CN115482131A - An electronic contract signing method, system, terminal device and readable storage medium - Google Patents

An electronic contract signing method, system, terminal device and readable storage medium Download PDF

Info

Publication number
CN115482131A
CN115482131A CN202211041883.1A CN202211041883A CN115482131A CN 115482131 A CN115482131 A CN 115482131A CN 202211041883 A CN202211041883 A CN 202211041883A CN 115482131 A CN115482131 A CN 115482131A
Authority
CN
China
Prior art keywords
enterprise
contract
key
certificate
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211041883.1A
Other languages
Chinese (zh)
Other versions
CN115482131B (en
Inventor
梅臻
展召磊
李琳
周祥龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Zhixin Certification Service Co ltd
Original Assignee
Shandong Zhixin Certification Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Zhixin Certification Service Co ltd filed Critical Shandong Zhixin Certification Service Co ltd
Priority to CN202211041883.1A priority Critical patent/CN115482131B/en
Publication of CN115482131A publication Critical patent/CN115482131A/en
Application granted granted Critical
Publication of CN115482131B publication Critical patent/CN115482131B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Technology Law (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请提供了一种电子合同签订方法、系统、终端设备及可读存储介质。所述方法包括:接收第一用户选择的第一目标个人私钥,第一用户为第一企业的成员;根据第一目标个人私钥对合同原文进行签名,得到第一盖章合同,第一盖章合同包括合同原文及对应的第一数字签名;根据第二企业的第二合同密钥对第一盖章合同进行加密,得到第一加密合同;向第二企业系统发送第一加密合同及对应的第一企业证书。本申请能够在合同中录入盖章人员信息,为后续查找盖章人员信息提供基础;也能够实现对外显示的是企业的同时合同相对方也能验证数字签名,使得合同相对方无法获取盖章人员信息下也能通过第一证书验证数字签名,提高信息保密性。

Figure 202211041883

The application provides an electronic contract signing method, system, terminal equipment and readable storage medium. The method includes: receiving the first target personal private key selected by the first user, the first user is a member of the first enterprise; signing the original contract according to the first target personal private key to obtain the first sealed contract, the first The sealed contract includes the original text of the contract and the corresponding first digital signature; the first sealed contract is encrypted according to the second contract key of the second enterprise to obtain the first encrypted contract; the first encrypted contract and the first encrypted contract are sent to the second enterprise system The corresponding first enterprise certificate. This application can enter the information of the person who stamped the seal in the contract, providing a basis for subsequent search for the information of the stamped personnel; it can also realize that the company is displayed externally, and the counterparty of the contract can also verify the digital signature, so that the counterparty of the contract cannot obtain the stamped personnel Under the information, the digital signature can also be verified by the first certificate to improve the confidentiality of the information.

Figure 202211041883

Description

一种电子合同签订方法、系统、终端设备及可读存储介质An electronic contract signing method, system, terminal device and readable storage medium

技术领域technical field

本申请属于电子合同技术领域,尤其涉及一种电子合同签订方法、系统、终端设备及可读存储介质。The application belongs to the technical field of electronic contracts, and in particular relates to an electronic contract signing method, system, terminal equipment and readable storage medium.

背景技术Background technique

目前,电子合同的流转流程为合同发起方起草、审批后,使用企业电子印章完成盖章,向合同相对方发送电子合同;合同相对方接收电子合同进行审批,审批好后使用企业电子印章完成盖章,再流转至合同发起方,完成合同签订。At present, the circulation process of electronic contracts is that after the contract initiator drafts and approves the contract, he uses the corporate electronic seal to complete the seal, and sends the electronic contract to the counterparty of the contract; the contract counterparty receives the electronic contract for approval, and uses the corporate electronic seal to complete the seal after approval Chapter, and then transferred to the contract initiator to complete the contract signing.

因盖章人员使用的是企业电子印章,且涉及保密需求,电子合同中不会涉及盖章人员的个人信息。若出现纠纷难以追溯盖章人员。Since the person who affixes the seal uses the electronic seal of the enterprise and involves confidentiality requirements, the personal information of the person who affixes the seal will not be involved in the electronic contract. If there is a dispute, it is difficult to trace the person who stamped the seal.

发明内容Contents of the invention

本申请实施例提供了一种电子合同签订方法、系统、终端设备及可读存储介质,可以解决难以追溯盖章人员的问题。The embodiment of the present application provides a method and system for signing an electronic contract, a terminal device and a readable storage medium, which can solve the problem that it is difficult to trace the person who stamped the seal.

第一方面,本申请实施例提供了一种电子合同签订方法,应用于第一企业系统,包括:In the first aspect, the embodiment of the present application provides a method for signing an electronic contract, which is applied to the first enterprise system, including:

接收第一用户选择的第一目标个人私钥,所述第一用户为第一企业的成员;receiving a first target personal private key selected by a first user who is a member of a first enterprise;

根据所述第一目标个人私钥对合同原文进行签名,得到第一盖章合同,所述第一盖章合同包括所述合同原文及对应的第一数字签名;Sign the original text of the contract according to the first target personal private key to obtain a first sealed contract, and the first sealed contract includes the original text of the contract and the corresponding first digital signature;

根据第二企业的第二合同密钥对所述第一盖章合同进行加密,得到第一加密合同;Encrypting the first sealed contract according to the second contract key of the second enterprise to obtain the first encrypted contract;

向所述第二企业系统发送所述第一加密合同及对应的第一企业证书;sending the first encrypted contract and corresponding first enterprise certificate to the second enterprise system;

其中,所述第一企业系统为所述第一企业用于签订电子合同的系统,第一目标个人私钥是根据所述第一企业的第一企业密钥生成,所述第一企业证书是根据所述第一企业密钥及所述第一企业的信息生成,所述第二企业系统为所述第二企业用于签订电子合同的系统。Wherein, the first enterprise system is a system used by the first enterprise to sign an electronic contract, the first target personal private key is generated according to the first enterprise key of the first enterprise, and the first enterprise certificate is Generated according to the key of the first enterprise and the information of the first enterprise, the system of the second enterprise is a system used by the second enterprise to sign an electronic contract.

可选的,所述根据所述第一目标个人密钥对合同原文进行签名,得到第一盖章合同之后,还包括:Optionally, after signing the original contract according to the first target personal key, after obtaining the first sealed contract, it also includes:

接收第二用户输入的查询指令,响应于所述查询指令,获取所述第一数字签名,所述第二用户为所述第一企业的成员;receiving a query instruction input by a second user, and obtaining the first digital signature in response to the query instruction, the second user being a member of the first enterprise;

根据各第一个人证书中的第一个人公钥对所述第一数字签名进行追踪,在第一个人证书集中查找第一目标个人证书,所述第一目标个人证书中的第一目标个人公钥与所述第一目标个人私钥为一对密钥对;Track the first digital signature according to the first personal public key in each first personal certificate, search for the first target personal certificate in the first personal certificate set, and the first target personal certificate in the first personal certificate The target personal public key and the first target personal private key are a key pair;

显示所述第一目标个人证书中的第一目标使用者信息;displaying the first target user information in the first target personal certificate;

其中,所述第一个人证书是根据所述第一个人公钥及第一使用者信息生成,所述第一个人公钥是根据所述第一企业密钥生成,且与所述第一个人私钥属一对密钥对。Wherein, the first personal certificate is generated according to the first personal public key and the first user information, the first personal public key is generated according to the first enterprise key, and is related to the The first personal private key is a pair of key pairs.

可选的,所述第二合同密钥为所述第二企业的标识信息。Optionally, the second contract key is identification information of the second enterprise.

可选的,所述向所述第二企业系统发送所述第一加密合同及对应的第一企业证书之后,还包括:Optionally, after sending the first encryption contract and the corresponding first enterprise certificate to the second enterprise system, further include:

接收来自所述第二企业系统的第二加密合同及对应的第二企业证书;receiving a second encrypted contract and a corresponding second enterprise certificate from the second enterprise system;

根据第一合同密钥对所述第二加密合同进行解密,得到第二盖章合同,所述第二盖章合同包括所述合同原文及对应的第一数字签名、第二数字签名,所述第二数字签名为通过所述第二企业对所述合同原文进行签名得到;Decrypt the second encrypted contract according to the first contract key to obtain the second sealed contract, the second sealed contract includes the original text of the contract and the corresponding first digital signature and the second digital signature, the The second digital signature is obtained by the second enterprise signing the original text of the contract;

根据所述第二企业证书中的所述第二企业密钥及所述合同原文,对所述第二数字签名进行验签;verifying the second digital signature according to the second enterprise key in the second enterprise certificate and the original text of the contract;

若验证所述第二数字签名通过,则保存所述第二盖章合同;If the verification of the second digital signature is passed, the second sealed contract is saved;

其中,所述第一合同密钥为所述第一企业的标识信息。Wherein, the first contract key is the identification information of the first enterprise.

可选的,所述接收来自所述第二企业的第二加密合同及对应的第二企业证书之后,还包括:Optionally, after receiving the second encryption contract and the corresponding second enterprise certificate from the second enterprise, the method further includes:

根据所述第二企业证书中所述第二企业的信息,验证所述第二企业的身份;verifying the identity of the second enterprise according to the information of the second enterprise in the second enterprise certificate;

若验证身份通过,则进入步骤:根据第一合同密钥对所述第二加密合同进行解密,得到第二盖章合同。If the identity verification is passed, enter the step of: decrypting the second encrypted contract according to the first contract key to obtain the second sealed contract.

可选的,所述接收第一用户选择的第一目标个人私钥之前,还包括:Optionally, before receiving the first target personal private key selected by the first user, it also includes:

接收并存储认证中心生成的第一企业证书和至少一个第一个人私钥及对应的第一个人证书;Receive and store the first enterprise certificate and at least one first personal private key and corresponding first personal certificate generated by the certification authority;

其中,所述第一个人私钥是根据所述第一企业密钥生成,各所述第一个人私钥之间均不相同,各所述第一个人证书之间均不相同。Wherein, the first personal private key is generated according to the first enterprise key, each of the first personal private keys is different, and each of the first personal certificates is different.

第二方面,本申请实施例提供了一种电子合同签订方法,应用于第二企业系统,包括:In the second aspect, the embodiment of the present application provides a method for signing an electronic contract, which is applied to the second enterprise system, including:

接收来自第一企业系统的第一加密合同及对应的第一企业证书;receiving a first encrypted contract and a corresponding first enterprise certificate from the first enterprise system;

通过第二合同密钥对所述第一加密合同进行解密,得到第一盖章合同,所述第一盖章合同包括合同原文及对应的第一数字签名;Deciphering the first encrypted contract through the second contract key to obtain a first sealed contract, the first sealed contract includes the original text of the contract and the corresponding first digital signature;

根据所述第一企业证书中的所述第一企业密钥及所述合同原文,对所述第一数字签名进行验签;Verifying the first digital signature according to the first enterprise key in the first enterprise certificate and the original contract;

若验证所述第一数字签名通过,则接收第三用户选择的第二目标个人私钥,所述第三用户为第二企业的成员;If the verification of the first digital signature is passed, the second target personal private key selected by the third user is received, and the third user is a member of the second enterprise;

根据所述第二目标个人私钥对所述合同原文进行签名,得到第二盖章合同,所述第二盖章合同包括所述合同原文及对应的第一数字签名、第二数字签名;Sign the original text of the contract according to the second target personal private key to obtain a second sealed contract, and the second sealed contract includes the original text of the contract and the corresponding first digital signature and the second digital signature;

根据所述第一企业的第一合同密钥对所述第二盖章合同进行加密,得到第二加密合同;Encrypting the second sealed contract according to the first contract key of the first enterprise to obtain a second encrypted contract;

向所述第一企业系统发送所述第二加密合同及对应的第二企业证书;sending the second encrypted contract and corresponding second enterprise certificate to the first enterprise system;

其中,所述第二企业系统为所述第二企业用于签订电子合同的系统,第二目标个人私钥是根据所述第二企业的第二企业密钥生成,所述第二企业证书是根据所述第二企业密钥及所述第二企业的信息生成,所述第一企业系统为所述第一企业用于签订电子合同的系统。Wherein, the second enterprise system is the system used by the second enterprise to sign electronic contracts, the second target personal private key is generated according to the second enterprise key of the second enterprise, and the second enterprise certificate is Generated according to the second enterprise key and the information of the second enterprise, the first enterprise system is a system used by the first enterprise to sign an electronic contract.

第三方面,本申请实施例提供了一种电子合同签订系统,包括第一企业系统及第二企业系统;In the third aspect, the embodiment of the present application provides an electronic contract signing system, including a first enterprise system and a second enterprise system;

所述第一企业系统,用于接收第一用户选择的第一目标个人私钥,所述第一用户为第一企业的成员;The first enterprise system is configured to receive a first target personal private key selected by a first user, where the first user is a member of the first enterprise;

根据所述第一目标个人私钥对合同原文进行签名,得到第一盖章合同,所述第一盖章合同包括所述合同原文及对应的第一数字签名;Sign the original text of the contract according to the first target personal private key to obtain a first sealed contract, and the first sealed contract includes the original text of the contract and the corresponding first digital signature;

根据第二企业的第二合同密钥对所述第一盖章合同进行加密,得到第一加密合同;Encrypting the first sealed contract according to the second contract key of the second enterprise to obtain the first encrypted contract;

向所述第二企业系统发送所述第一加密合同及对应的第一企业证书;sending the first encrypted contract and corresponding first enterprise certificate to the second enterprise system;

所述第二企业系统,用于接收来自所述第一企业系统的第一加密合同及对应的第一企业证书;the second enterprise system is configured to receive a first encrypted contract and a corresponding first enterprise certificate from the first enterprise system;

通过第二合同密钥对所述第一加密合同进行解密,得到第一盖章合同,所述第一盖章合同包括合同原文及对应的第一数字签名;Deciphering the first encrypted contract through the second contract key to obtain a first sealed contract, the first sealed contract includes the original text of the contract and the corresponding first digital signature;

根据所述第一企业证书中的所述第一企业密钥及所述合同原文,对所述第一数字签名进行验签;Verifying the first digital signature according to the first enterprise key in the first enterprise certificate and the original contract;

若验证所述第一数字签名通过,则接收第三用户选择的第二目标个人私钥,所述第三用户为第二企业的成员;If the verification of the first digital signature is passed, the second target personal private key selected by the third user is received, and the third user is a member of the second enterprise;

根据所述第二目标个人私钥对所述合同原文进行签名,得到第二盖章合同,所述第二盖章合同包括所述合同原文及对应的第一数字签名、第二数字签名;Sign the original text of the contract according to the second target personal private key to obtain a second sealed contract, and the second sealed contract includes the original text of the contract and the corresponding first digital signature and the second digital signature;

根据所述第一企业的第一合同密钥对所述第二盖章合同进行加密,得到第二加密合同;Encrypting the second sealed contract according to the first contract key of the first enterprise to obtain a second encrypted contract;

向所述第一企业系统发送所述第二加密合同及对应的第二企业证书;sending the second encrypted contract and corresponding second enterprise certificate to the first enterprise system;

其中,所述第一企业系统为所述第一企业用于签订电子合同的系统,第一目标个人私钥是根据所述第一企业的第一企业密钥生成,所述第一企业证书是根据所述第一企业密钥及所述第一企业的信息生成,所述第二企业系统为所述第二企业用于签订电子合同的系统,第二目标个人私钥是根据所述第二企业的第二企业密钥生成,所述第二企业证书是根据所述第二企业密钥及所述第二企业的信息生成。Wherein, the first enterprise system is a system used by the first enterprise to sign an electronic contract, the first target personal private key is generated according to the first enterprise key of the first enterprise, and the first enterprise certificate is Generated according to the key of the first enterprise and the information of the first enterprise, the system of the second enterprise is the system used by the second enterprise to sign electronic contracts, and the second target personal private key is generated according to the second A second enterprise key of the enterprise is generated, and the second enterprise certificate is generated according to the second enterprise key and the information of the second enterprise.

第四方面,本申请实施例提供了一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如上述第一方面或第二方面中任一项所述的方法。In a fourth aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and operable on the processor, when the processor executes the computer program The method described in any one of the first aspect or the second aspect is realized.

第五方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如上述第一方面或第二方面中任一项所述的方法。In the fifth aspect, the embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the above-mentioned first or second aspect can be implemented. any one of the methods described.

第六方面,本申请实施例提供了一种计算机程序产品,当计算机程序产品在终端设备上运行时,使得终端设备执行上述第一方面或第二方面中任一项所述的方法。In a sixth aspect, an embodiment of the present application provides a computer program product, which, when the computer program product is run on a terminal device, enables the terminal device to execute the method described in any one of the above-mentioned first aspect or the second aspect.

可以理解的是,上述第二方面至第六方面的有益效果可以参见上述第一方面中的相关描述,在此不再赘述。It can be understood that, for the beneficial effects of the above-mentioned second aspect to the sixth aspect, reference can be made to the related description in the above-mentioned first aspect, which will not be repeated here.

本申请实施例与现有技术相比存在的有益效果是:Compared with the prior art, the embodiments of the present application have the following beneficial effects:

本实施例通过接收第一用户选择的第一目标个人私钥,根据第一目标个人私钥对合同原文进行签名,得到第一盖章合同,第一盖章合同包括合同原文及对应的第一数字签名,能够在合同中录入盖章人员信息,为后续查找盖章人员信息提供基础。In this embodiment, by receiving the first target personal private key selected by the first user, the original contract is signed according to the first target personal private key, and the first sealed contract is obtained. The first sealed contract includes the original contract and the corresponding first contract. Digital signature can enter the information of the person who stamped the seal in the contract, providing a basis for subsequent search for the information of the stamped personnel.

同时基于第一目标个人私钥是根据第一企业密钥生成,第一企业证书是根据第一企业密钥及第一企业的信息生成,实现对外显示的是企业的同时合同相对方也能验证数字签名,使得合同相对方无法获取盖章人员信息下也能通过第一企业证书验证数字签名,提高信息保密性。At the same time, based on the first target personal private key is generated based on the first enterprise key, and the first enterprise certificate is generated based on the first enterprise key and the information of the first enterprise, so that the enterprise is displayed externally and the counterparty of the contract can also verify The digital signature enables the counterparty to the contract to verify the digital signature through the first enterprise certificate even if the counterparty to the contract cannot obtain the information of the stamped personnel, improving the confidentiality of information.

附图说明Description of drawings

为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the accompanying drawings that need to be used in the descriptions of the embodiments or the prior art will be briefly introduced below. Obviously, the accompanying drawings in the following description are only for the present application For some embodiments, those of ordinary skill in the art can also obtain other drawings based on these drawings without any creative effort.

图1是本申请一实施例提供的系统示意图;Fig. 1 is a schematic diagram of a system provided by an embodiment of the present application;

图2是本申请一实施例提供的电子合同签订方法的第一种流程示意图;Fig. 2 is a first schematic flow chart of an electronic contract signing method provided by an embodiment of the present application;

图3是本申请一实施例提供的电子合同签订方法的第二种流程示意图;Fig. 3 is a second schematic flow chart of an electronic contract signing method provided by an embodiment of the present application;

图4是本申请一实施例提供的终端设备的结构示意图。Fig. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.

具体实施方式detailed description

以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

应当理解,当在本申请说明书和所附权利要求书中使用时,术语“包括”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and/or components, but does not exclude one or more other Presence or addition of features, wholes, steps, operations, elements, components and/or collections thereof.

还应当理解,在本申请说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。It should also be understood that the term "and/or" used in the description of the present application and the appended claims refers to any combination and all possible combinations of one or more of the associated listed items, and includes these combinations.

如在本申请说明书和所附权利要求书中所使用的那样,术语“如果”可以依据上下文被解释为“当...时”或“一旦”或“响应于确定”或“响应于检测到”。类似地,短语“如果确定”或“如果检测到[所描述条件或事件]”可以依据上下文被解释为意指“一旦确定”或“响应于确定”或“一旦检测到[所描述条件或事件]”或“响应于检测到[所描述条件或事件]”。As used in this specification and the appended claims, the term "if" may be construed, depending on the context, as "when" or "once" or "in response to determining" or "in response to detecting ". Similarly, the phrase "if determined" or "if [the described condition or event] is detected" may be construed, depending on the context, to mean "once determined" or "in response to the determination" or "once detected [the described condition or event] ]” or “in response to detection of [described condition or event]”.

另外,在本申请说明书和所附权利要求书的描述中,术语“第一”、“第二”、“第三”等仅用于区分描述,而不能理解为指示或暗示相对重要性。In addition, in the description of the specification and appended claims of the present application, the terms "first", "second", "third" and so on are only used to distinguish descriptions, and should not be understood as indicating or implying relative importance.

在本申请说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。Reference to "one embodiment" or "some embodiments" or the like in the specification of the present application means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," "in other embodiments," etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean "one or more but not all embodiments" unless specifically stated otherwise. The terms "including", "comprising", "having" and variations thereof mean "including but not limited to", unless specifically stated otherwise.

现今电子合同已广泛应用于社会经济活动中各个领域。一般签订电子合同需要数字证书及数字签名,因此企业需要在认证中心递交资料以申请企业密钥及合同密钥。认证中心生成并存储企业密钥及合同密钥,接着根据企业密钥,产生至少一个个人密钥对,包括个人私钥及个人公钥;然后根据企业密钥及企业的信息生成企业证书,根据个人公钥及指定的使用者信息生成个人证书,并同步颁发企业证书、至少一个个人私钥及对应的个人证书给企业。Nowadays, electronic contracts have been widely used in various fields of social and economic activities. Generally, digital certificates and digital signatures are required to sign electronic contracts, so enterprises need to submit materials to the certification center to apply for enterprise keys and contract keys. The certification center generates and stores the enterprise key and contract key, and then generates at least one personal key pair based on the enterprise key, including a personal private key and a personal public key; then generates an enterprise certificate based on the enterprise key and enterprise information, according to The personal public key and the specified user information generate a personal certificate, and simultaneously issue the enterprise certificate, at least one personal private key and the corresponding personal certificate to the enterprise.

第一企业接收并存储认证中心生成的第一企业证书和至少一个第一个人私钥及对应的第一个人证书。The first enterprise receives and stores the first enterprise certificate generated by the certification authority, at least one first personal private key and the corresponding first personal certificate.

其中,第一企业密钥及第一合同密钥是认证中心根据第一企业的信息生成,第一个人公钥及第一个人私钥是认证中心根据第一企业密钥生成。第一个人证书是认证中心根据第一个人公钥及第一使用者信息生成。各第一个人密钥对之间均不相同,各第一个人证书之间均不相同。第一企业证书是根据第一企业密钥及第一企业的信息生成。Wherein, the first enterprise key and the first contract key are generated by the certification center based on the information of the first company, and the first individual public key and the first individual private key are generated by the certification center based on the first enterprise key. The first personal certificate is generated by the certification center according to the first personal public key and the first user information. All first person key pairs are different, and all first person certificates are different. The first enterprise certificate is generated according to the first enterprise key and the information of the first enterprise.

第二企业接收并存储认证中心生成的第二企业证书和至少一个第二个人私钥及对应的第二个人证书。The second enterprise receives and stores the second enterprise certificate generated by the certification center, at least one second personal private key and the corresponding second personal certificate.

其中,第二企业密钥及第二合同密钥是认证中心根据第二企业的信息生成,第二个人公钥及第二个人私钥是认证中心根据第二企业密钥生成。第二个人证书是认证中心根据第二个人公钥及第二使用者信息生成。各第二个人密钥对之间均不相同,各第二个人证书之间均不相同。第二企业证书是认证中心根据第二企业密钥及第二企业的信息生成。Wherein, the second enterprise key and the second contract key are generated by the certification center according to the information of the second company, and the second personal public key and the second personal private key are generated by the certification center according to the second enterprise key. The second personal certificate is generated by the certification center according to the second personal public key and the second user information. All second personal key pairs are different, and all second personal certificates are different. The second enterprise certificate is generated by the certification center according to the second enterprise key and the information of the second enterprise.

个人私钥只能由指定的具有权限的企业成员使用,企业成员使用专用的个人私钥对电子合同进行签名。Personal private keys can only be used by designated enterprise members with authority, and enterprise members use their dedicated personal private keys to sign electronic contracts.

图1是本申请一实施例提供的系统示意图。如图1所示,所述系统包括第一企业系统及第二企业系统。其中,第一企业系统1为第一企业用于签订电子合同的系统,包括至少一个第一终端。示例的,包括第一终端10、第一终端11、第一终端12及第一终端13。第一终端中存储有终端使用者专用的个人密钥及第一企业证书。Fig. 1 is a schematic diagram of a system provided by an embodiment of the present application. As shown in FIG. 1 , the system includes a first enterprise system and a second enterprise system. Wherein, the first enterprise system 1 is a system used by the first enterprise to sign an electronic contract, including at least one first terminal. Exemplarily, it includes the first terminal 10 , the first terminal 11 , the first terminal 12 and the first terminal 13 . The terminal user's specific personal key and the first enterprise certificate are stored in the first terminal.

第二企业系统2为第二企业用于签订电子合同的系统,包括至少一个第二终端。示例的,包括第二终端20、第二终端21、第二终端22及第二终端23。第二终端中存储有终端使用者专用的个人密钥及第二企业证书。The second enterprise system 2 is a system used by the second enterprise to sign electronic contracts, including at least one second terminal. Exemplarily, it includes the second terminal 20 , the second terminal 21 , the second terminal 22 and the second terminal 23 . A personal key specific to the end user and a second enterprise certificate are stored in the second terminal.

当第一企业与第二企业签订电子合同时,第一企业作为合同发起方,第二企业作为合同相对方。When the first enterprise signs an electronic contract with the second enterprise, the first enterprise acts as the initiator of the contract, and the second enterprise acts as the counterparty of the contract.

图2是本申请一实施例提供的电子合同签订方法的第一种流程示意图。如图2所示,所述包括:Fig. 2 is a schematic flow chart of the first electronic contract signing method provided by an embodiment of the present application. As shown in Figure 2, the description includes:

S11:第一企业系统接收第一用户选择的第一目标个人私钥。S11: The first enterprise system receives the first target personal private key selected by the first user.

其中,第一用户为第一企业的成员,第一目标个人私钥是认证中心根据第一企业的第一企业密钥生成。Wherein, the first user is a member of the first enterprise, and the first target personal private key is generated by the certification center according to the first enterprise key of the first enterprise.

在应用中,企业内部发起电子合同流程,合同原文经过内部审批后,最后审批人员第一用户在使用的第一终端上点击其专用的个人私钥。第一终端接收到第一用户选择的第一目标个人私钥。In the application, the enterprise initiates the electronic contract process internally. After the original contract is approved internally, the final approver, the first user, clicks on his dedicated personal private key on the first terminal used. The first terminal receives the first target personal private key selected by the first user.

S12:根据第一目标个人私钥对合同原文进行签名,得到第一盖章合同。S12: Sign the original text of the contract according to the private key of the first target individual to obtain the first sealed contract.

其中,第一盖章合同包括合同原文及对应的第一数字签名。Wherein, the first sealed contract includes the original text of the contract and the corresponding first digital signature.

在应用中,第一终端使用第一目标个人私钥对合同原文进行签名,以在合同原文上加盖第一用户的数字签名。因第一个人私钥是认证中心根据第一企业密钥生成,该第一数字签名也相当于第一企业的数字签名。In the application, the first terminal uses the first target personal private key to sign the original text of the contract, so as to affix the digital signature of the first user on the original text of the contract. Since the private key of the first person is generated by the certification center based on the key of the first enterprise, the first digital signature is also equivalent to the digital signature of the first enterprise.

S13:根据第二企业的第二合同密钥对第一盖章合同进行加密,得到第一加密合同。S13: Encrypt the first sealed contract according to the second contract key of the second enterprise to obtain the first encrypted contract.

在应用中,第一终端使用预存储的第二企业的第二合同密钥对第一盖章合同进行加密,以使第一盖章合同能够加密传输,在被窃取后也能防止他人窃取信息。In the application, the first terminal uses the pre-stored second contract key of the second company to encrypt the first sealed contract, so that the first sealed contract can be encrypted and transmitted, and it can also prevent others from stealing information after being stolen .

S14:向第二企业系统发送第一加密合同及对应的第一企业证书。S14: Send the first encrypted contract and the corresponding first enterprise certificate to the second enterprise system.

在应用中,第一终端生成第一加密合同后,向第二企业的第二企业系统发送第一加密合同及对应的第一企业证书。In the application, after the first terminal generates the first encrypted contract, it sends the first encrypted contract and the corresponding first enterprise certificate to the second enterprise system of the second enterprise.

其中,通过第一企业证书对外显示为企业,同时因第一用户使用的第一个人私钥是根据第一企业密钥生成,第一企业证书中的第一企业密钥能够验证第一数字签名。Among them, the first enterprise certificate is displayed as an enterprise, and because the first personal private key used by the first user is generated according to the first enterprise key, the first enterprise key in the first enterprise certificate can verify the first digital sign.

可以理解的,通过接收第一用户选择的第一目标个人私钥,根据第一目标个人私钥对合同原文进行签名,得到第一盖章合同,第一盖章合同包括合同原文及对应的第一数字签名,能够在合同中录入盖章人员信息,为后续查找盖章人员信息提供基础。It can be understood that by receiving the first target personal private key selected by the first user and signing the original contract according to the first target personal private key, the first sealed contract is obtained. The first sealed contract includes the original contract and the corresponding first contract. A digital signature, which can enter the information of the person who stamped the seal in the contract, providing a basis for subsequent search for the information of the stamped personnel.

同时基于第一目标个人私钥是根据第一企业密钥生成,第一企业证书是根据第一企业密钥及第一企业的信息生成,实现对外显示的是企业的同时合同相对方也能验证数字签名,使得合同相对方无法获取盖章人员信息下也能通过第一企业证书验证数字签名,提高信息保密性,体现了匿名性。At the same time, based on the first target personal private key is generated based on the first enterprise key, and the first enterprise certificate is generated based on the first enterprise key and the information of the first enterprise, so that the enterprise is displayed externally and the counterparty of the contract can also verify The digital signature enables the counterparty to the contract to verify the digital signature through the first enterprise certificate even if the counterparty of the contract cannot obtain the information of the person who stamped the seal, which improves the confidentiality of information and embodies anonymity.

S21:第二企业系统接收来自第一企业系统的第一加密合同及对应的第一企业证书。S21: The second enterprise system receives the first encrypted contract and the corresponding first enterprise certificate from the first enterprise system.

在应用中,第二企业系统中某一个第二终端接收第一加密合同及对应的第一企业证书。In the application, a certain second terminal in the second enterprise system receives the first encryption contract and the corresponding first enterprise certificate.

S22:通过第二合同密钥对第一加密合同进行解密,得到第一盖章合同。S22: Decrypt the first encrypted contract by using the second contract key to obtain the first sealed contract.

其中,第一盖章合同包括合同原文及对应的第一数字签名。Wherein, the first sealed contract includes the original text of the contract and the corresponding first digital signature.

在应用中,因第一企业使用的是第二合同密钥,对应的,接收合同的第二终端使用第二合同密钥对第一加密合同进行解密。In the application, since the first enterprise uses the second contract key, correspondingly, the second terminal receiving the contract uses the second contract key to decrypt the first encrypted contract.

S23:根据第一企业证书中的第一企业密钥及合同原文,对第一数字签名进行验签。S23: Verify the first digital signature according to the first enterprise key in the first enterprise certificate and the original contract.

在应用中,接收合同的第二终端从第一企业证书中获取第一企业密钥,对第一数字签名进行解密,从第一数字签名中获取合同摘要。然后对合同原文进行哈希计算,得到原文摘要,将第一数字签名中的合同摘要与哈希计算得到的原文摘要进行对比。若相同,说明电子合同在流转过程中未被篡改,验证通过。若不相同,说明电子合同在流转过程中被篡改了,验证不通过。In the application, the second terminal receiving the contract obtains the first enterprise key from the first enterprise certificate, decrypts the first digital signature, and obtains the contract abstract from the first digital signature. Then perform hash calculation on the original text of the contract to obtain an abstract of the original text, and compare the abstract of the contract in the first digital signature with the original text abstract obtained by the hash calculation. If they are the same, it means that the electronic contract has not been tampered with during the transfer process, and the verification is passed. If they are not the same, it means that the electronic contract has been tampered with during the transfer process, and the verification fails.

通过验签获知合同原文有无被篡改,保证交易的安全性。Through signature verification, it is known whether the original contract has been tampered with, ensuring the security of the transaction.

S24:若验证第一数字签名通过,则接收第三用户选择的第二目标个人私钥。S24: If the verification of the first digital signature is passed, receive the second target personal private key selected by the third user.

在应用中,若验证通过,则进行内部审核,最后审批人员第三用户在使用的第二终端上点击其专用的个人私钥。第二终端接收到第三用户选择的第二目标个人私钥。In the application, if the verification is passed, an internal audit is carried out, and finally the third user of the approver clicks on his dedicated personal private key on the second terminal used. The second terminal receives the second target personal private key selected by the third user.

其中,第二目标个人私钥是根据所述第二企业的第二企业密钥生成。Wherein, the second target personal private key is generated according to the second enterprise key of the second enterprise.

S25:根据第二目标个人私钥对合同原文进行签名,得到第二盖章合同。S25: Sign the original text of the contract according to the private key of the second target individual to obtain the second sealed contract.

其中,第二盖章合同包括合同原文及对应的第一数字签名、第二数字签名,第三用户为第二企业的成员。Wherein, the second sealed contract includes the original text of the contract and the corresponding first and second digital signatures, and the third user is a member of the second enterprise.

在应用中,签名的第二终端使用第一目标个人私钥对合同原文进行签名,以在合同原文上加盖第三用户的数字签名。因第二个人私钥是认证中心根据第二企业密钥生成,该第二数字签名也相当于第二企业的数字签名。In the application, the signing second terminal uses the first target personal private key to sign the original text of the contract, so as to stamp the digital signature of the third user on the original text of the contract. Since the second personal private key is generated by the certification center based on the second enterprise key, the second digital signature is also equivalent to the digital signature of the second enterprise.

S26:根据第一企业的第一合同密钥对第二盖章合同进行加密,得到第二加密合同。S26: Encrypt the second sealed contract according to the first contract key of the first enterprise to obtain a second encrypted contract.

在应用中,签名的第二终端使用预存储的第一企业的第一合同密钥对第二盖章合同进行加密,以使第二盖章合同能够加密传输,在被窃取后也能防止他人窃取信息。In the application, the signed second terminal uses the pre-stored first contract key of the first company to encrypt the second sealed contract, so that the second sealed contract can be encrypted and transmitted, and it can also prevent others from stealing Steal information.

S27:向第一企业系统发送第二加密合同及对应的第二企业证书。S27: Send the second encryption contract and the corresponding second enterprise certificate to the first enterprise system.

在应用中,签名的第二终端生成第二加密合同后,向第一企业的第一企业系统发送第二加密合同及对应的第二企业证书。In the application, after the signed second terminal generates the second encrypted contract, it sends the second encrypted contract and the corresponding second enterprise certificate to the first enterprise system of the first enterprise.

在本实施例中,接收合同的第二终端与签名的第二终端为同一个终端。在其他实施例中,可为不同终端。In this embodiment, the second terminal receiving the contract and the second terminal signing the contract are the same terminal. In other embodiments, it may be a different terminal.

可以理解的,通过接收第三用户选择的第二目标个人私钥,根据第二目标个人私钥对合同原文进行签名,得到第二盖章合同,第二盖章合同包括合同原文、对应的第二数字签名,能够在合同中录入盖章人员信息,为后续查找盖章人员信息提供基础。Understandably, by receiving the second target personal private key selected by the third user, the original contract is signed according to the second target personal private key, and the second sealed contract is obtained. The second sealed contract includes the original contract, the corresponding first 2. Digital signature, which can enter the information of the person who stamped the seal in the contract, providing a basis for subsequent search for the information of the stamped personnel.

同时基于第二目标个人私钥是根据第二企业密钥生成,第二企业证书是根据第二企业密钥及第二企业信息生成,实现对外显示的是企业的同时合同发起方也能验证数字签名,使得合同发起方无法获取盖章人员信息下也能通过第二企业证书验证数字签名,提高信息保密性。At the same time, based on the second target personal private key is generated based on the second enterprise key, and the second enterprise certificate is generated based on the second enterprise key and the second enterprise information, so that the contract initiator can also verify the number while the enterprise is displayed externally Signature, so that the contract initiator can verify the digital signature through the second enterprise certificate even if the contract initiator cannot obtain the information of the person who stamped the seal, improving the confidentiality of information.

S15:第一企业系统接收来自第二企业系统的第二加密合同及对应的第二企业证书。S15: The first enterprise system receives the second encrypted contract and the corresponding second enterprise certificate from the second enterprise system.

在应用中,第一企业系统中某一个第一终端接收第二加密合同及对应的第二企业证书。In the application, a certain first terminal in the first enterprise system receives the second encryption contract and the corresponding second enterprise certificate.

S16:根据第一合同密钥对第二加密合同进行解密,得到第二盖章合同。S16: Decrypt the second encrypted contract according to the first contract key to obtain the second sealed contract.

其中,第二盖章合同包括合同原文及对应的第一数字签名、第二数字签名,第二数字签名为通过第二企业对合同原文进行签名得到。Wherein, the second sealed contract includes the original contract text and the corresponding first digital signature and the second digital signature, and the second digital signature is obtained by signing the original contract text by the second enterprise.

在应用中,因第二企业使用的是第一合同密钥,对应的,接收合同的第一终端使用第一合同密钥对第二加密合同进行解密。In the application, because the second enterprise uses the first contract key, correspondingly, the first terminal receiving the contract uses the first contract key to decrypt the second encrypted contract.

S17:根据第二企业证书中的第二企业密钥及合同原文,对第二数字签名进行验签。S17: Verify the second digital signature according to the second enterprise key in the second enterprise certificate and the original contract.

在应用中,接收合同的第一终端从第二企业证书中获取第二企业密钥,对第二数字签名进行解密,从第二数字签名中获取合同摘要。然后对合同原文进行哈希计算,得到原文摘要,将第二数字签名中的合同摘要与哈希计算得到的原文摘要进行对比。若相同,说明电子合同在流转过程中未被篡改,验证通过。若不相同,说明电子合同在流转过程中被篡改了,验证不通过。In the application, the first terminal receiving the contract obtains the second enterprise key from the second enterprise certificate, decrypts the second digital signature, and obtains the contract abstract from the second digital signature. Then perform hash calculation on the original text of the contract to obtain an abstract of the original text, and compare the abstract of the contract in the second digital signature with the original text abstract obtained by the hash calculation. If they are the same, it means that the electronic contract has not been tampered with during the transfer process, and the verification is passed. If they are not the same, it means that the electronic contract has been tampered with during the transfer process, and the verification fails.

S18:若验证第二数字签名通过,则保存第二盖章合同。S18: If the verification of the second digital signature is passed, save the second sealed contract.

在应用中,若验证通过,则保存第二盖章合同进行留档。通过验签获知合同原文有无被篡改,保证交易的安全性。In the application, if the verification is passed, the second sealed contract is saved for archival purposes. Through signature verification, it is known whether the original contract has been tampered with, ensuring the security of the transaction.

图3是本申请一实施例提供的电子合同签订方法的第二种流程示意图。如图3所示,步骤S12之后,还包括:Fig. 3 is a schematic flow chart of a second electronic contract signing method provided by an embodiment of the present application. As shown in Figure 3, after step S12, also include:

S121:接收第二用户输入的查询指令,响应于查询指令,获取第一数字签名,第二用户为第一企业的成员。S121: Receive a query instruction input by a second user, and obtain a first digital signature in response to the query instruction, where the second user is a member of the first enterprise.

在应用中,在生成第一盖章合同后,当第一企业中第二用户需要查询该第一盖章合同的盖章人员的信息,在使用的第一终端输入查询指令,第一终端接收到查询指令,响应于查询指令,根据查询指令从第一盖章合同中获取第一数字签名。In the application, after the first stamped contract is generated, when the second user in the first enterprise needs to inquire about the information of the person who stamped the first stamped contract, he inputs a query command on the first terminal used, and the first terminal receives In response to the query instruction, the first digital signature is obtained from the first sealed contract according to the query instruction.

或,当第一企业中第二用户需要查询某份第二盖章合同盖章人员的信息,在使用的第一终端上输入查询指令。第一终端接收到查询指令,响应于查询指令,根据查询指令从第二盖章合同中获取第一数字签名。Or, when the second user in the first enterprise needs to inquire about the information of the person who affixed a certain second contract, the inquiring instruction is input on the first terminal used. The first terminal receives the query instruction, and in response to the query instruction, acquires the first digital signature from the second sealed contract according to the query instruction.

S122:根据各第一个人证书中的第一个人公钥对第一数字签名进行追踪,在第一个人证书集中查找第一目标个人证书。S122: Track the first digital signature according to the first personal public key in each first personal certificate, and search for the first target personal certificate in the first personal certificate set.

其中,第一目标个人证书中的第一目标个人公钥与第一目标个人私钥为一对密钥对。Wherein, the first target personal public key and the first target personal private key in the first target personal certificate are a key pair.

在应用中,获取到第一数字签名后,在第一个人证书集,逐一利用第一个人证书中的第一个人公钥对第一数字签名进行解密。若解密成功,则得到第一目标个人公钥,同时得到第一目标个人证书。从第一目标个人证书获取到使用者的信息,即第一用户的信息。In the application, after the first digital signature is obtained, in the first personal certificate set, the first digital signature is decrypted one by one by using the first personal public key in the first personal certificate. If the decryption is successful, the first target personal public key and the first target personal certificate are obtained at the same time. The user's information, that is, the first user's information, is obtained from the first target personal certificate.

其中,第二用户的第一终端预先存储有第一个人证书集。Wherein, the first terminal of the second user pre-stores the first personal certificate set.

S123:显示第一目标个人证书中的第一目标使用者信息。S123: Display the first target user information in the first target personal certificate.

在应用中,在第二用户使用的第一终端上显示第一目标使用者信息。In the application, the first target user information is displayed on the first terminal used by the second user.

本实施例通过根据各第一个人证书中的第一个人公钥对第一数字签名进行追踪,在第一个人证书集中查找第一目标个人证书,显示第一目标个人证书中的第一目标使用者信息,实现电子合同的盖章人员的信息查询,无需通过其他繁杂的流程查询或通过业务系统辅助查询。In this embodiment, the first digital signature is tracked according to the first personal public key in each first personal certificate, and the first target personal certificate is searched in the first personal certificate set, and the first target personal certificate in the first target personal certificate is displayed. One-target user information, to realize the information query of the person who signs the electronic contract, without the need to query through other complicated processes or through the auxiliary query of the business system.

在一个实施例中,第一合同密钥为第一企业的标识信息,第二合同密钥为第二企业的标识信息。在这种情况下,合同双方无需额外接收用于解密合同的数字证书,降低数字证书管理难度,同时无需对这些数字证书进行验证,减少繁琐的验证流程。In one embodiment, the first contract key is the identification information of the first enterprise, and the second contract key is the identification information of the second enterprise. In this case, both parties to the contract do not need to receive additional digital certificates for decrypting the contract, reducing the difficulty of digital certificate management, and at the same time do not need to verify these digital certificates, reducing the cumbersome verification process.

示例的,标识信息为个人身份信息或企业身份信息。For example, the identification information is personally identifiable information or enterprise identifiable information.

在一个实施例中,S15之后,还包括:In one embodiment, after S15, it also includes:

根据第二企业证书中第二企业的信息,验证第二企业的身份。According to the information of the second enterprise in the second enterprise certificate, the identity of the second enterprise is verified.

在应用中,根据第二企业的信息,确定第二加密合同是否来自第二企业,是否来自合同相对方。In the application, according to the information of the second enterprise, it is determined whether the second encryption contract comes from the second enterprise and whether it comes from the opposite party of the contract.

若验证身份通过,则进入步骤:根据第一合同密钥对第二加密合同进行解密,得到第二盖章合同。If the identity verification is passed, enter the step of: decrypting the second encrypted contract according to the first contract key to obtain the second sealed contract.

在应用中,若确定是来自第二企业,则验证通过,对第二加密合同进行解密。In the application, if it is determined that it is from the second enterprise, the verification is passed, and the second encrypted contract is decrypted.

本实施例通过根据第二企业证书中第二企业的信息,验证第二企业的身份,以验证电子合同是否来自合同相对方,及时拦截恶意伪造的电子合同,保证交易的安全性。In this embodiment, by verifying the identity of the second company based on the information of the second company in the certificate of the second company, to verify whether the electronic contract comes from the counterparty of the contract, timely intercept maliciously forged electronic contracts, and ensure the security of the transaction.

在一个实施例中,保存第二盖章合同之前,还包括:In one embodiment, before saving the second stamped contract, further includes:

根据第一企业证书中的第一企业密钥及合同原文,对第一数字签名进行验签;Verify the first digital signature according to the first enterprise key in the first enterprise certificate and the original contract;

若验证第一数字签名通过,则进入步骤:保存第二盖章合同。If the verification of the first digital signature is passed, then enter the step of saving the second sealed contract.

本实施例通过根据第一企业证书中的第一企业密钥及合同原文,对第一数字签名进行验签,以对第一数字签名再次验签,及时发现恶意伪造的电子合同,保证交易的安全性。In this embodiment, the first digital signature is verified according to the first enterprise key in the first enterprise certificate and the original text of the contract, so as to verify the first digital signature again, to detect maliciously forged electronic contracts in time, and to ensure the integrity of the transaction. safety.

应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that the sequence numbers of the steps in the above embodiments do not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation to the implementation process of the embodiment of the present application.

图4为本申请一实施例提供的终端设备的结构示意图。如图4所示,该实施例的终端设备3包括:至少一个处理器30(图4中仅示出一个)、存储器31以及存储在所述存储器31中并可在所述至少一个处理器30上运行的计算机程序32,所述处理器30执行所述计算机程序32时实现上述任意各个方法实施例中的步骤。FIG. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the present application. As shown in FIG. 4 , the terminal device 3 of this embodiment includes: at least one processor 30 (only one is shown in FIG. 4 ), a memory 31 and stored in the memory 31 and can be used in the at least one processor 30 A computer program 32 running on the computer, when the processor 30 executes the computer program 32, the steps in any of the above method embodiments are realized.

所述终端设备3可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。该终端设备3可包括,但不仅限于,处理器30、存储器31。本领域技术人员可以理解,图4仅仅是终端设备3的举例,并不构成对终端设备3的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如还可以包括输入输出设备、网络接入设备等。The terminal device 3 may be a computing device such as a desktop computer, a notebook, a palmtop computer, or a cloud server. The terminal device 3 may include, but not limited to, a processor 30 and a memory 31 . Those skilled in the art can understand that Fig. 4 is only an example of the terminal device 3, and does not constitute a limitation to the terminal device 3, and may include more or less components than those shown in the figure, or combine certain components, or different components , for example, may also include input and output devices, network access devices, and so on.

所称处理器30可以是中央处理单元(Central Processing Unit,CPU),该处理器30还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The so-called processor 30 can be a central processing unit (Central Processing Unit, CPU), and the processor 30 can also be other general-purpose processors, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit) , ASIC), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.

所述存储器31在一些实施例中可以是所述终端设备3的内部存储单元,例如终端设备3的硬盘或内存。所述存储器31在另一些实施例中也可以是所述终端设备3的外部存储设备,例如所述终端设备3上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器31还可以既包括所述终端设备3的内部存储单元也包括外部存储设备。所述存储器31用于存储操作系统、应用程序、引导装载程序(BootLoader)、数据以及其他程序等,例如所述计算机程序的程序代码等。所述存储器31还可以用于暂时地存储已经输出或者将要输出的数据。The storage 31 may be an internal storage unit of the terminal device 3 in some embodiments, such as a hard disk or memory of the terminal device 3 . The memory 31 may also be an external storage device of the terminal device 3 in other embodiments, such as a plug-in hard disk equipped on the terminal device 3, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, flash memory card (Flash Card), etc. Further, the memory 31 may also include both an internal storage unit of the terminal device 3 and an external storage device. The memory 31 is used to store operating system, application program, boot loader (BootLoader), data and other programs, such as the program code of the computer program. The memory 31 can also be used to temporarily store data that has been output or will be output.

需要说明的是,上述装置/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其具体功能及带来的技术效果,具体可参见方法实施例部分,此处不再赘述。It should be noted that the information interaction and execution process between the above-mentioned devices/units are based on the same concept as the method embodiment of the present application, and its specific functions and technical effects can be found in the method embodiment section. I won't repeat them here.

所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of description, only the division of the above-mentioned functional units and modules is used for illustration. In practical applications, the above-mentioned functions can be assigned to different functional units, Completion of modules means that the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above. Each functional unit and module in the embodiment may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit, and the above-mentioned integrated units may adopt hardware It can also be implemented in the form of software functional units. In addition, the specific names of the functional units and modules are only for the convenience of distinguishing each other, and are not used to limit the protection scope of the present application. For the specific working process of the units and modules in the above system, reference may be made to the corresponding process in the foregoing method embodiments, and details will not be repeated here.

本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时可实现上述各个方法实施例中的步骤。The embodiment of the present application also provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the steps in the foregoing method embodiments can be implemented.

本申请实施例提供了一种计算机程序产品,当计算机程序产品在终端设备上运行时,使得终端设备执行时可实现上述各个方法实施例中的步骤。An embodiment of the present application provides a computer program product. When the computer program product runs on a terminal device, the terminal device can implement the steps in the foregoing method embodiments when executed.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质至少可以包括:能够将计算机程序代码携带到拍照装置/终端设备的任何实体或装置、记录介质、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,RandomAccess Memory)、电载波信号、电信信号以及软件分发介质。例如U盘、移动硬盘、磁碟或者光盘等。在某些司法管辖区,根据立法和专利实践,计算机可读介质不可以是电载波信号和电信信号。If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, all or part of the procedures in the methods of the above embodiments in the present application can be completed by instructing related hardware through computer programs, and the computer programs can be stored in a computer-readable storage medium. The computer program When executed by a processor, the steps in the above-mentioned various method embodiments can be realized. Wherein, the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file or some intermediate form. The computer-readable medium may at least include: any entity or device capable of carrying computer program codes to a photographing device/terminal device, a recording medium, a computer memory, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), electrical carrier signal, telecommunication signal, and software distribution medium. Such as U disk, mobile hard disk, magnetic disk or optical disk, etc. In some jurisdictions, computer readable media may not be electrical carrier signals and telecommunication signals under legislation and patent practice.

在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。In the above-mentioned embodiments, the descriptions of each embodiment have their own emphases, and for parts that are not detailed or recorded in a certain embodiment, refer to the relevant descriptions of other embodiments.

本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.

在本申请所提供的实施例中,应该理解到,所揭露的装置/网络设备和方法,可以通过其它的方式实现。例如,以上所描述的装置/网络设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。In the embodiments provided in this application, it should be understood that the disclosed device/network device and method may be implemented in other ways. For example, the device/network device embodiments described above are only illustrative. For example, the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units Or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.

以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。The above-described embodiments are only used to illustrate the technical solutions of the present application, rather than to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still implement the foregoing embodiments Modifications to the technical solutions described in the examples, or equivalent replacements for some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the application, and should be included in the Within the protection scope of this application.

Claims (10)

1. An electronic contract signing method, applied to a first enterprise system, comprises the following steps:
receiving a first target individual private key selected by a first user, wherein the first user is a member of a first enterprise;
signing the identical original text according to the first target individual private key to obtain a first sealing contract, wherein the first sealing contract comprises the contract original text and a corresponding first digital signature;
encrypting the first sealing contract according to a second contract key of a second enterprise to obtain a first encryption contract;
sending the first encryption contract and the corresponding first enterprise certificate to the second enterprise system;
the first enterprise system is a system used by the first enterprise to sign an electronic contract, the first target individual private key is generated according to a first enterprise key of the first enterprise, the first enterprise certificate is generated according to the first enterprise key and information of the first enterprise, and the second enterprise system is a system used by the second enterprise to sign an electronic contract.
2. The method of claim 1, wherein said signing the contract text based on the first target individual key, after obtaining a first sealed contract, further comprises:
receiving a query instruction input by a second user, and responding to the query instruction to acquire the first digital signature, wherein the second user is a member of the first enterprise;
tracking the first digital signature according to a first personal public key in each first personal certificate, and searching a first target personal certificate in a first personal certificate set, wherein the first target personal public key in the first target personal certificate and the first target personal private key are a key pair;
displaying first target user information in the first target personal certificate;
the first personal certificate is generated according to the first personal public key and first user information, and the first personal public key is generated according to the first enterprise key and belongs to a key pair with the first personal private key.
3. The method of claim 1, wherein: the second contract key is identification information of the second enterprise.
4. The method of any of claims 1-3, wherein after sending the first encryption contract and corresponding first enterprise certificate to the second enterprise system, further comprising:
receiving a second encryption contract and a corresponding second enterprise certificate from the second enterprise system;
decrypting the second encrypted contract according to the first contract key to obtain a second seal contract, wherein the second seal contract comprises the contract original text and a corresponding first digital signature and a second digital signature, and the second digital signature is obtained by signing the contract original text through the second enterprise;
verifying the second digital signature according to the second enterprise key and the contract original text in the second enterprise certificate;
if the second digital signature passes the verification, the second seal contract is stored;
wherein the first contract key is identification information of the first enterprise.
5. The method of claim 4, wherein after receiving a second encryption contract and corresponding second enterprise certificate from the second enterprise, further comprising:
verifying the identity of the second enterprise according to the information of the second enterprise in the second enterprise certificate;
if the identity passes the verification, the method enters the following steps: and decrypting the second encrypted contract according to the first contract key to obtain a second sealing contract.
6. The method of claim 5, wherein prior to receiving the first target individual private key selected by the first user, further comprising:
receiving and storing a first enterprise certificate, at least one first personal private key and a corresponding first personal certificate which are generated by a certificate authority;
the first private key is generated according to the first enterprise key, the first private keys are different from one another, and the first personal certificates are different from one another.
7. An electronic contract signing method, applied to a second enterprise system, includes:
receiving a first encryption contract and a corresponding first enterprise certificate from a first enterprise system;
decrypting the first encryption contract through a second contract key to obtain a first sealing contract, wherein the first sealing contract comprises contract original text and a corresponding first digital signature;
verifying the first digital signature according to the first enterprise key and the contract original text in the first enterprise certificate;
if the first digital signature passes the verification, receiving a second target personal private key selected by a third user, wherein the third user is a member of a second enterprise;
signing the contract original text according to the second target individual private key to obtain a second sealing contract, wherein the second sealing contract comprises the contract original text and a corresponding first digital signature and a second digital signature;
encrypting the second sealing contract according to the first contract key of the first enterprise to obtain a second encryption contract;
sending the second encryption contract and a corresponding second enterprise certificate to the first enterprise system;
the second enterprise system is a system used by the second enterprise to sign an electronic contract, the second target individual private key is generated according to a second enterprise key of the second enterprise, the second enterprise certificate is generated according to the second enterprise key and information of the second enterprise, and the first enterprise system is a system used by the first enterprise to sign an electronic contract.
8. An electronic contract signing system is characterized by comprising a first enterprise system and a second enterprise system;
the first enterprise system is used for receiving a first target personal private key selected by a first user, and the first user is a member of a first enterprise;
signing the identical original text according to the first target individual private key to obtain a first sealing contract, wherein the first sealing contract comprises the contract original text and a corresponding first digital signature;
encrypting the first sealing contract according to a second contract key of a second enterprise to obtain a first encryption contract;
sending the first encryption contract and the corresponding first enterprise certificate to the second enterprise system;
the second enterprise system is used for receiving the first encryption contract and the corresponding first enterprise certificate from the first enterprise system;
decrypting the first encrypted contract through a second contract key to obtain a first sealing contract, wherein the first sealing contract comprises contract original texts and a corresponding first digital signature;
verifying the first digital signature according to the first enterprise key and the contract original text in the first enterprise certificate;
if the first digital signature passes the verification, receiving a second target personal private key selected by a third user, wherein the third user is a member of a second enterprise;
signing the contract original text according to the second target individual private key to obtain a second sealing contract, wherein the second sealing contract comprises the contract original text and a corresponding first digital signature and a second digital signature;
encrypting the second sealing contract according to the first contract key of the first enterprise to obtain a second encryption contract;
sending the second encryption contract and a corresponding second enterprise certificate to the first enterprise system;
the first enterprise system is a system for signing an electronic contract for the first enterprise, the first target individual private key is generated according to a first enterprise key of the first enterprise, the first enterprise certificate is generated according to the first enterprise key and information of the first enterprise, the second enterprise system is a system for signing an electronic contract for the second enterprise, the second target individual private key is generated according to a second enterprise key of the second enterprise, and the second enterprise certificate is generated according to the second enterprise key and information of the second enterprise.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 6 or 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 6 or 7.
CN202211041883.1A 2022-08-29 2022-08-29 Electronic contract signing method, system, terminal device and readable storage medium Active CN115482131B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211041883.1A CN115482131B (en) 2022-08-29 2022-08-29 Electronic contract signing method, system, terminal device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211041883.1A CN115482131B (en) 2022-08-29 2022-08-29 Electronic contract signing method, system, terminal device and readable storage medium

Publications (2)

Publication Number Publication Date
CN115482131A true CN115482131A (en) 2022-12-16
CN115482131B CN115482131B (en) 2025-06-24

Family

ID=84420855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211041883.1A Active CN115482131B (en) 2022-08-29 2022-08-29 Electronic contract signing method, system, terminal device and readable storage medium

Country Status (1)

Country Link
CN (1) CN115482131B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101419686A (en) * 2008-10-28 2009-04-29 吕金洪 A kind of on-line contract signing system based on the internet
CN107657553A (en) * 2017-09-21 2018-02-02 浙江惠码科技有限公司 A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
CN110445621A (en) * 2019-09-27 2019-11-12 瓦戈科技有限公司 A kind of application method and system of trusted identities
CN112015460A (en) * 2020-09-09 2020-12-01 南京工程学院 Code tracing method and system based on block chain technology
CN113761596A (en) * 2021-09-17 2021-12-07 安徽高山科技有限公司 Electronic signature method based on block chain and CA certificate dual authentication
US11362844B1 (en) * 2021-07-28 2022-06-14 Vidaloop, Inc. Security device and methods for end-to-end verifiable elections

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101419686A (en) * 2008-10-28 2009-04-29 吕金洪 A kind of on-line contract signing system based on the internet
CN107657553A (en) * 2017-09-21 2018-02-02 浙江惠码科技有限公司 A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
CN110445621A (en) * 2019-09-27 2019-11-12 瓦戈科技有限公司 A kind of application method and system of trusted identities
CN112015460A (en) * 2020-09-09 2020-12-01 南京工程学院 Code tracing method and system based on block chain technology
US11362844B1 (en) * 2021-07-28 2022-06-14 Vidaloop, Inc. Security device and methods for end-to-end verifiable elections
CN113761596A (en) * 2021-09-17 2021-12-07 安徽高山科技有限公司 Electronic signature method based on block chain and CA certificate dual authentication

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
张言胜 等: "一种新的动态门限数字签名方案研究", 《技术研究》, 1 August 2016 (2016-08-01), pages 62 - 67 *
徐睿 等: "基于防篡改技术的电子签约服务平台", 计算机系统应用, vol. 27, no. 04, 2 May 2018 (2018-05-02) *
雷入一;: "一种基于属性加密的文件共享系统", 数据通信, no. 06, 28 December 2019 (2019-12-28) *

Also Published As

Publication number Publication date
CN115482131B (en) 2025-06-24

Similar Documents

Publication Publication Date Title
EP3962020B1 (en) Information sharing methods and systems
EP3962135B1 (en) Information sharing methods, apparatuses, and devices
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
WO2020233373A1 (en) Application configuration file management method and device
WO2020192773A1 (en) Digital identity authentication method, device, apparatus and system, and storage medium
CN109905360B (en) Data verification method and terminal equipment
WO2020073513A1 (en) Blockchain-based user authentication method and terminal device
WO2020191928A1 (en) Digital identity authentication method, device, apparatus and system, and storage medium
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
CN112215608A (en) Data processing method and device
US20100082987A1 (en) Transparent trust validation of an unknown platform
CN111460525B (en) Block chain-based data processing method, device and storage medium
US9230135B2 (en) Secure access for sensitive digital information
CN112035860B (en) File encryption method, terminal, device, equipment and medium
US20250168017A1 (en) Method, apparatus, device and storage medium for device authentication and checking
CN111460457A (en) Real estate property registration supervision method, device, electronic equipment and storage medium
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN110417557B (en) Intelligent terminal peripheral data security control method and device
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN112910641A (en) Verification method and device for cross-link transaction supervision, relay link node and medium
US20180218363A1 (en) Payment instrument management with key tokenization
CN118611920A (en) Electronic tender document processing method, device, electronic device and storage medium
CN118445855A (en) Private data processing method, device, equipment and medium based on blockchain
WO2016165662A1 (en) Mobile phone quasi-digital certificate subsystem, and system and method thereof
CN115482131B (en) Electronic contract signing method, system, terminal device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant