CN118094502A - Contract signing verification processing method, device, equipment and storage medium - Google Patents

Contract signing verification processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN118094502A
CN118094502A CN202410244195.8A CN202410244195A CN118094502A CN 118094502 A CN118094502 A CN 118094502A CN 202410244195 A CN202410244195 A CN 202410244195A CN 118094502 A CN118094502 A CN 118094502A
Authority
CN
China
Prior art keywords
file
client
contract
result
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410244195.8A
Other languages
Chinese (zh)
Inventor
刘强
葛殿辉
曾婧婧
李苏伊
张天维
吴国振
冯文博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Three Gorges Renewables Group Co Ltd
Original Assignee
China Three Gorges Renewables Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Three Gorges Renewables Group Co Ltd filed Critical China Three Gorges Renewables Group Co Ltd
Priority to CN202410244195.8A priority Critical patent/CN118094502A/en
Publication of CN118094502A publication Critical patent/CN118094502A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/188Electronic negotiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/19Recognition using electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method, a device, equipment and a storage medium for checking and processing contract signing. The method comprises the following steps: receiving a target contract number sent by any client; acquiring a target contract file and a target verification code corresponding to the target contract number according to the mapping relation, and sending the target contract file and the target verification code to the client; receiving data to be checked and contract files to be checked, which are sent by a client; checking the data to be checked according to a preset identity image to generate an identity check result; checking whether the data to be checked has abnormal data or not to generate an abnormal checking result; if the identity inspection result and the abnormality inspection result are both the inspection passing, updating the contract file according to the contract file to be inspected; and if the identity test result and/or the abnormal test result are/is that the test fails, sending a prompt of test failure to the client. The validity and the authenticity of the identity of the signer are ensured, and the safety of signing the contract is ensured.

Description

Contract signing verification processing method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for checking and processing contract.
Background
With the deep advancement of digital transformation, the number of contracts increases exponentially, and contract signing is also increasingly prone to electronic informatization management.
Currently, the contract signing is that both transaction parties upload the electronic contract to a third party electronic contract signing platform for signing.
However, the existing contract signing method cannot ensure the validity and the authenticity of the identity of the signer, so that the safety of signing the contract cannot be ensured.
Disclosure of Invention
The application provides a contract signing verification processing method, device, equipment and storage medium, which are used for solving the technical problem that the prior art cannot ensure the validity and the authenticity of the identity of a signer, so that the safety of signing a contract cannot be ensured.
In a first aspect, the present application provides a method for checking and processing contract, including:
Acquiring a preset database, wherein the preset database comprises a plurality of contract files, and each contract file has a mapping relation with a contract number and a verification code;
receiving a signing request sent by any client, wherein the signing request comprises a target contract number;
acquiring a target contract file and a target verification code corresponding to the target contract number according to the mapping relation;
Sending the target contract file and the target verification code to the client so that the client responds to the operation of inputting the verification code by the client and displays a signing interface; responding to the operation that a customer clicks on the signing interface to start signing, and starting recording; responding to the operation of clicking scanning by a client on the signing interface, and scanning the signed contract file to generate a contract file to be checked; responding to the operation of ending signing by clicking the signing interface by the client, ending recording, and generating data to be checked;
Receiving the data to be checked and the contract file to be checked, which are sent by the client;
Acquiring an identity image of the sign-on person according to the data to be checked;
Acquiring a preset identity image according to the contract number;
checking the identity image of the signer according to the preset identity image to generate an identity checking result;
checking whether the data to be checked has abnormal data or not to generate an abnormal check result;
if the identity inspection result and the abnormal inspection result are both inspection passing, generating an inspection result passing inspection, and updating the contract file according to the contract file to be inspected;
if the identity test result and/or the abnormal test result are/is that the test fails, generating a test result that the test fails, and sending a prompt of failure of the test to the client.
Optionally, the method as described above further comprises: acquiring a file to be checked sent by a party B client, wherein the file to be checked comprises a settlement summary table and a report table; auditing the report forms according to preset auditing conditions to generate report form auditing results; if the report audit result is judged to pass audit, audit is carried out on the settlement summary table so as to generate a summary table audit result; if the summary table auditing result is judged to pass the auditing, determining that the file to be audited is a file to be paid, and sending the file to be paid to a first party client; if the report audit result or the summary audit result is judged to be not passed, generating a prompt of uploading failure according to the reason that the audit is not passed, and sending the prompt of uploading failure to the B side client.
Optionally, the method as described above further comprises: receiving a file to be archived sent by an administrator client; and acquiring a file name according to the file to be archived, and uploading the file to be archived to a corresponding directory according to the file name.
Optionally, the method as described above, wherein uploading the file to be archived to the corresponding directory according to the file name includes: judging whether the file name meets a standard format or not; if the file name does not meet the standard format, sending a prompt of file name error to the manager client; if the file name meets the standard format, analyzing keywords of the file name; and uploading the files to be archived to the corresponding catalogues according to the keywords.
Optionally, the method as described above, after receiving the file to be archived sent by the administrator client, further includes: judging whether the file to be archived comprises an aging mark or not; if the file to be archived comprises an aging label, generating countdown information according to the aging label; judging whether the countdown information meets a preset reminding condition or not; if the countdown information is judged to meet the preset reminding condition, the countdown information is sent to the manager client; and re-executing the step of generating countdown information according to the time tag until the countdown information does not meet the preset reminding condition.
Optionally, the method as described above further comprises: if the catalogue with the empty content is detected, marking the catalogue with the empty content as an empty catalogue; generating uploading prompt information according to all the empty catalogues, and sending the uploading prompt information to the manager client; detecting whether uploading error files exist in the catalogue aiming at the catalogue with all the contents not being empty; if the file with the uploading error is detected, marking the file with the uploading error as an error file; and generating a prompt for uploading the error according to all the error files, and sending the prompt for uploading the error to the manager client.
Optionally, the method described above, wherein the sending the target contract file and the target verification code to the client includes: judging whether the target verification code is being used or not; and if the target verification code is judged to be unused, the target contract file and the target verification code are sent to the client.
Optionally, after the determining whether the verification code is being used, the method further includes: and if the target verification code is judged to be used, sending a waiting prompt to the client.
In a second aspect, the present application provides a contract signing inspection processing apparatus including:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a preset database, the preset database comprises a plurality of contract files, and each contract file has a mapping relation with a contract number and a verification code;
The receiving module is used for receiving a signing request sent by any client, wherein the signing request comprises a target contract number;
The acquisition module is further used for acquiring a target contract file and a target verification code corresponding to the target contract number according to the mapping relation;
The sending module is used for sending the target contract file and the target verification code to the client so that the client responds to the operation of inputting the verification code by the client and displays a signing interface; responding to the operation that a customer clicks on the signing interface to start signing, and starting recording; responding to the operation of clicking scanning by a client on the signing interface, and scanning the signed contract file to generate a contract file to be checked; responding to the operation of ending signing by clicking the signing interface by the client, ending recording, and generating data to be checked;
The receiving module is further used for receiving the data to be checked and the contract file to be checked, which are sent by the client;
The acquisition module is also used for acquiring an identity image of the sign-on person according to the data to be checked;
the acquisition module is also used for acquiring a preset identity image according to the contract number;
The checking module is used for checking the identity image of the signer according to the preset identity image to generate an identity checking result;
the checking module is further used for checking whether the data to be checked has abnormal data or not so as to generate an abnormal checking result;
The updating module is used for generating a checking result passing the checking if the identity checking result and the abnormal checking result are both the checking passing results, and updating the contract file according to the contract file to be checked;
the sending module is further configured to generate a verification result that the verification fails if the identity verification result and/or the abnormal verification result are not passed, and send a prompt of failure in verification to the client.
In a third aspect, the present application provides a service device comprising: a processor, and a memory communicatively coupled to the processor;
The memory stores computer-executable instructions;
The at least one processor executes the computer-executable instructions stored in the memory to cause the at least one processor to perform the checking process of contract agreement as described above in the first aspect and the various possible designs of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having stored therein computer-executable instructions for implementing the method as described in the first aspect and the various possible designs of the first aspect, when executed by a processor.
In a fifth aspect, embodiments of the present application provide a computer program product comprising a computer program which, when executed by a processor, implements the method as described above for the first aspect and the various possible designs of the first aspect.
The application provides a contract signing inspection processing method, a contract signing inspection device, contract signing inspection equipment and a storage medium, wherein a sign person identity image is obtained according to data to be inspected; checking the identity image of the signer according to a preset identity image to generate an identity checking result; checking whether the data to be checked has abnormal data or not to generate an abnormal checking result; if the identity inspection result and the abnormal inspection result are both inspection passing, an inspection result which is the inspection passing is generated, and if the inspection result is the inspection passing, the contract file is updated according to the contract file to be inspected, so that the validity and the authenticity of the identity of the signer are ensured, and the safety of signing the contract is ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic view of a scenario of a method for checking and processing contract signing provided in an embodiment of the present application;
FIG. 2 is a flow chart of a method for checking contract signing according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a checking processing device for contract signing according to an embodiment of the present application;
fig. 4 is a schematic hardware structure of a service device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic view of a scenario of a method for checking and processing contract signing according to an embodiment of the present application. As shown in fig. 1, the scenario provided in this embodiment includes a client 101, a service device 102, a second party client 103, and a first party client 104.
The client 101 may be a mobile phone or a computer.
The service device 102 may be a server. Alternatively, the system may be one server, or may be a cluster formed by a plurality of servers.
The second party client 103 may be a mobile phone or a computer.
The first party client 104 may be a mobile phone or a computer.
Specifically, the client 101 transmits a signing request to the service device 102; the service device 102 sends a target contract file and a target verification code to the client 101 according to the signing request; the client 101 completes signing according to the target contract file and the target verification code, and sends the data to be checked and the contract file to be checked to the service equipment 102; the service device 102 checks the data to be checked, and if the check is not passed, sends a prompt of verification failure to the client 101.
Specifically, the b-party client 103 sends the file to be checked to the service device 102; the service device 102 performs auditing on the file to be audited, if the auditing is passed, the file to be audited is determined to be the file to be paid, and the file to be paid is sent to the first party client 104, if the auditing is not passed, a prompt of failure in uploading is generated according to the reason that the auditing is not passed, and the prompt of failure in uploading is sent to the second party client 103.
Fig. 2 is a flow chart of a method for checking contract according to an embodiment of the application. The execution body of the embodiment may be the service device 102 shown in fig. 1, or may be another computer device, which is not particularly limited here. As shown in fig. 2, the method includes:
S201: and acquiring a preset database, wherein the preset database comprises a plurality of contract files, and each contract file has a mapping relation with a contract number and a verification code.
S202: and receiving a signing request sent by any client, wherein the signing request comprises a target contract number.
S203: and acquiring a target contract file and a target verification code corresponding to the target contract number according to the mapping relation.
Specifically, a preset database is queried by adopting a target contract number, and a corresponding target contract file and a target verification code are acquired according to the mapping relation.
S204: sending the target contract file and the target verification code to the client so that the client responds to the operation of inputting the verification code by the client and displays a signing interface; responding to the operation that a customer clicks on a signing interface to start signing, and starting recording; responding to the operation of clicking scanning on the signing interface by a client, and scanning the signed contract file to generate a contract file to be checked; and responding to the operation that the client clicks on the signing interface to finish signing, and finishing recording to generate data to be checked.
Specifically, S204 includes S2041 to S2042:
S2041: it is determined whether the target verification code is being used.
S2042: and if the target verification code is not used, sending the target contract file and the target verification code to the client.
In another embodiment of the present application, S2042 further includes:
s2043: if it is determined that the target verification code is being used, a wait prompt is sent to the client.
The data to be checked may be point cloud data.
S205: and receiving the data to be checked and the contract file to be checked, which are sent by the client.
S206: and acquiring an identity image of the signer according to the data to be checked.
Specifically, the data to be tested is read, noise reduction and three-dimensional repair processing are carried out on the data to be tested, the processed data to be tested is obtained, and frame extraction is carried out on the processed data to be tested, so that the sign personal identification image is obtained.
S207: and acquiring a preset identity image according to the contract number.
S208: and checking the identity image of the signer according to the preset identity image to generate an identity checking result.
S209: and checking whether the data to be checked has abnormal data or not so as to generate an abnormal checking result.
Specifically, the data to be detected is read, noise reduction and three-dimensional repair processing are carried out on the data to be detected, the processed data to be detected is obtained, and whether the processed data to be detected has abnormal data or not is detected by adopting a preset algorithm, so that an abnormal detection result is generated.
Wherein the abnormal data may be dropped frame data.
S210: if the identity inspection result and the abnormal inspection result are both inspection passing, generating an inspection result which passes inspection, and updating the contract file according to the contract file to be inspected.
Specifically, the to-be-checked contract file is stored as the contract file instead of the original contract file.
S211: if the identity test result and/or the abnormal test result are/is that the test fails, generating a test result that the test fails, and sending a prompt of failure in the test to the client.
From the above description, the present application obtains an identity image of a signer according to data to be checked; checking the identity image of the signer according to a preset identity image to generate an identity checking result; checking whether the data to be checked has abnormal data or not to generate an abnormal checking result; if the identity inspection result and the abnormal inspection result are both inspection passing, an inspection result which is the inspection passing is generated, and if the inspection result is the inspection passing, the contract file is updated according to the contract file to be inspected, so that the validity and the authenticity of the identity of the signer are ensured, and the safety of signing the contract is ensured.
In one embodiment of the present application, based on the above embodiment, the method further includes a process of auditing the document to be audited, which is described in detail below:
s212: and obtaining a file to be checked sent by the second party client, wherein the file to be checked comprises a settlement summary table and a report table.
S213: and auditing the report forms according to preset auditing conditions to generate report form auditing results.
The preset auditing condition can be preset signature and stamping.
Specifically, an OCR (Optical Character Recognition ) algorithm is adopted to process the report and review form through an image noise reduction and interpolation method, and the processed report and review form is reviewed.
Specifically, a font identification model is adopted to identify the signature of the report and audit form, and the identification result is audited according to the preset signature.
The font recognition model is obtained by adopting deep learning, continuously correcting and recording special fonts and collecting various calligraphies by utilizing big data, and finally continuously training.
S214: if the report audit result is judged to pass the audit, the summary is audited to generate the summary audit result.
Specifically, an OCR (Optical Character Recognition ) algorithm is adopted to process the settlement summary table through image noise reduction and interpolation, and the processed settlement summary table is checked.
S215: if the summary table auditing result is determined to pass the auditing, determining the file to be audited as the file to be paid, and sending the file to be paid to the first party client.
S216: if the report table auditing result or the summary table auditing result is judged to be failed in auditing, generating a prompt of failed uploading according to the reasons that the auditing is failed, and sending the prompt of failed uploading to the second party client.
From the above description, the method and the device for checking the files to be checked can check the files to be checked, and if the checking is passed, the files to be checked are determined to be files to be paid, and the files to be paid are sent to the client side of the first party; if the verification is not passed, a prompt of uploading failure is generated according to the reason that the verification is not passed, and the prompt of uploading failure is sent to the second party client, so that labor cost is saved, and working efficiency is improved.
In one embodiment of the present application, the method further comprises a file archiving process based on the above embodiment, which is described in detail below:
S217: and receiving the files to be archived sent by the manager client.
The files to be archived can be stand files, purchase files, bid quotation files, review files, resolution files, prepositive files and other related file materials, contract signing versions, authorized commissions, contract negotiation memos and the like.
S218: and obtaining the file name according to the file to be archived, and uploading the file to be archived to the corresponding catalogue according to the file name.
Specifically, S218 specifically includes S2181 to S2184:
S2181: and judging whether the file name meets the standard format.
S2182: and if the file name does not meet the standard format, sending a prompt of file name error to the manager client.
S2183: and if the file name meets the standard format, analyzing keywords of the file name.
S2184: and uploading the files to be archived to the corresponding catalogues according to the keywords.
It should be noted that, the catalogue may be formulated in advance according to a bidding mode, a competitive negotiation mode, a simple purchase mode, a price-inquiring mode, etc., or according to different purchasing modes.
From the above description, the application saves labor cost and improves working efficiency.
In one embodiment of the present application, after step S217, the process of processing the time-lapse document is further included on the basis of the above embodiment, as follows:
S219: and judging whether the file to be archived comprises an aging mark or not.
Wherein, the aging label comprises an event label and a time label.
S220: and if the file to be archived comprises the aging label, generating countdown information according to the aging label.
Wherein the countdown information includes events and countdown days.
S221: and judging whether the countdown information meets preset reminding conditions or not.
The preset reminding condition may be that the countdown number of days is smaller than a specified threshold.
S222: and if the countdown information is judged to meet the preset reminding condition, sending the countdown information to the manager client.
S223: and re-executing the step of generating countdown information according to the time tag until the countdown information does not meet the preset reminding condition.
From the above description, the application reminds the file with timeliness, thereby improving the working efficiency.
In one embodiment of the present application, the method further comprises a process of checking the files after archiving, which is described in detail below, based on the above embodiment:
S224: if the directory with the empty content is detected for all the directories, the directory with the empty content is marked as an empty directory.
S225: and generating uploading prompt information according to all the empty catalogues, and sending the uploading prompt information to the manager client.
S226: for all the catalogues with non-empty contents, detecting whether the files with the uploading errors exist in the catalogues.
Specifically, a preset word recognition algorithm is adopted to recognize keywords and keywords of files in the catalogue, and whether the files with the uploading errors exist in the catalogue is detected according to the keywords and the keywords.
S227: if the file with the uploading error is detected, the file with the uploading error is marked as an error file.
S228: and generating a prompt for uploading the error according to all the error files, and sending the prompt for uploading the error to the administrator client.
As can be seen from the description, the file archiving method and device can reduce the error rate of file archiving, prompt uploading of the files in time and improve the working efficiency.
Fig. 3 is a schematic structural diagram of a checking processing device for contract signing according to an embodiment of the present application. As shown in fig. 3, the inspection processing device 30 for contract agreement includes: an acquisition module 301, a reception module 302, a transmission module 303, a verification module 304 and an update module 305.
The acquiring module 301 is configured to acquire a preset database, where the preset database includes a plurality of contract files, and each contract file has a mapping relationship with a contract number and a verification code;
a receiving module 302, configured to receive a signing request sent by any client, where the signing request includes a target contract number;
The acquiring module 301 is further configured to acquire a target contract file and a target verification code corresponding to the target contract number according to the mapping relationship;
A sending module 303, configured to send the target contract file and the target verification code to the client, so that the client displays a signing interface in response to an operation of inputting the verification code by the client; responding to the operation that a customer clicks on the signing interface to start signing, and starting recording; responding to the operation of clicking scanning by a client on the signing interface, and scanning the signed contract file to generate a contract file to be checked; responding to the operation of ending signing by clicking the signing interface by the client, ending recording, and generating data to be checked;
the receiving module 302 is further configured to receive the data to be verified and the contract file to be verified, which are sent by the client;
The acquiring module 301 is further configured to acquire an identifier image according to the data to be inspected;
The acquiring module 301 is further configured to acquire a preset identity image according to the contract number;
the checking module 304 is configured to check the identity image of the signer according to the preset identity image, and generate an identity check result;
the inspection module 304 is further configured to inspect whether the data to be inspected has abnormal data, so as to generate an abnormal inspection result;
an updating module 305, configured to generate a verification result that passes the verification if the identity verification result and the abnormality verification result are both passed the verification, and update the contract file according to the contract file to be verified;
The sending module 303 is further configured to generate a verification result that the verification fails if the identity verification result and/or the abnormal verification result are not passed, and send a prompt for failure in verification to the client.
In one possible design, the checking and processing device 30 for contracting further includes:
The auditing module 306 is configured to obtain a file to be audited sent by the second party client, where the file to be audited includes a settlement summary table and a report audit table; auditing the report forms according to preset auditing conditions to generate report form auditing results; if the report audit result is judged to pass audit, audit is carried out on the settlement summary table so as to generate a summary table audit result; if the summary table auditing result is judged to pass the auditing, determining that the file to be audited is a file to be paid, and sending the file to be paid to a first party client; if the report audit result or the summary audit result is judged to be not passed, generating a prompt of uploading failure according to the reason that the audit is not passed, and sending the prompt of uploading failure to the B side client.
In one possible design, the checking and processing device 30 for contracting further includes:
An archiving module 307, configured to receive a file to be archived sent by an administrator client; and acquiring a file name according to the file to be archived, and uploading the file to be archived to a corresponding directory according to the file name.
In one possible design, the archiving module 307 is specifically configured to: judging whether the file name meets a standard format or not; if the file name does not meet the standard format, sending a prompt of file name error to the manager client; if the file name meets the standard format, analyzing keywords of the file name; and uploading the files to be archived to the corresponding catalogues according to the keywords.
In one possible design, the checking and processing device 30 for contracting further includes:
A reminding module 308, configured to determine whether the file to be archived includes an aging label; if the file to be archived comprises an aging label, generating countdown information according to the aging label; judging whether the countdown information meets a preset reminding condition or not; if the countdown information is judged to meet the preset reminding condition, the countdown information is sent to the manager client; and re-executing the step of generating countdown information according to the time tag until the countdown information does not meet the preset reminding condition.
In one possible design, the archiving module 307 is further configured to: if the catalogue with the empty content is detected, marking the catalogue with the empty content as an empty catalogue; generating uploading prompt information according to all the empty catalogues, and sending the uploading prompt information to the manager client; detecting whether uploading error files exist in the catalogue aiming at the catalogue with all the contents not being empty; if the file with the uploading error is detected, marking the file with the uploading error as an error file; and generating a prompt for uploading the error according to all the error files, and sending the prompt for uploading the error to the manager client.
In one possible design, the sending module 303 is specifically configured to: judging whether the target verification code is being used or not; and if the target verification code is judged to be unused, the target contract file and the target verification code are sent to the client.
In one possible design, the sending module 303 is further specifically configured to: and if the target verification code is judged to be used, sending a waiting prompt to the client.
The device provided in this embodiment may be used to implement the technical solution of the foregoing method embodiment, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
Fig. 4 is a schematic hardware structure of a service device according to an embodiment of the present application. As shown in fig. 4, the service apparatus 40 of the present embodiment includes: at least one processor 401 and a memory 402; the memory stores computer-executable instructions; at least one processor executing computer-executable instructions stored in a memory, causing the at least one processor to perform the checking process method of contracting as described above;
Alternatively, the memory 402 may be separate or integrated with the processor 401.
When the memory 402 is provided separately, the service device further comprises a bus 403 for connecting said memory 402 and the processor 401.
The embodiment of the application also provides a computer readable storage medium, wherein computer execution instructions are stored in the computer readable storage medium, and when a processor executes the computer execution instructions, the checking processing method for contract signing is realized.
The embodiment of the application also provides a computer program product, comprising a computer program which realizes the checking processing method of contract signing as described above when being executed by a processor.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present application.
It should be further noted that, although the steps in the flowchart are sequentially shown as indicated by arrows, the steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least a portion of the steps in the flowcharts may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order in which the sub-steps or stages are performed is not necessarily sequential, and may be performed in turn or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
It will be appreciated that the device embodiments described above are merely illustrative and that the device of the application may be implemented in other ways. For example, the division of the units/modules in the above embodiments is merely a logic function division, and there may be another division manner in actual implementation. For example, multiple units, modules, or components may be combined, or may be integrated into another system, or some features may be omitted or not performed.
In addition, each functional unit/module in each embodiment of the present application may be integrated into one unit/module, or each unit/module may exist alone physically, or two or more units/modules may be integrated together, unless otherwise specified. The integrated units/modules described above may be implemented either in hardware or in software program modules.
The integrated units/modules, if implemented in hardware, may be digital circuits, analog circuits, etc. Physical implementations of hardware structures include, but are not limited to, transistors, memristors, and the like. The processor may be any suitable hardware processor, such as CPU, GPU, FPGA, DSP and an ASIC, etc., unless otherwise specified. Unless otherwise indicated, the storage elements may be any suitable magnetic or magneto-optical storage medium, such as resistive Random Access Memory RRAM (Resistive Random Access Memory), dynamic Random Access Memory DRAM (Dynamic Random Access Memory), static Random Access Memory SRAM (Static Random-Access Memory), enhanced dynamic Random Access Memory EDRAM (ENHANCED DYNAMIC Random Access Memory), high-Bandwidth Memory HBM (High-Bandwidth Memory), hybrid storage cube HMC (Hybrid Memory Cube), etc.
The integrated units/modules may be stored in a computer readable memory if implemented in the form of software program modules and sold or used as a stand-alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in whole or in part in the form of a software product stored in a memory, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method of the various embodiments of the present application. And the aforementioned memory includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments. The technical features of the foregoing embodiments may be arbitrarily combined, and for brevity, all of the possible combinations of the technical features of the foregoing embodiments are not described, however, all of the combinations of the technical features should be considered as being within the scope of the disclosure.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (12)

1. A method of checking contract agreement, applied to a service device, comprising:
Acquiring a preset database, wherein the preset database comprises a plurality of contract files, and each contract file has a mapping relation with a contract number and a verification code;
receiving a signing request sent by any client, wherein the signing request comprises a target contract number;
acquiring a target contract file and a target verification code corresponding to the target contract number according to the mapping relation;
Sending the target contract file and the target verification code to the client so that the client responds to the operation of inputting the verification code by the client and displays a signing interface; responding to the operation that a customer clicks on the signing interface to start signing, and starting recording; responding to the operation of clicking scanning by a client on the signing interface, and scanning the signed contract file to generate a contract file to be checked; responding to the operation of ending signing by clicking the signing interface by the client, ending recording, and generating data to be checked;
Receiving the data to be checked and the contract file to be checked, which are sent by the client;
Acquiring an identity image of the sign-on person according to the data to be checked;
Acquiring a preset identity image according to the contract number;
checking the identity image of the signer according to the preset identity image to generate an identity checking result;
checking whether the data to be checked has abnormal data or not to generate an abnormal check result;
if the identity inspection result and the abnormal inspection result are both inspection passing, generating an inspection result passing inspection, and updating the contract file according to the contract file to be inspected;
if the identity test result and/or the abnormal test result are/is that the test fails, generating a test result that the test fails, and sending a prompt of failure of the test to the client.
2. The method as recited in claim 1, further comprising:
Acquiring a file to be checked sent by a party B client, wherein the file to be checked comprises a settlement summary table and a report table;
auditing the report forms according to preset auditing conditions to generate report form auditing results;
If the report audit result is judged to pass audit, audit is carried out on the settlement summary table so as to generate a summary table audit result;
If the summary table auditing result is judged to pass the auditing, determining that the file to be audited is a file to be paid, and sending the file to be paid to a first party client;
if the report audit result or the summary audit result is judged to be not passed, generating a prompt of uploading failure according to the reason that the audit is not passed, and sending the prompt of uploading failure to the B side client.
3. The method as recited in claim 1, further comprising:
Receiving a file to be archived sent by an administrator client;
and acquiring a file name according to the file to be archived, and uploading the file to be archived to a corresponding directory according to the file name.
4. A method according to claim 3, wherein said uploading the file to be archived into the corresponding directory according to the file name comprises:
Judging whether the file name meets a standard format or not;
if the file name does not meet the standard format, sending a prompt of file name error to the manager client;
if the file name meets the standard format, analyzing keywords of the file name;
And uploading the files to be archived to the corresponding catalogues according to the keywords.
5. The method of claim 3, wherein after receiving the file to be archived sent by the administrator client, further comprising:
judging whether the file to be archived comprises an aging mark or not;
If the file to be archived comprises an aging label, generating countdown information according to the aging label;
Judging whether the countdown information meets a preset reminding condition or not;
if the countdown information is judged to meet the preset reminding condition, the countdown information is sent to the manager client;
and re-executing the step of generating countdown information according to the time tag until the countdown information does not meet the preset reminding condition.
6. A method according to claim 3, further comprising:
if the catalogue with the empty content is detected, marking the catalogue with the empty content as an empty catalogue;
Generating uploading prompt information according to all the empty catalogues, and sending the uploading prompt information to the manager client;
Detecting whether uploading error files exist in the catalogue aiming at the catalogue with all the contents not being empty;
If the file with the uploading error is detected, marking the file with the uploading error as an error file;
And generating a prompt for uploading the error according to all the error files, and sending the prompt for uploading the error to the manager client.
7. The method of any of claims 1 to 6, wherein the sending the target contract file and target verification code to the client comprises:
Judging whether the target verification code is being used or not;
And if the target verification code is judged to be unused, the target contract file and the target verification code are sent to the client.
8. The method of claim 7, wherein said determining if said verification code is being used further comprises:
and if the target verification code is judged to be used, sending a waiting prompt to the client.
9. A contract signing inspection processing apparatus, characterized by being applied to a service device, comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a preset database, the preset database comprises a plurality of contract files, and each contract file has a mapping relation with a contract number and a verification code;
The receiving module is used for receiving a signing request sent by any client, wherein the signing request comprises a target contract number;
The acquisition module is further used for acquiring a target contract file and a target verification code corresponding to the target contract number according to the mapping relation;
The sending module is used for sending the target contract file and the target verification code to the client so that the client responds to the operation of inputting the verification code by the client and displays a signing interface; responding to the operation that a customer clicks on the signing interface to start signing, and starting recording; responding to the operation of clicking scanning by a client on the signing interface, and scanning the signed contract file to generate a contract file to be checked; responding to the operation of ending signing by clicking the signing interface by the client, ending recording, and generating data to be checked;
The receiving module is further used for receiving the data to be checked and the contract file to be checked, which are sent by the client;
The acquisition module is also used for acquiring an identity image of the sign-on person according to the data to be checked;
the acquisition module is also used for acquiring a preset identity image according to the contract number;
The checking module is used for checking the identity image of the signer according to the preset identity image to generate an identity checking result;
the checking module is further used for checking whether the data to be checked has abnormal data or not so as to generate an abnormal checking result;
The updating module is used for generating a checking result passing the checking if the identity checking result and the abnormal checking result are both the checking passing results, and updating the contract file according to the contract file to be checked;
the sending module is further configured to generate a verification result that the verification fails if the identity verification result and/or the abnormal verification result are not passed, and send a prompt of failure in verification to the client.
10. A service apparatus, comprising: a processor, and a memory communicatively coupled to the processor;
The memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of checking the contract according to any one of claims 1 to 8.
11. A computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, are adapted to carry out the method of checking the contract according to any one of claims 1 to 8.
12. A computer program product comprising a computer program which, when executed by a processor, implements the method of any one of claims 1 to 8.
CN202410244195.8A 2024-03-04 2024-03-04 Contract signing verification processing method, device, equipment and storage medium Pending CN118094502A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410244195.8A CN118094502A (en) 2024-03-04 2024-03-04 Contract signing verification processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410244195.8A CN118094502A (en) 2024-03-04 2024-03-04 Contract signing verification processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN118094502A true CN118094502A (en) 2024-05-28

Family

ID=91143700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410244195.8A Pending CN118094502A (en) 2024-03-04 2024-03-04 Contract signing verification processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118094502A (en)

Similar Documents

Publication Publication Date Title
WO2019237565A1 (en) Loan service processing method and apparatus, computer device and readable storage medium
US10482541B2 (en) VIN based insurance claim system
US7693833B2 (en) System and method for improving integrity of internet search
AU2017280904B2 (en) Automation of image validation
WO2020082673A1 (en) Invoice inspection method and apparatus, computing device and storage medium
CN111444101A (en) Method and device for automatically creating product test defects
CN112529575A (en) Risk early warning method, equipment, storage medium and device
CN110895711A (en) Job entry management method and device
CN114579523A (en) Double-recording file quality inspection method and device, computer equipment and storage medium
CN113938481A (en) Receipt processing method, processing device, electronic equipment and readable storage medium
CN112131100A (en) Metadata-based front-end and back-end verification method and device
CN118094502A (en) Contract signing verification processing method, device, equipment and storage medium
CN114529269B (en) Invalid operation range processing method and device, electronic equipment and storage medium
CN112487270A (en) Method and device for asset classification and accuracy verification based on picture identification
CN110717732A (en) Information authentication method and system
CN115577703A (en) Certificate supervision and delivery data verification method, device and system and storage medium
US20220309084A1 (en) Record matching in a database system
CN114240436A (en) Electronic certificate verification and cancellation method and device, computer equipment and storage medium
CN112115836A (en) Information verification method and device, computer readable storage medium and electronic equipment
CN111209548A (en) Enterprise information verification and checking system and method based on cloud platform
CN113395370B (en) Method and device for automatically configuring user-defined domain name
CN110673888B (en) Verification method and device for configuration file
CN110942274B (en) Method and device for generating court proposal report
CN116756226B (en) File generation method, device, server, user equipment and storage medium
CN110661678B (en) Abnormity monitoring method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination