next time, the client only needs to pass the identity authentication to prove that the client account number is the same, after the level authentication passes, the signature request file of this time is sent to the signature end, when the signature end receives the request of opening after the client sends the signature request file to the signature end, the signature end will need to apply for the request of opening the signature request file to the terminal, and the terminal will remind the user of authenticating the identity of the signature end, thereby authenticating whether the signature end is the same as the user.
As described in the above steps S5-S8, if the identity of the signing terminal has been authenticated, the signing terminal may be prompted to select the signing method by signing and sealing, or select other methods, after the signing terminal completes signing by using the selected signing method, the terminal will receive the signing result sent by the signing terminal, where the signing result may be that the signing passes or the signing does not pass, and the terminal uploads the signing result, the client will receive the signing result uploaded by the signing terminal, when the client needs to open the signing result, authentication of the identity needs to be performed again, and when the identity of the client needs to pass again, the client can receive the signing result this time, and if the downloading can save the file downloaded into pdf to the local place, the client can receive the signing result this time.
According to the electronic signature method, a terminal can obtain a signature request file sent by a client, wherein the client is indicated as a party needing to be signed, the terminal can prompt the client to authenticate the identity by sending a file or contract needing to be signed, after the identity of the client is authenticated, the client is prompted to authenticate the level again, after the level authentication of the client is passed, the personal information of the client is indicated to have no problem, after the level authentication is passed, the current signature request file is sent to the signature end, when the client sends the signature request file to the signature end, after the signature end receives a request for opening, the terminal can prompt the user of the signature end to authenticate the identity, if the identity of the signature end is authenticated, the signature end can prompt the signature end of a mode of selecting the signature, after the signature end is signed by the selected signature mode, the terminal can receive a signature result sent by the signature end and upload, after the level authentication is passed, after the signature end is signed, the signature end is required to be opened again, and the conventional problem is solved, and when the identity is required to be authenticated again, the problem is solved, and the conventional problem is solved.
Further, the step of prompting the signing end to select a preset signing mode to sign includes:
s201, receiving a signature adding mode request sent by a signature end;
s202, judging whether the signature end is an individual user or a legal user;
s203, if the signature end is a personal user, prompting the personal user to add a signature mode of the personal signature;
s204, if the signature end is a legal user, prompting the legal user to add a signature mode of the seal.
As described in the above steps, in the step of selecting a preset signature mode at the prompting signing end for signing, the terminal needs to remind the signing end of adding the signature mode, the signature mode includes a personal signature and a legal signature, the legal signature mode is adding the signature, and related company data of a company needs to be uploaded, and if the signature mode is the personal signature, the personal signature mode is the signature.
In another embodiment, if the signature end is a legal person, a sponsor can be added, and the signature of this time is processed by setting a designated sponsor, so that the efficiency of the signature is improved, and the sponsor can also display the name information of the signature of this time.
Further, the step of determining whether the client has passed the preset level authentication includes:
s301, judging whether the client side uploads the front and back photos of the identity card or not;
s302, if the client side uploads the photos of the front side and the back side of the identity card, judging whether the client side performs face real-name authentication or not;
s303, if the client side has performed face real name authentication, judging that the client side has passed the preset level authentication.
In the step described above, in the step of determining the level authentication of the client, it is required to authenticate whether the photographing treatment of the identity card of the client has been uploaded, if the identity card data has been uploaded, it is required to further perform face recognition recording real name authentication on the client, if the face real name authentication has passed, it is determined that the client has passed the preset level restriction, and by setting the level authentication, the security of signature is improved, so as to prevent the leakage of the signature of this time.
Further, before the step of receiving the request for signing the signature request file from the signing end, the method includes:
s401, judging whether the signature end passes the preset level authentication;
s402, if the signing end passes the preset level authentication, the receiving signing end sends out a request for signing the signing request file.
Before receiving the request of signing the signature request file from the signing end, the signing end needs to judge whether the signature end passes the level authentication so as to save the security of the signature, if the level authentication of the signing end is also passed, the terminal will receive the signature request of the signature request file from the signing section, and by setting the level authentication at the client and the signing end, the signing can be performed after the two parties have set the related data, thereby improving the security of the signature and preventing illegal molecules from stealing the signature content.
Further, the identity authentication method includes:
s501, identity authentication is carried out by inputting a preset account number and a preset password; or (b)
S502, identity authentication is carried out in a WeChat authentication mode; or (b)
S503, performing identity authentication by recognizing a preset fingerprint or face recognition mode; or (b)
S504, identity authentication is carried out by inputting a mobile phone number to obtain an authentication code.
In the above steps, the identity authentication method includes that the identity authentication is realized by logging in a mode of setting an account number password, and the identity authentication method can log in a related personal account number and a related personal information end according to the preset account number password; the method comprises a WeChat authentication login mode, and logging in a related account of the user according to an authorization mode of WeChat so as to realize identity authentication; the method comprises the steps of logging in identity information of a person in a preset fingerprint mode or directly through a face recognition mode; the method comprises the step of inputting the mobile phone number to acquire the verification code to verify identity information authentication of the user.
Further, before the step of prompting the signing end to select the preset signing mode to perform signing, the method includes:
s601, judging whether the signature request file sets a fixed position of a signature or not;
s602, if not, signing is carried out according to the position selected by the signing end.
As described above, before the prompting signing end selects the preset signing mode to sign, it needs to determine whether the fixed signing position is set in the signing request file sent by the client end, because some contract client ends need signing at the fixed position, the fixed position needs to be set to prompt the signing end to sign at the fixed position, the terminal can set a virtual dotted line to prompt the signing end or use a box to frame the position needing signing, if the client end does not set the fixed signing position, the signing end can sign according to the position considered suitable by itself.
Further, the seal signing mode of the seal comprises: a saddle stitch chapter, a single page chapter, or a multi-page chapter.
As described above, in the signature mode of the seal, since the contract has a signature mode of a plurality of pages or different demands, the seal can be set according to different demands of users, the seal can be sealed on a single page or a plurality of pages.
It should be noted that, the signature mode of adding the personal signature can also be performed by a multi-page signature or a single-page signature or a seam riding mode so as to ensure that the signature meets the own needs.
Referring to fig. 2, an electronic signature apparatus is further provided in an embodiment of the present application, including:
the acquisition module is used for acquiring a signature request file sent by the client and prompting the client to carry out identity authentication;
the judging module is used for judging whether the client passes the preset grade authentication if the identity authentication of the client passes;
the first sending module is used for sending the signature request file to a signature end if the client passes the preset level authentication;
the receiving prompt module is used for receiving a request for signing the signature request file sent by the signing end and prompting the signing end to carry out identity authentication;
the prompting module is used for prompting the signing end to select a preset signing mode for signing if the identity authentication of the signing end is passed;
the uploading module is used for receiving the signature result of the signature end and uploading the signature result;
the authentication module is used for receiving a request for opening a signature result sent by the client and authenticating the identity of the client;
and the second sending module is used for sending a signature result to the client if the client passes the identity authentication.
As described above, it may be understood that each component for the electronic signature device set forth in the present application may implement the function of any one of the electronic signature methods described above, and the specific structure is not described herein.
Referring to fig. 3, a computer device is further provided in the embodiment of the present application, where the computer device may be a server, and the internal structure of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for data such as question and answer data in a corpus. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an electronic signature method.
The processor executes the electronic signature method, which comprises the following steps: acquiring a signature request file sent by a client, and prompting the client to perform identity authentication; if the identity authentication of the client passes, judging whether the client passes the preset level authentication; if the client passes the preset level authentication, the signature request file is sent to a signature end; receiving a request of signing the signing request file sent by a signing end, and prompting the signing end to carry out identity authentication; if the identity authentication of the signing end passes, prompting the signing end to select a preset signing mode for signing; receiving a signature result of a signature end and uploading the signature result; receiving a request for opening a signature result sent by a client, and carrying out identity authentication on the client; and if the client passes the identity authentication, sending a signature result to the client.
An embodiment of the present application further provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements an electronic signature method, comprising the steps of: acquiring a signature request file sent by a client, and prompting the client to perform identity authentication; if the identity authentication of the client passes, judging whether the client passes the preset level authentication; if the client passes the preset level authentication, the signature request file is sent to a signature end; receiving a request of signing the signing request file sent by a signing end, and prompting the signing end to carry out identity authentication; if the identity authentication of the signing end passes, prompting the signing end to select a preset signing mode for signing; receiving a signature result of a signature end and uploading the signature result; receiving a request for opening a signature result sent by a client, and carrying out identity authentication on the client; and if the client passes the identity authentication, sending a signature result to the client.
According to the electronic signature method, the terminal can acquire the signature request file sent by the client, wherein the client is indicated as a party needing to be signed, the terminal can prompt the client to authenticate the identity by sending the file or contract needing to be signed, after the identity of the client is authenticated, the terminal is prompted to authenticate the client in a grading manner, after the authentication of the grade of the client is passed, the personal information of the client is indicated to have no problem, after the authentication of the grade is passed, the current signature request file is sent to the signature end, when the client sends the signature request file to the signature end, after the signature end receives a request for opening, the terminal can prompt the user of the signature end to authenticate the identity, if the identity of the signature end is authenticated, the signature end can prompt the signature end to select a signature mode, after the signature end is signed in the selected mode, the terminal can receive the signature result of the received from the signature end and upload, after the signature end is authenticated, the current efficiency is low, and when the signature end is required to be opened, the conventional problem is solved, and the current problem is solved.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.
Claims (10)
1. An electronic signature method, comprising:
acquiring a signature request file sent by a client, and prompting the client to perform identity authentication;
if the identity authentication of the client passes, judging whether the client passes the preset level authentication;
if the client passes the preset level authentication, the signature request file is sent to a signature end;
receiving a request of signing the signing request file sent by a signing end, and prompting the signing end to carry out identity authentication;
if the identity authentication of the signing end passes, prompting the signing end to select a preset signing mode for signing;
receiving a signature result of a signature end and uploading the signature result;
receiving a request for opening a signature result sent by a client, and carrying out identity authentication on the client again;
and when the identity verification of the client passes again, sending a signature result to the client.
2. The electronic signature method as set forth in claim 1, wherein the step of prompting the signature end to select a preset signature mode for signature includes:
receiving a signature adding mode request sent by a signature end;
judging which signing end is an individual user or a legal user;
if the signing end is a personal user, prompting the personal user to add a signing mode of the personal signature;
if the signature end is a legal user, prompting the legal user to add a signature mode of the seal.
3. The electronic signature method as recited in claim 1, wherein the step of determining whether the client has passed the preset level authentication includes:
judging whether the client side uploads the front and back photos of the identity card or not;
if the client side uploads the photos of the front side and the back side of the identity card, judging whether the client side performs face real name authentication or not;
and if the client side has performed face real name authentication, judging that the client side has passed the preset level authentication.
4. The electronic signature method as recited in claim 1, wherein before the step of receiving a request for signing the signature request file from a signing end, the method comprises:
judging whether the signing end passes the preset grade authentication or not;
if the signing end passes the preset grade authentication, the receiving signing end sends out a request for signing the signing request file.
5. The electronic signature method as recited in claim 1, wherein the means for authenticating the identity comprises:
identity authentication is carried out by inputting a preset account number and a preset password; or (b)
Identity authentication is carried out in a WeChat authentication mode; or (b)
Identity authentication is carried out by identifying a preset fingerprint or face identification mode; or (b)
And carrying out identity authentication by inputting the mobile phone number to obtain the verification code.
6. The method of claim 1, wherein before the step of prompting the signing end to select a preset signing mode for signing, the method comprises:
judging whether the signature request file sets a fixed position of a signature or not;
if not, the signature is performed according to the position selected by the signature end.
7. The electronic signature method as recited in claim 2, wherein the signature manner of the seal comprises: a saddle stitch chapter, a single page chapter, or a multi-page chapter.
8. An electronic signature device, comprising:
the acquisition module is used for acquiring a signature request file sent by the client and prompting the client to carry out identity authentication;
the judging module is used for judging whether the client passes the preset grade authentication if the identity authentication of the client passes;
the first sending module is used for sending the signature request file to a signature end if the client passes the preset level authentication;
the receiving prompt module is used for receiving a request for signing the signature request file sent by the signing end and prompting the signing end to carry out identity authentication;
the prompting module is used for prompting the signing end to select a preset signing mode for signing if the identity authentication of the signing end is passed;
the uploading module is used for receiving the signature result of the signature end and uploading the signature result;
the authentication module is used for receiving a request for opening a signature result sent by the client and authenticating the identity of the client;
the second sending module performs identity authentication on the client again; and when the identity verification of the client passes again, sending a signature result to the client.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the electronic signature method of any one of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the electronic signature method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211079494.8A CN115442143B (en) | 2022-09-05 | 2022-09-05 | Electronic signature method, device, equipment and readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211079494.8A CN115442143B (en) | 2022-09-05 | 2022-09-05 | Electronic signature method, device, equipment and readable medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115442143A CN115442143A (en) | 2022-12-06 |
CN115442143B true CN115442143B (en) | 2023-07-28 |
Family
ID=84248047
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211079494.8A Active CN115442143B (en) | 2022-09-05 | 2022-09-05 | Electronic signature method, device, equipment and readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115442143B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116545697B (en) * | 2023-05-09 | 2024-07-23 | 东信和平科技股份有限公司 | Electronic signature method, terminal, system and storage medium based on hybrid networking |
CN116842909B (en) * | 2023-06-12 | 2024-06-07 | 广东采华网络科技有限公司 | Intelligent signature method and system |
CN118606920B (en) * | 2024-08-07 | 2024-12-24 | 支付宝(杭州)信息技术有限公司 | Transaction processing method, device, storage medium and electronic device |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103501229A (en) * | 2013-09-27 | 2014-01-08 | 武钢集团昆明钢铁股份有限公司 | Supply chain management-based e-commerce platform safety certification system and method |
CN105825446A (en) * | 2016-02-23 | 2016-08-03 | 济南市天桥区人民法院 | Internet jury system |
CN106936582A (en) * | 2015-12-31 | 2017-07-07 | 航天信息股份有限公司 | Electronic Seal System and method |
CN108320224A (en) * | 2018-01-24 | 2018-07-24 | 上海百昌拍卖有限公司 | Subject matter auction system and device |
CN109510813A (en) * | 2018-10-18 | 2019-03-22 | 张德辉 | A kind of authority checking method and system based on variable two-dimension code |
CN110532811A (en) * | 2019-08-30 | 2019-12-03 | 杭州天谷信息科技有限公司 | A kind of PDF signature method and PDF sealing system |
CN111865606A (en) * | 2020-06-11 | 2020-10-30 | 天地融科技股份有限公司 | Electronic signature log generation method and interactive system |
CN113282938A (en) * | 2021-06-02 | 2021-08-20 | 史珺 | Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application |
CN113886860A (en) * | 2021-12-06 | 2022-01-04 | 山东确信信息产业股份有限公司 | Electronic data security system and method based on mobile terminal |
CN114697040A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Electronic signature method and system based on symmetric key |
CN114861232A (en) * | 2022-03-25 | 2022-08-05 | 山东日照发电有限公司 | Electronic seal system, electronic seal and electronic signature method |
CN114971796A (en) * | 2022-05-27 | 2022-08-30 | 盐城塔斯科技有限公司 | Bidding system based on cloud service platform |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102647423B (en) * | 2012-04-12 | 2016-04-06 | 熊楚渝 | The discrimination method of a kind of digital signature and seal and system |
CN104734851A (en) * | 2013-12-24 | 2015-06-24 | 卓望数码技术(深圳)有限公司 | Electronic seal method and system |
CN111641605B (en) * | 2020-05-16 | 2022-04-15 | 中信银行股份有限公司 | Electronic signature method and system based on dynamic password |
-
2022
- 2022-09-05 CN CN202211079494.8A patent/CN115442143B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103501229A (en) * | 2013-09-27 | 2014-01-08 | 武钢集团昆明钢铁股份有限公司 | Supply chain management-based e-commerce platform safety certification system and method |
CN106936582A (en) * | 2015-12-31 | 2017-07-07 | 航天信息股份有限公司 | Electronic Seal System and method |
CN105825446A (en) * | 2016-02-23 | 2016-08-03 | 济南市天桥区人民法院 | Internet jury system |
CN108320224A (en) * | 2018-01-24 | 2018-07-24 | 上海百昌拍卖有限公司 | Subject matter auction system and device |
CN109510813A (en) * | 2018-10-18 | 2019-03-22 | 张德辉 | A kind of authority checking method and system based on variable two-dimension code |
CN110532811A (en) * | 2019-08-30 | 2019-12-03 | 杭州天谷信息科技有限公司 | A kind of PDF signature method and PDF sealing system |
CN111865606A (en) * | 2020-06-11 | 2020-10-30 | 天地融科技股份有限公司 | Electronic signature log generation method and interactive system |
CN114697040A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Electronic signature method and system based on symmetric key |
CN113282938A (en) * | 2021-06-02 | 2021-08-20 | 史珺 | Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application |
CN113886860A (en) * | 2021-12-06 | 2022-01-04 | 山东确信信息产业股份有限公司 | Electronic data security system and method based on mobile terminal |
CN114861232A (en) * | 2022-03-25 | 2022-08-05 | 山东日照发电有限公司 | Electronic seal system, electronic seal and electronic signature method |
CN114971796A (en) * | 2022-05-27 | 2022-08-30 | 盐城塔斯科技有限公司 | Bidding system based on cloud service platform |
Also Published As
Publication number | Publication date |
---|---|
CN115442143A (en) | 2022-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115442143B (en) | Electronic signature method, device, equipment and readable medium | |
JP7187532B2 (en) | System and method for concluding and delivering electronic documents | |
CN109784922B (en) | Electronic contract signing method, electronic contract signing device, computer equipment and storage medium | |
US20210166241A1 (en) | Methods, apparatuses, storage mediums and terminal devices for authentication | |
EP2908261B1 (en) | Method for signing electronic documents with an analog-digital signature with additional verification | |
CN105591744B (en) | A kind of genuine cyber identification authentication method and system | |
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
EP2924604A1 (en) | Electronic biometric (dynamic) signature references enrollment method | |
US11443382B1 (en) | Systems and methods for providing a persistent state | |
CN108734018B (en) | Authentication method, device, system and computer readable storage medium | |
CN112632581A (en) | User data processing method and device, computer equipment and storage medium | |
CN107395359B (en) | Electronic data evidence fixing method, terminal and system | |
WO2015088986A1 (en) | System and method for high trust cloud digital signing and workflow automation in health sciences | |
CN111542824A (en) | System and method for automatic online notarization conference recovery | |
CN111210190B (en) | File signing method, device, computer equipment and storage medium | |
CN108388813A (en) | Electronic endorsement method, user equipment, storage medium and device | |
CN114238874A (en) | Digital signature verification method and device, computer equipment and storage medium | |
CN112989380A (en) | Resource exchange processing method, device, equipment and storage medium | |
CN111901359B (en) | Resource account authorization method, device, system, computer equipment and medium | |
US20200210611A1 (en) | Hardware safe for protecting sensitive data with controlled external access | |
CN115426203B (en) | Industrial firewall and protection method thereof | |
CN111652720A (en) | Cloud evidence obtaining method and device, computer equipment and storage medium | |
CN114900312B (en) | Identity credential endorsement generation and verification method for protecting privacy | |
US20230130024A1 (en) | System and method for storing encryption keys for processing a secured transaction on a blockchain | |
CN113011962B (en) | Resource allocation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |