CN108234442B - Method, system and readable storage medium for acquiring contract - Google Patents

Method, system and readable storage medium for acquiring contract Download PDF

Info

Publication number
CN108234442B
CN108234442B CN201711030640.7A CN201711030640A CN108234442B CN 108234442 B CN108234442 B CN 108234442B CN 201711030640 A CN201711030640 A CN 201711030640A CN 108234442 B CN108234442 B CN 108234442B
Authority
CN
China
Prior art keywords
contract
party
acquiring
dimensional code
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711030640.7A
Other languages
Chinese (zh)
Other versions
CN108234442A (en
Inventor
侯庭伟
孙建平
黄丽标
李俊
蒋澜
周波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN201711030640.7A priority Critical patent/CN108234442B/en
Publication of CN108234442A publication Critical patent/CN108234442A/en
Application granted granted Critical
Publication of CN108234442B publication Critical patent/CN108234442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for acquiring contracts, which comprises the following steps: acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract; generating a corresponding two-dimensional code according to the encrypted contract so as to be printed by a participant or a monitoring party with printing authority; and when a contract checking instruction triggered by scanning the two-dimensional code by a third party is received, verifying the encrypted contract, and granting the third party the right to access a preset website after the verification is successful so that the third party browses the contract. The invention also discloses a system for acquiring the contract and a computer readable storage medium. The invention can enable a third party to browse and view the contracts.

Description

Method, system and readable storage medium for acquiring contract
Technical Field
The present invention relates to the field of block chain technology, and in particular, to a method, a system, and a computer-readable storage medium for obtaining contracts.
Background
With the development of society and the progress of information technology, as well as the development of bitcoin and blockchain technology, a transaction mode based on a blockchain application platform begins to appear in the market. When the transaction is carried out in such a transaction mode, the participants need to sign the agreement and the contract through the digital signing platform, and for the whole block chain, only the participants and/or the authorized monitoring party view and print the signed agreement and the contract, but other third parties and the arbitrator cannot view the signed agreement and the contract due to the safety and the like, so that the monitoring and the verification of the agreement and the contract by the third parties are inconvenient.
Disclosure of Invention
The invention mainly aims to provide a method, a system and a computer readable storage medium for acquiring contracts, aiming at solving the technical problem that other third parties and an arbitrator cannot browse and check signed contracts and contracts.
In order to achieve the above object, the present invention provides a method for acquiring a contract, the method comprising:
acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract;
generating a corresponding two-dimensional code according to the encrypted contract so as to be printed by a participant or a monitoring party with printing authority;
and when a contract checking instruction triggered by scanning the two-dimensional code by a third party is received, verifying the encrypted contract, and granting the third party the right to access a preset website after the verification is successful so that the third party browses the contract.
Optionally, the step of encrypting the obtained contract includes:
symmetrically encrypting the acquired contract;
and carrying out asymmetric public key encryption on the symmetric key of the symmetric encryption through the preset website.
Optionally, the two-dimensional code includes:
the method comprises the steps of presetting a uniform resource locator of a website, wherein the uniform resource locator comprises an access address for accessing a contract corresponding to a digital signing platform and a symmetric key for accessing a symmetric encryption contract.
Optionally, the step of verifying the encrypted contract includes:
extracting a private key when asymmetric encryption is carried out, and decrypting the encrypted contract through the private key;
when the decryption is successful, the verification is determined to be passed.
Optionally, before the step of granting the third party the right to access the preset website, the method further includes:
acquiring a symmetric key in a two-dimensional code verified by a preset website;
comparing the symmetric key with a symmetric key during symmetric encryption;
and when the symmetric key is consistent with the symmetric key in the symmetric encryption, granting the third party the permission to access the preset website.
Optionally, after the step of generating the corresponding two-dimensional code according to the encrypted contract, the method further includes:
when a two-dimensional code printing instruction is received, a participant or a monitoring party triggering the printing instruction is extracted;
judging whether the participator or the monitoring party has the authority of printing the two-dimensional code;
and if the participant or the monitoring party has the authority of printing the two-dimensional code, executing the instruction of printing the two-dimensional code.
Optionally, after the step of verifying the encrypted contract, the method further includes:
and when the verification fails, rejecting the request of the third party for accessing the preset website.
Optionally, after the step of granting the third party the right to access the preset website after the verification is successful, the method further includes:
when detecting that the third party enters a preset website, displaying information provided by the third party for identity authentication;
and when receiving the information for identity authentication, displaying the contract, and sending the received information for identity authentication and the prompt information of a third party for browsing the contract to the participants.
In addition, to achieve the above object, the present invention also provides a system for acquiring a contract, including: the contract acquisition method comprises a block chain, a preset website and a contract acquisition program, wherein the contract acquisition program realizes the steps of the contract acquisition method when being executed by the block chain and the preset website.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a program for acquiring a contract, which when executed by a processor implements the steps of the method for acquiring a contract as described above.
The method, the system and the computer readable storage medium for acquiring the contract provided by the invention firstly acquire the contract of the digital signing platform stored in the block chain and encrypt the acquired contract; then generating a corresponding two-dimensional code according to the encrypted contract for printing by a participant or a monitoring party with printing authority; when a contract checking instruction triggered by scanning the two-dimensional code is received by a third party, the encrypted contract is verified, the authority of the third party for accessing a preset website is granted after the verification is successful, so that the third party can browse the contract.
Drawings
FIG. 1 is a schematic flow chart diagram of a first embodiment of a method for obtaining contracts according to the present invention;
fig. 2 is a detailed flowchart illustrating a step of encrypting a contract acquired in a second embodiment of a method of acquiring a contract according to the present invention;
FIG. 3 is a detailed flowchart of the step of verifying the encrypted contract according to the third embodiment of the method for obtaining a contract of the present invention;
FIG. 4 is a schematic flow chart of a sixth embodiment of a method for obtaining contracts according to the present invention;
fig. 5 is a schematic diagram of a system hardware structure for acquiring a contract according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: firstly, acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract; then generating a corresponding two-dimensional code according to the encrypted contract for printing by a participant or a monitoring party with printing authority; when a contract checking instruction triggered by scanning the two-dimensional code is received by a third party, the encrypted contract is verified, the authority of the third party for accessing a preset website is granted after the verification is successful, so that the third party can browse the contract.
In the embodiment of the invention, in consideration of safety and the like, in the prior art, only the participating party and/or the authorized monitoring party check and print the signed agreement and contract, but other third parties and the arbitrator cannot browse and check the signed agreement and contract, so that the third parties are inconvenient to monitor and verify the agreement and contract.
The embodiment of the invention provides a method for acquiring contracts, which comprises the steps of firstly acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract; then generating a corresponding two-dimensional code according to the encrypted contract for printing by a participant or a monitoring party with printing authority; when a contract checking instruction triggered by scanning the two-dimensional code is received by a third party, the encrypted contract is verified, the authority of the third party for accessing a preset website is granted after the verification is successful, so that the third party can browse the contract.
The invention provides a method for acquiring contracts.
Referring to fig. 1, fig. 1 is a schematic flow chart of a first embodiment of a method for acquiring a contract according to the present invention.
In this embodiment, the method includes:
step S10, acquiring a digital signing platform contract stored in the block chain, and encrypting the acquired contract;
in this embodiment, the method for obtaining a contract is applied to a system for obtaining a contract, specifically, please refer to fig. 5, where fig. 5 is a schematic diagram of a system architecture of obtaining a contract according to an embodiment of the present invention, where the system for obtaining a contract includes: the contract searching method comprises a block chain, a preset website and a program for acquiring a contract, wherein the preset website is a public WEB specifically, and a third party can browse and look up the contract only through the public WEB.
In this embodiment, since the block chain (Blockchain) is composed of a string of data blocks generated by using a cryptography method, each block contains a hash value (hash) of the previous block, and the block chain is formed by connecting the starting block (genetics block) to the current block. The block chain is also a distributed database system participated by the nodes, is a decentralized database book essentially, is a network platform shared equally by people, and provides a foundation for the joint participation of the whole members; the records uploaded to the blockchain are completely public, and people can obtain copies of all the records, so that people are encouraged to participate together; taking a block chain of the bitcoin as an example, each participant is a node of the block network, each node has a complete public account book backup, and all transaction information since the birth of the bitcoin is recorded on the public account book backup. Any node initiating a transaction needs to transmit relevant information to each node in the block network, so that the account book on all the nodes can verify the transaction and accurately update the transaction. In addition, the account book is stored in blocks, and with the increase of transactions, new data blocks can be attached to the existing chains to form a chain structure. Meanwhile, the block chain is supervised and restricted by multiple parties, so that the block chain has the characteristic of being not falsifiable, namely, data uploaded to the block chain cannot be changed, and the authenticity of the data is ensured. If a malicious node provides false data, the false data is taken as a permanent record of historical guilt certificates, so that uploading of the false data is greatly reduced. Therefore, in the embodiment of the invention, the signed contract is saved in the block chain, so that the authenticity of the contract is ensured, and the contract is prevented from being tampered, after the contract is saved, when the contract needs to be encrypted, firstly, the contract needing to be encrypted needs to be extracted, and then, on the basis of ensuring the security of a digital signing platform for signing the contract without damage and ensuring the privacy of a signing party, the extracted contract is encrypted, wherein, in order to ensure the security of the contract in the data transmission process, the contracts are encrypted in multiple layers by combining the encryption ideas of symmetric encryption and asymmetric encryption, wherein the symmetric encryption means that two parties for sending and receiving data use the same secret key (symmetric secret key) to encrypt and decrypt the plaintext, the encryption and decryption speed is high, the contract is suitable for processing a large amount of data, but the encryption and decryption use the same symmetric secret key, management of the symmetric key is difficult. While asymmetric encryption requires two keys: public key (public key) and private key (private key), the public key is disclosed to other parties, the private key is stored by itself; the public key and the private key are a pair, and if the public key is used for encrypting data, the data can be decrypted only by using the corresponding private key; if the data is encrypted with the private key, then the decryption can be performed only with the corresponding public key; the algorithm of asymmetric encryption is complex, so that the encryption and decryption speed is not as high as that of symmetric encryption and decryption, but the security of the asymmetric encryption and decryption method is superior to that of symmetric encryption because the encryption and decryption keys are different.
Step S20, generating a corresponding two-dimensional code according to the encrypted contract for printing by a participant or a monitoring party with printing authority;
after the contracts are encrypted, corresponding two-dimensional codes are generated according to symmetric keys which are symmetrically encrypted, after the contracts are stored in corresponding block chain nodes, participants or monitoring parties can check and print the stored contracts, after the contracts are printed, the two-dimensional codes can be printed, a third party can obtain the corresponding contract contents on the block chain nodes by scanning the printed two-dimensional codes, and it can be understood that the third party can only check the corresponding contract contents on the block chain nodes and cannot modify the contract contents.
Further, the two-dimensional code includes:
the method comprises the steps of presetting a uniform resource locator of a website, wherein the uniform resource locator comprises an access address for accessing a contract corresponding to a digital signing platform and a symmetric key for accessing a symmetric encryption contract.
The two-dimensional code comprises an address for accessing public WEB and a symmetric key obtained after symmetric encryption, so that the contract can be browsed and checked through the public WEB and the symmetric key.
And step S30, when a contract checking instruction triggered by the third party through scanning the two-dimensional code is received, verifying the encrypted contract, and granting the third party the right to access a preset website after the verification is successful so that the third party can browse the contract.
In the embodiment of the invention, the symmetric key after asymmetric encryption can be decrypted only through public WEB, therefore, when the contract checking instruction is received, the contract checking instruction is firstly submitted to public WEB, the symmetric key after asymmetric encryption is decrypted through the public WEB, after decryption, the third party can obtain the authority of accessing the public WEB, and then further verifies whether the symmetric key in the two-dimensional code is correct or not, and when the symmetric key is correct, a third party can browse the contract.
The method for acquiring the contract provided by the embodiment includes the steps of firstly acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract; then generating a corresponding two-dimensional code according to the encrypted contract for printing by a participant or a monitoring party with printing authority; when a contract checking instruction triggered by scanning the two-dimensional code is received by a third party, the encrypted contract is verified, the authority of the third party for accessing a preset website is granted after the verification is successful, so that the third party can browse the contract.
Further, referring to fig. 2, a second embodiment of the method of acquiring a contract of the present invention is proposed based on the first embodiment of the method of acquiring a contract of the present invention.
In this embodiment, the step S10 includes:
step S11, symmetrically encrypting the acquired contract;
and step S12, carrying out asymmetric public key encryption on the symmetric key of the symmetric encryption through the preset website.
In this embodiment, in order to ensure the security of the contract during data transmission, the ideas of symmetric encryption and asymmetric encryption can be combined, and the contract is encrypted in multiple layers, where symmetric encryption refers to that both sides sending and receiving data use the same key (symmetric key) to encrypt and decrypt the plaintext, and the encryption and decryption speed is high, which is suitable for processing a large amount of data, but the same symmetric key is used for encryption and decryption, so that the management of the symmetric key is difficult. While asymmetric encryption requires two keys: public key (public key) and private key (private key), the public key is disclosed to other parties, the private key is stored by itself; the public key and the private key are a pair, and if the public key is used for encrypting data, the data can be decrypted only by using the corresponding private key; if the data is encrypted with the private key, then the decryption can be performed only with the corresponding public key; the algorithm of asymmetric encryption is complex, so that the encryption and decryption speed is not as high as that of symmetric encryption and decryption, but the security of the asymmetric encryption and decryption method is superior to that of symmetric encryption because the encryption and decryption keys are different.
Therefore, the embodiment adopts the symmetric encryption of the contract, and because the security of the contract is destroyed if the plaintext of the symmetric key is displayed, the asymmetric encryption of the symmetric key is further performed, thereby ensuring the security of the contract.
In the method for acquiring a contract provided by the embodiment, the acquired contract is symmetrically encrypted; and then, the symmetric key of the symmetric encryption is subjected to asymmetric public key encryption through the preset website, so that the safety of the contract is ensured.
Further, referring to fig. 3, a third embodiment of the method of acquiring a contract of the present invention is proposed based on the first embodiment of the method of acquiring a contract of the present invention.
In this embodiment, the step S30 includes:
step S31, extracting the private key when asymmetric encryption is carried out, and decrypting the encrypted contract through the private key;
in step S32, when the decryption is successful, the verification is determined to be passed.
In this embodiment, because the security of the contract is destroyed in consideration of the plaintext display of the symmetric key, in order to ensure the security of the symmetric key, the symmetric key may be encrypted in an asymmetric encryption manner, that is, the public key in the asymmetric key group is used for encryption, and the private key corresponding to the public key must only exist in the public WEB, so that it is ensured that other third parties cannot decrypt the encrypted content of the public key, thereby improving the security, and therefore, the symmetric key may be encrypted by using the common key of the asymmetric key.
Therefore, verifying the encrypted contract is to decrypt the encrypted symmetric key, specifically, decrypting the symmetric key after asymmetric encryption by using the private key during asymmetric encryption, and since the private key is stored in the public WEB, firstly, extracting the private key during asymmetric encryption from the public WEB, and decrypting the encrypted symmetric key by using the private key; when the decryption is successful, the verification is determined to be passed.
Further, after the step of verifying the encrypted contract, the method further includes:
and when the verification fails, rejecting the request of the third party for accessing the preset website.
Namely when the encrypted symmetric key is decrypted by the private key; and when the decryption fails, determining that the verification fails, and rejecting the request of the third party for accessing the preset website.
Further, the first embodiment of the method of acquiring a contract according to the present invention proposes a fourth embodiment of the method of acquiring a contract according to the present invention.
In this embodiment, before the step of granting the third party the right to access the preset website, the method further includes:
acquiring a symmetric key in a two-dimensional code verified by a preset website;
comparing the symmetric key with a symmetric key during symmetric encryption;
and when the symmetric key is consistent with the symmetric key in the symmetric encryption, granting the third party the permission to access the preset website.
In this embodiment, after the encrypted symmetric key is decrypted by the private key, the symmetric key needs to be further verified, that is, whether the symmetric key included in the current two-dimensional code is consistent with the symmetric key during symmetric encryption is verified, specifically, the symmetric key in the two-dimensional code verified through public WEB is obtained; then comparing the symmetric key with the symmetric key during symmetric encryption; and when the symmetric key is consistent with the symmetric key in the symmetric encryption, granting the third party the permission to access the preset website.
Further, a fifth embodiment of the method of acquiring a contract of the present invention is proposed based on the first embodiment of the method of acquiring a contract of the present invention.
In this embodiment, after the step of generating the corresponding two-dimensional code according to the encrypted contract, the method further includes:
when a two-dimensional code printing instruction is received, a participant or a monitoring party triggering the printing instruction is extracted;
judging whether the participator or the monitoring party has the authority of printing the two-dimensional code;
and if the participant or the monitoring party has the authority of printing the two-dimensional code, executing the instruction of printing the two-dimensional code.
In this embodiment, when a two-dimensional code printing instruction is received, whether a participant or a monitoring party triggering the printing instruction has the right to print needs to be verified, and the participant or the monitoring party triggering the printing instruction is extracted; specifically, the method includes extracting identity authentication information of a participant or a monitoring party, and then judging whether the participant or the monitoring party has the authority of printing the two-dimensional code according to the identity authentication information; and if the participant or the monitoring party has the authority of printing the two-dimensional code, executing the instruction of printing the two-dimensional code and printing the two-dimensional code.
Further, referring to fig. 4, a sixth embodiment of the method of acquiring a contract of the present invention is proposed based on the first embodiment of the method of acquiring a contract of the present invention.
In this embodiment, the steps after step S30 further include:
step S40, when detecting that the third party enters the preset website, displaying the information provided by the third party for identity authentication;
and step S50, when receiving the information for identity authentication, displaying the contract, and sending the received information for identity authentication and the prompt information of the third party for browsing the contract to the participating party.
In this embodiment, when the encrypted symmetric key is decrypted by the private key; when the decryption is successful and the symmetric key contained in the current two-dimensional code is consistent with the symmetric key in the symmetric encryption, when a third party is detected to enter a preset website, displaying information for performing identity verification provided by the third party; the method comprises the steps of reminding a third party about to browse the contract to input identity verification information so as to obtain the identity of the third party who browses the contract, displaying the contract when the identity verification information is received, and sending the received identity verification information and prompt information of the third party to browse the contract so that the participating party can know that the contract is browsed and know the identity of the third party who browses the contract.
The invention further provides a system for acquiring contracts.
As shown in fig. 5, the system for acquiring contracts may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., a Wi-Fi interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the system for obtaining contracts may further include a user interface, a network interface, a camera, RF (Radio Frequency) circuitry, a sensor, audio circuitry, a WiFi module, and the like. The user interface may comprise a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may also comprise a standard wired interface, a wireless interface. The network interface may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the system architecture of the acquisition contract shown in FIG. 5 does not constitute a limitation on the system for acquiring contracts, and may include more or fewer components than shown, or some components in combination, or a different arrangement of components.
As shown in fig. 5, a memory 1005, which is a kind of computer storage medium, may include therein an operating system and a program for acquiring a contract. The operating system is a program for managing and acquiring hardware and software resources of the system, and supports the operation of the program for acquiring the contract and other software or programs.
In the system for acquiring contracts shown in fig. 5, the network interface 1004 is mainly used for connecting with a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client and performing data communication with the client; and processor 1001 may be configured to call a program stored in memory 1005 to obtain a contract and perform the following operations:
acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract;
generating a corresponding two-dimensional code according to the encrypted contract so as to be printed by a participant or a monitoring party with printing authority;
and when a contract checking instruction triggered by scanning the two-dimensional code by a third party is received, verifying the encrypted contract, and granting the third party the right to access a preset website after the verification is successful so that the third party browses the contract.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
symmetrically encrypting the acquired contract;
and carrying out asymmetric public key encryption on the symmetric key of the symmetric encryption through the preset website.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
the method comprises the steps of presetting a uniform resource locator of a website, wherein the uniform resource locator comprises an access address for accessing a contract corresponding to a digital signing platform and a symmetric key for accessing a symmetric encryption contract.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
extracting a private key when asymmetric encryption is carried out, and decrypting the encrypted contract through the private key;
when the decryption is successful, the verification is determined to be passed.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
acquiring a symmetric key in a two-dimensional code verified by a preset website;
comparing the symmetric key with a symmetric key during symmetric encryption;
and when the symmetric key is consistent with the symmetric key in the symmetric encryption, granting the third party the permission to access the preset website.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
when a two-dimensional code printing instruction is received, a participant or a monitoring party triggering the printing instruction is extracted;
judging whether the participator or the monitoring party has the authority of printing the two-dimensional code;
and if the participant or the monitoring party has the authority of printing the two-dimensional code, executing the instruction of printing the two-dimensional code.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
and when the verification fails, rejecting the request of the third party for accessing the preset website.
Further, the processor 1001 is further configured to execute the program for acquiring a contract stored in the memory 1004 to implement the following steps:
when detecting that the third party enters a preset website, displaying information provided by the third party for identity authentication;
and when receiving the information for identity authentication, displaying the contract, and sending the received information for identity authentication and the prompt information of a third party for browsing the contract to the participants.
The specific embodiment of the system for acquiring the contract of the present invention is basically the same as the embodiments of the method for acquiring the contract, and is not described herein again.
The present invention further provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to perform the steps of:
acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract;
generating a corresponding two-dimensional code according to the encrypted contract so as to be printed by a participant or a monitoring party with printing authority;
and when a contract checking instruction triggered by scanning the two-dimensional code by a third party is received, verifying the encrypted contract, and granting the third party the right to access a preset website after the verification is successful so that the third party browses the contract.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
symmetrically encrypting the acquired contract;
and carrying out asymmetric public key encryption on the symmetric key of the symmetric encryption through the preset website.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
the method comprises the steps of presetting a uniform resource locator of a website, wherein the uniform resource locator comprises an access address for accessing a contract corresponding to a digital signing platform and a symmetric key for accessing a symmetric encryption contract.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
extracting a private key when asymmetric encryption is carried out, and decrypting the encrypted contract through the private key;
when the decryption is successful, the verification is determined to be passed.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
acquiring a symmetric key in a two-dimensional code verified by a preset website;
comparing the symmetric key with a symmetric key during symmetric encryption;
and when the symmetric key is consistent with the symmetric key in the symmetric encryption, granting the third party the permission to access the preset website.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
when a two-dimensional code printing instruction is received, a participant or a monitoring party triggering the printing instruction is extracted;
judging whether the participator or the monitoring party has the authority of printing the two-dimensional code;
and if the participant or the monitoring party has the authority of printing the two-dimensional code, executing the instruction of printing the two-dimensional code.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
and when the verification fails, rejecting the request of the third party for accessing the preset website.
Further, the one or more programs are executable by the one or more processors to also implement the steps of:
when detecting that the third party enters a preset website, displaying information provided by the third party for identity authentication;
and when receiving the information for identity authentication, displaying the contract, and sending the received information for identity authentication and the prompt information of a third party for browsing the contract to the participants.
The specific embodiment of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the method for obtaining a contract and the system for obtaining a contract, and will not be described herein again.
It should also be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method of obtaining contracts, the method comprising the steps of:
acquiring a digital signing platform contract stored in a block chain, and encrypting the acquired contract;
generating a corresponding two-dimensional code according to the encrypted contract so as to be printed by a participant or a monitoring party with a printing authority, wherein the two-dimensional code comprises a uniform resource locator of a preset website, the uniform resource locator comprises an access address for accessing the contract corresponding to the digital signing platform and a symmetric key for accessing the symmetric encryption contract, the symmetric key is obtained by encrypting a public key in an asymmetric key group, and a private key corresponding to the public key exists in the access address;
when a contract checking instruction triggered by a third party through scanning of the two-dimensional code is received, verifying the encrypted contract, and granting the third party the right to access a preset website after the verification is successful so that the third party can browse the contract;
when detecting that a third party enters a preset website, reminding the third party to input authentication information;
the method comprises the steps of obtaining the identity of a third party for browsing the contract, displaying the contract when receiving the information for identity verification provided by the third party, and sending the received information for identity verification and the prompt information of the third party for browsing the contract to a participant.
2. A method of procuring a contract according to claim 1, wherein the step of encrypting the procured contract comprises:
symmetrically encrypting the acquired contract;
and carrying out asymmetric public key encryption on the symmetric key of the symmetric encryption through the preset website.
3. A method of procuring a contract as claimed in claim 1, wherein the step of validating the encrypted contract comprises:
extracting a private key when asymmetric encryption is carried out, and decrypting the encrypted contract through the private key;
when the decryption is successful, the verification is determined to be passed.
4. A method for acquiring contracts according to claim 3, wherein the step of granting a third party permission to access a predetermined website is preceded by the steps of:
acquiring a symmetric key in a two-dimensional code verified by a preset website;
comparing the symmetric key with a symmetric key during symmetric encryption;
and when the symmetric key is consistent with the symmetric key in the symmetric encryption, granting the third party the permission to access the preset website.
5. A method for obtaining a contract according to claim 1, wherein after the step of generating a corresponding two-dimensional code from the encrypted contract, further comprising:
when a two-dimensional code printing instruction is received, a participant or a monitoring party triggering the printing instruction is extracted;
judging whether the participator or the monitoring party has the authority of printing the two-dimensional code;
and if the participant or the monitoring party has the authority of printing the two-dimensional code, executing the instruction of printing the two-dimensional code.
6. A method for procuring a contract as claimed in claim 1, wherein the step of validating the encrypted contract is followed by the step of:
and when the verification fails, rejecting the request of the third party for accessing the preset website.
7. A system for acquiring contracts, the system comprising: a memory, a processor, and a program for acquiring a contract stored on the memory and executable on the processor, the program for acquiring a contract implementing the steps of the method for acquiring a contract according to any one of claims 1 to 6 when executed by the processor.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a program for acquiring a contract, which when executed by a processor implements the steps of the method for acquiring a contract according to any one of claims 1 to 6.
CN201711030640.7A 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract Active CN108234442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711030640.7A CN108234442B (en) 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711030640.7A CN108234442B (en) 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract

Publications (2)

Publication Number Publication Date
CN108234442A CN108234442A (en) 2018-06-29
CN108234442B true CN108234442B (en) 2020-11-27

Family

ID=62654891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711030640.7A Active CN108234442B (en) 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract

Country Status (1)

Country Link
CN (1) CN108234442B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109166027A (en) * 2018-07-02 2019-01-08 阿里巴巴集团控股有限公司 A kind of loaning bill contract processing method and processing device
CN109361654B (en) * 2018-09-18 2021-10-26 广州市溢信科技股份有限公司 Method and system for managing business secret based on block chain negotiation encryption
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN109461230B (en) * 2018-10-01 2019-07-12 小鹰信息科技(深圳)有限公司 A kind of block chain information processing system and method
CN109635572B (en) * 2018-11-05 2021-05-25 深圳变设龙信息科技有限公司 Contract signing method and device based on block chain and terminal equipment
CN110110552A (en) * 2019-04-30 2019-08-09 佛山科学技术学院 A kind of electronics license data sharing method and system based on block chain
CN110177088B (en) * 2019-05-08 2021-09-21 矩阵元技术(深圳)有限公司 Temporary identity authentication method, device and system
CN110414937A (en) * 2019-07-29 2019-11-05 重庆晨鲸科技有限公司 Upper chain type electronic signature based on two dimensional code and deposit card method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139188A (en) * 2015-09-09 2015-12-09 西南大学 On-line electronic contract signing method based on mobile terminal
CN105912283A (en) * 2016-04-29 2016-08-31 邓迪 Block chain based printer and realization method
CN106951943A (en) * 2017-03-13 2017-07-14 江苏信源久安信息科技有限公司 Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160314550A1 (en) * 2015-04-23 2016-10-27 Adobe Systems Incorporated Limited user contract content sharing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139188A (en) * 2015-09-09 2015-12-09 西南大学 On-line electronic contract signing method based on mobile terminal
CN105912283A (en) * 2016-04-29 2016-08-31 邓迪 Block chain based printer and realization method
CN106951943A (en) * 2017-03-13 2017-07-14 江苏信源久安信息科技有限公司 Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data

Also Published As

Publication number Publication date
CN108234442A (en) 2018-06-29

Similar Documents

Publication Publication Date Title
CN108234442B (en) Method, system and readable storage medium for acquiring contract
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110086608B (en) User authentication method, device, computer equipment and computer readable storage medium
CN109274652B (en) Identity information verification system, method and device and computer storage medium
WO2018050081A1 (en) Device identity authentication method and apparatus, electric device, and storage medium
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
US9780950B1 (en) Authentication of PKI credential by use of a one time password and pin
WO2021184755A1 (en) Application access method and apparatus, and electronic device and storage medium
US10630488B2 (en) Method and apparatus for managing application identifier
EP3424179A1 (en) Method and system for authenticated login using static or dynamic codes
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN106452770B (en) Data encryption method, data decryption method, device and system
KR101744747B1 (en) Mobile terminal, terminal and method for authentication using security cookie
JP2012530311A5 (en)
CN110677382A (en) Data security processing method, device, computer system and storage medium
CN109492424B (en) Data asset management method, data asset management device, and computer-readable medium
CN104202163A (en) Password system based on mobile terminal
US20210241270A1 (en) System and method of blockchain transaction verification
CN110417740B (en) User data processing method, intelligent terminal, server and storage medium
CN109740319B (en) Digital identity verification method and server
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
US11868457B2 (en) Device and method for authenticating user and obtaining user signature using user's biometrics
CN110175471B (en) File storage method and system
US20200015081A1 (en) Method for secure transmission of cryptographic data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant