CN109858220A - Electronic contract signs method, apparatus, terminal device and storage medium - Google Patents

Electronic contract signs method, apparatus, terminal device and storage medium Download PDF

Info

Publication number
CN109858220A
CN109858220A CN201910014973.3A CN201910014973A CN109858220A CN 109858220 A CN109858220 A CN 109858220A CN 201910014973 A CN201910014973 A CN 201910014973A CN 109858220 A CN109858220 A CN 109858220A
Authority
CN
China
Prior art keywords
signature
information
user
electronic contract
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910014973.3A
Other languages
Chinese (zh)
Inventor
黄翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Law Network Technology Co Ltd
Original Assignee
Shenzhen Law Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Law Network Technology Co Ltd filed Critical Shenzhen Law Network Technology Co Ltd
Priority to CN201910014973.3A priority Critical patent/CN109858220A/en
Publication of CN109858220A publication Critical patent/CN109858220A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present application is suitable for technical field of electronic commerce, disclose a kind of electronic contract signature method, apparatus, terminal device and computer readable storage medium, method includes: to obtain the first identity information in the identity card chip of user after logging in electronic contract signature system;Obtain the face information of user;Calculate the similarity of face information and the first identity information;Compare the size of similarity and preset threshold;When similarity is greater than preset threshold, then real-name authentication success;The certificate for obtaining user signs open command, signs open command according to certificate and opens certificate signature;The signature information for obtaining user completes electronic contract signature according to signature information.The safety of electronic contract signature can be improved by the embodiment of the present application.

Description

Electronic contract signs method, apparatus, terminal device and storage medium
Technical field
The application belongs to technical field of electronic commerce more particularly to a kind of electronic contract signature method, apparatus, terminal device And computer readable storage medium.
Background technique
With the continuous development of e-commerce, electronic contract is also more and more common.
The signature process of electronic contract, which generally requires, first carries out real-name authentication, and signature interface, the label are entered after authenticating successfully There is corresponding contract information in administration in interface, after both sides' confirmation contract, then can pass through the carry out contract signature that signs electronically.
Currently, there are many real-name authentications and signature mode of electronic contract.And user faster authenticates in addition to demand and Signature, while also pursuing higher safety.As real-name authentication step 1 in the market using identity card scanning+recognition of face into Row real-name authentication, specifically, user shoot the front and back sides of identity card by camera, are uploaded to system, system is according to photo array The face information of identity card, and be compared with the face information of collected user, it compares consistent then real-name authentication and passes through, no Consistent then real-name authentication fails.There is the risk of safety in this mode, the information that the scanning of one side identity card is got may be pseudo- It makes;On the other hand, the identity document of user is once lost, it is possible to bring risk.
Summary of the invention
In view of this, the embodiment of the present application a kind of electronic contract signature method, apparatus, terminal device and computer are provided can Storage medium is read, the safety to solve the problems, such as real-name authentication in existing electronic contract signature is lower.
The first aspect of the embodiment of the present application provides a kind of electronic contract signature method, comprising:
After logging in electronic contract signature system, the first identity information in the identity card chip of the user is obtained;
Obtain the face information of the user;
Calculate the similarity of the face information Yu first identity information;
Compare the size of the similarity and preset threshold;
When the similarity is greater than the preset threshold, then real-name authentication success;
The certificate signature open command for obtaining the user, signs open command according to the certificate and opens certificate signature;
The signature information for obtaining the user completes electronic contract signature according to the signature information.
With reference to first aspect, described that open command unlatching is signed according to the certificate in a kind of feasible implementation Certificate signature, comprising:
Obtain the modification logging of user's input;
The modification logging is compared with pre-stored login password, is judged whether consistent;
When the modification logging is consistent with the pre-stored modification logging, the user is prompted to carry out certificate certification;
Obtain the second identity information in the identity card chip of the user;
First identity information and the second identity information are compared, is judged whether consistent;
When first identity information is consistent with second identity information, certificate signature is opened successfully.
With reference to first aspect, in a kind of feasible implementation, first identity information and second are compared described Identity information, after judging whether unanimously, further includes:
When first identity information and inconsistent second identity information, failure, Xiang Suoshu are opened in certificate signature Failure prompt information is presented in user.
With reference to first aspect, described that electronic contract is completed according to the signature information in a kind of feasible implementation Signature, comprising:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature Algorithm completes electronic contract signature.
With reference to first aspect, in a kind of feasible implementation, in the similarity and preset threshold After size, further includes:
When the similarity is less than the preset threshold, the face information for reacquiring the user is compared;
When comparing the frequency of failure greater than preset times threshold value, lock operation is executed to the user account of the user.
The second aspect of the embodiment of the present application provides a kind of electronic contract signature device, comprising:
First obtains module, for obtaining the identity card chip of the user after logging in electronic contract signature system The first interior identity information;
Second obtains module, for obtaining the face information of the user;
Computing module, for calculating the similarity of the face information Yu first identity information;
Comparison module, the size for the similarity and preset threshold;
Authentication module, for when the similarity is greater than the preset threshold, then real-name authentication to be successful;
Opening module, the certificate for obtaining the user sign open command, sign open command according to the certificate Open certificate signature;
Module is signed, for obtaining the signature information of the user, electronic contract signature is completed according to the signature information.
In conjunction with second aspect, in a kind of feasible implementation, the opening module includes:
Password acquiring unit, for obtaining the modification logging of user's input;
First comparing unit judges whether consistent for the modification logging to be compared with pre-stored login password;
Prompt unit, for when the modification logging is consistent with the pre-stored modification logging, prompt the user into The certification of row certificate;
First acquisition unit, the second identity information in identity card chip for obtaining the user;
Second comparing unit judges whether consistent for comparing first identity information and the second identity information;
Opening unit, for when first identity information is consistent with second identity information, certificate signature to be opened Success.
In conjunction with second aspect, in a kind of feasible implementation, the opening module further include:
Failure prompt unit, is used for the certificate label when first identity information and inconsistent second identity information Failure is opened by administration, and failure prompt information is presented in Xiang Suoshu user.
In conjunction with second aspect, in a kind of feasible implementation, the signature module includes:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature Algorithm completes electronic contract signature.
In conjunction with second aspect, in a kind of feasible implementation, further includes:
Module is reacquired, for reacquiring the people of the user when the similarity is less than the preset threshold Face information is compared;
Locking module, for being held to the user account of the user when comparing the frequency of failure greater than preset times threshold value Row lock operation.
The third aspect of the embodiment of the present application provides a kind of terminal device, including memory, processor and is stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of now electronic contract signs method as described in above-mentioned any one of first aspect.
The fourth aspect of the embodiment of the present application provides a kind of computer readable storage medium, the computer-readable storage medium Matter is stored with computer program, realizes when the computer program is executed by processor electric as described in above-mentioned any one of first aspect The step of sub- contract signature method.
Existing beneficial effect is the embodiment of the present application compared with prior art:
The embodiment of the present application by obtain user identity demonstrate,prove chip in identity information, and by the identity information and acquisition Judgement is compared in face information, real-name authentication is carried out, compared to current real name identification method, by identity card chip Information has the credibility and legitimacy of height, forgery, the counterfeit risk by real-name authentication is avoid or reduced, to mention The safety of real-name authentication in high electronic contract signature.
Detailed description of the invention
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some of the application Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the schematic process flow diagram that a kind of electronic contract provided by the embodiments of the present application signs method;
Fig. 2 is the schematic process flow diagram of unlatching certificate signature provided by the embodiments of the present application;
Fig. 3 is the schematic process flow diagram that certificate provided by the embodiments of the present application signs process;
Fig. 4 is the structural schematic block diagram that a kind of electronic contract provided by the embodiments of the present application signs device;
Fig. 5 is the schematic diagram of terminal device provided by the embodiments of the present application.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, so as to provide a thorough understanding of the present application embodiment.However, it will be clear to one skilled in the art that there is no these specific The application also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, so as not to obscure the description of the present application with unnecessary details.
In order to illustrate technical solution described herein, the following is a description of specific embodiments.
Embodiment one
Electronic contract signature method provided by the embodiments of the present application can be realized by mobile terminal or WEB mode, that is, be used Family can realize that electronic contract is signed by WEB mode, can also realize that electronic contract signature, the movement are whole by mobile terminal End can include but is not limited to the mobile device that mobile phone, plate, PDA etc. carry camera.
It referring to Figure 1, is a kind of schematic process flow diagram of electronic contract signature method provided by the embodiments of the present application, the party Method may comprise steps of:
Step S101, after logging in electronic contract signature system, the first identity in the identity card chip of user is obtained Information.
Specifically, for user after logging on electronic contract signature system by user account, user carries out certificate real name Certification, system prompt user select the type of credential of certification, after choosing authentication ids to user, prompt user by identity card It is placed in NFC induction region, system identifies the identity information in reading identity card chip by NFC function, when obtaining on successfully, Then the identity information is stored, when failure, user is prompted to adjust placement region, identifies and obtain again through NFC function Identity information in identity card chip.
It is understood that above-mentioned first identity information refers to storage in identity card chip, for characterizing user identity Information.It may include the relevant informations such as the face picture information of user, native place, gender, licence issuing authority.The information is public security Information in system database, legitimacy and confidence level with height, it is not easy to be forged by criminal, is counterfeit, to mention The high safety of real-name authentication process.
It should be noted that the first identity information herein and the second identity information hereafter, tiers e'tat information are Refer to the information stored in user identity card chip, statement is not both for the ease of distinguishing the difference for the time for obtaining information.
Step S102, the face information of user is obtained.
After getting the information in user identity card chip, user is prompted to input face information, system passes through camera Image Acquisition is carried out to the blink of user, the movements such as nod, open one's mouth, smile, to obtain the human face image information of user.
Step S103, the similarity of face information and the first identity information is calculated.
Step S104, the size for comparing similarity and preset threshold, judges whether similarity is greater than preset threshold, when similar When degree is greater than preset threshold, real-name authentication success enters step S105, conversely, then prompting when similarity is less than preset threshold Re-authentication is authenticated using other methods.
Specifically, the similarity for calculating the portrait picture in the first identity information and face information collected, according to phase The identity of user is identified like the size of degree, when similarity is greater than preset threshold, then it is assumed that active user and identity card phase Symbol, real-name authentication success.It is on the contrary, then it is assumed that active user is not consistent with identity card, real-name authentication failure.
It should be noted that above-mentioned preset threshold can be set according to actual needs.The comparison of above-mentioned facial image Process is by as it is known to those skilled in the art that details are not described herein.
After real-name authentication success, then S105 is entered step, conversely, can be recognized again after real-name authentication failure Card can also be authenticated using other methods.
It optionally, can also include: when similarity is less than default threshold after the relatively size of similarity and preset threshold When value, the face information for reacquiring user is compared;When comparing the frequency of failure greater than preset times threshold value, to user's User account executes lock operation.
Specifically, after real-name authentication failure, corresponding prompt information is shown, on a display screen to prompt user again Face information is inputted, the face information that user re-enters is compared system with the first identity information, judge whether unanimously, If consistent, enter next step, conversely, then continuing that user is prompted to input face information.
When the real-name authentication frequency of failure is greater than a certain preset times threshold value, for example, 3 times, it is 5 inferior, then can be to the use The user account at family executes lock operation, in this way, the user account can not then carry out the relevant operations such as electronic contract signature.It waits A period of time is unlocked the user using other unlocking methods, and after account unlock, user can continue reality The relevant operations such as name certification.
Step S105, the certificate for obtaining user signs open command, signs open command according to certificate and opens certificate signature.
After real-name authentication success, user can enter contract on electronic contract signature system and sign process.Into Enter to before signature interface, needs to open certificate signature service.In certificate signature service process, need to carry out certificate to user Certification, certification just enter signature interface after passing through.
Specifically, user clicks certificate signature in system and opens option, and system is obtained according to the interactive operation of user and demonstrate,proved Part signs open command, according to the open command, executes certificate verification process, certification is opened certificate after passing through and signed successfully.
It should be noted that the opening process of above-mentioned certificate signature can use existing opening process, existing certificate Signature opening process is authenticated especially by traditional USB Key, that is, in advance with issuing one UKey hardware of user, when with When family carries out certificate signature, then the USB hardware being inserted into the USB interface that system provides, system reads corresponding key information, It is identified according to identity of the key information to contractor.
The purpose that certificate signature is also able to achieve the embodiment of the present application is carried out using USB key.But it needs additionally USB hardware carries, using highly inconvenient, in addition, the key is also easy to be cracked, forge, security risk is higher.
In order to further increase safety and the convenience of electronic contract signature, can use the information of identity card chip into The signature certification of row certificate.Therefore optionally, in some embodiments, the process schematic block for opening certificate signature shown in Figure 2 Figure, it is above-mentioned to may include: according to certificate signature open command unlatching certificate signature
Step S201, the modification logging of user's input is obtained.
Specifically, after user inputs certificate signature open command, user is prompted to input modification logging again, with verifying It whether is to operate in person.
Step S202, modification logging is compared with pre-stored login password, judge whether it is consistent, when modification logging with When pre-stored modification logging is consistent, S203 is entered step, conversely, then prompting user password inconsistent when inconsistent.
Step S203, prompt user carries out certificate certification.
When modification logging is consistent, certificate certification is carried out by display screen, for example, by identity card close to NFC induction region Deng.
Step S204, the second identity information in the identity card chip of user is obtained.
When user by identity card close to the NFC induction region of the terminals such as mobile phone after, system reads identity by NFC function Demonstrate,prove the subscriber identity information stored in chip.
Step S205, the first identity information and the second identity information are compared, judge whether it is consistent, when the first identity information and When second identity information is consistent, S206 is entered step, conversely, when the first identity information and inconsistent the second identity information, then Enter step S207.
The second acquired identity information is compared with the first identity information acquired in real-name authentication, judgement is It is no consistent, when consistent, then illustrate real-name authentication and the user in certificate signature period is same user, user identity identification is logical It crosses, then certificate is opened successfully., whereas if the two comparison is inconsistent, then illustrate the user of real-name authentication and certificate signature period It is not same user, user identity identification does not pass through, and failure is opened in certificate signature.Prompt user re-starts certification or use Other methods are authenticated.
Step S206, certificate signature is opened successfully.
Step S207, failure is opened in certificate signature, and failure prompt information is presented to user.
As can be seen that it is different from by USB Key progress certificate signature certification, pass through the information and reality in identity card chip Chip information in name verification process is compared, so that carrying out the process that certificate signature is opened further improves electronic contract The convenience of signature process and safety.
Step S106, the signature information for obtaining user completes electronic contract signature according to signature information.
Certificate signature open successfully after, user can enter the interface that signs documents, if both sides to treaty content without After objection, then signature button can be clicked at the interface that signs documents, carry out electronic contract signature.It is calculated by existing electronic signature Method is signed on signing documents, and completes signature.
During file signature, contractor is possible to sign opening process with the certificate of front, during real-name authentication Contractor be not same user.And in order to further increase electronic contract signature safety, the present embodiment can again into Row certificate certification, to confirm the identity legitimacy of active user.
Optionally, in some embodiments, the schematic process flow diagram of certificate shown in Figure 3 signature process, above-mentioned It can be specifically included according to the process that signature information completes electronic contract signature:
Step S301, the tiers e'tat information in the identity card chip of user is obtained.
Specifically, after signing button when the user clicks, then user is prompted to input certificate information, for example, prompt user will Identity card is placed in NFC induction region, and system obtains the tiers e'tat information of user by NFC function.
Step S302, tiers e'tat information and the second identity information are compared, judge whether it is consistent, when the second identity information and When tiers e'tat information is consistent, S303 is entered step, conversely, when there is inconsistency, then re-starting certification or using other sides Formula is signed.
After getting the identity information stored in user identity card chip, by the tiers e'tat information and the second identity Information is compared, i.e., the tiers e'tat information is compared with the identity information in certificate signature opening process, judgement is It is no consistent, when consistent, then carry out file signature.
Step S303, according to signature information, electronic contract signature is completed by signature algorithm.
It should be noted that above-mentioned signature algorithm can be existing any particular algorithms, and electronics is completed according to signature information The process of contract signature is by as it is known to those skilled in the art that details are not described herein.
As can be seen that the present embodiment carries out certificate signature by the identity information in identity card chip, it can be utmostly The upper legitimacy for guaranteeing signer's identity, and then further increase the safety of electronic signature contract.
In some embodiments of the present application, real-name authentication, certificate signature are opened, certificate signs three processes and is all made of use Identity information in the identity card chip of family can guarantee the peace during electronic contract signature as judgement basis to the maximum extent Quan Xing.In addition, identity information and the identity information of real-name authentication process are compared in certificate signature opening process, in certificate label Identity information is compared with the identity information in certificate signature opening process during administration, can be guaranteed to the maximum extent whole The identity legitimacy of signer in a signature process, to guarantee the safety of electronic contract signature to greatest extent.
The embodiment of the present application by obtain user identity demonstrate,prove chip in identity information, and by the identity information and acquisition Judgement is compared in face information, real-name authentication is carried out, compared to current real name identification method, by identity card chip Information has the credibility and legitimacy of height, forgery, the counterfeit risk by real-name authentication is avoid or reduced, to mention The safety of real-name authentication in high electronic contract signature.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit It is fixed.
Embodiment two
Fig. 4 is referred to, for a kind of structural schematic block diagram of electronic contract signature device provided by the embodiments of the present application, the dress It sets and may include:
First obtains module 41, for obtaining in the identity card chip of user after logging in electronic contract signature system The first identity information;
Second obtains module 42, for obtaining the face information of user;
Computing module 43, for calculating the similarity of face information Yu the first identity information;
Comparison module 44, for comparing the size of similarity and preset threshold;
Authentication module 45, for when similarity is greater than preset threshold, then real-name authentication to be successful;
Opening module 46, the certificate for obtaining user sign open command, sign open command according to certificate and open card Part signature;
Module 47 is signed, for obtaining the signature information of user, electronic contract signature is completed according to signature information.
In a kind of feasible implementation, above-mentioned opening module includes:
Password acquiring unit, for obtaining the modification logging of user's input;
First comparing unit judges whether consistent for modification logging to be compared with pre-stored login password;
Prompt unit, for prompting user to carry out certificate certification when modification logging is consistent with pre-stored modification logging;
First acquisition unit, the second identity information in identity card chip for obtaining user;
Second comparing unit judges whether consistent for comparing the first identity information and the second identity information;
Opening unit, for when the first identity information and consistent the second identity information, certificate signature to be opened successfully.
In a kind of feasible implementation, above-mentioned opening module further include:
Failure prompt unit, for when the first identity information and inconsistent the second identity information, mistake to be opened in certificate signature It loses, failure prompt information is presented to user.
In a kind of feasible implementation, above-mentioned signature module includes:
Obtain the tiers e'tat information in the identity card chip of user;
Tiers e'tat information and the second identity information are compared, is judged whether consistent;
When the second identity information is consistent with tiers e'tat information, according to signature information, electronics is completed by signature algorithm Contract signature.
In a kind of feasible implementation, above-mentioned apparatus further include:
Module is reacquired, for when similarity is less than preset threshold, the face information for reacquiring user to compare It is right;
Locking module, for executing lock to the user account of user when comparing the frequency of failure greater than preset times threshold value Fixed operation.
It should be noted that the electronic contract signature device and above-mentioned electronic contract signature method of the present embodiment introduction are implemented Example corresponds, and specific introduce refers to corresponding contents above, and details are not described herein.
The embodiment of the present application by obtain user identity demonstrate,prove chip in identity information, and by the identity information and acquisition Judgement is compared in face information, real-name authentication is carried out, compared to current real name identification method, by identity card chip Information has the credibility and legitimacy of height, forgery, the counterfeit risk by real-name authentication is avoid or reduced, to mention The safety of real-name authentication in high electronic contract signature.
Embodiment three
Fig. 5 is the schematic diagram for the terminal device that one embodiment of the application provides.As shown in figure 5, the terminal of the embodiment is set Standby 5 include: processor 50, memory 51 and are stored in the meter that can be run in the memory 51 and on the processor 50 Calculation machine program 52.The processor 50 realizes that above-mentioned each electronic contract signature method is implemented when executing the computer program 52 Step in example, such as step S101 to S106 shown in FIG. 1.Alternatively, the processor 50 executes the computer program 52 Each module or the function of unit in the above-mentioned each Installation practice of Shi Shixian, such as the function of module 41 to 47 shown in Fig. 4.
Illustratively, the computer program 52 can be divided into one or more modules or unit, it is one or The multiple modules of person or unit are stored in the memory 51, and are executed by the processor 50, to complete the application.It is described One or more modules or unit can be the series of computation machine program instruction section that can complete specific function, which uses In implementation procedure of the description computer program 52 in the terminal device 5.For example, the computer program 52 can be by It is divided into the first acquisition module, second to obtain module, computing module, comparison module, authentication module, opening module and signature mould Block, each module concrete function are as follows:
First obtains module, for obtaining in the identity card chip of user after logging in electronic contract signature system First identity information;Second obtains module, for obtaining the face information of user;Computing module, for calculate face information with The similarity of first identity information;Comparison module, for comparing the size of similarity and preset threshold;Authentication module, for working as When similarity is greater than preset threshold, then real-name authentication success;Opening module, the certificate for obtaining user sign open command, Open command, which is signed, according to certificate opens certificate signature;Module is signed, for obtaining the signature information of user, according to signature information Complete electronic contract signature.
The terminal device may include, but be not limited only to, processor 50, memory 51.Those skilled in the art can manage Solution, Fig. 5 is only the example of terminal device 5, does not constitute the restriction to terminal device 5, may include more or more than illustrating Few component perhaps combines certain components or different components, such as the terminal device can also be set including input and output Standby, network access equipment, bus etc..
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 51 can be the internal storage unit of the terminal device 5, such as the hard disk or interior of terminal device 5 It deposits.The memory 51 is also possible to the External memory equipment of the terminal device 5, such as be equipped on the terminal device 5 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the terminal device 5 Member also includes External memory equipment.The memory 51 is for storing needed for the computer program and the terminal device Other programs and data.The memory 51 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
In embodiment provided herein, it should be understood that disclosed device, terminal device and method, it can be with It realizes by another way.For example, device described above, terminal device embodiment are only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module or unit are realized in the form of SFU software functional unit and sell as independent product Or it in use, can store in a computer readable storage medium.Based on this understanding, the application realizes above-mentioned reality The all or part of the process in a method is applied, relevant hardware can also be instructed to complete by computer program, it is described Computer program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that The step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, the computer program Code can be source code form, object identification code form, executable file or certain intermediate forms etc..Computer-readable Jie Matter may include: can carry the computer program code any entity or device, recording medium, USB flash disk, mobile hard disk, Magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions Believe signal.
Embodiment described above is only to illustrate the technical solution of the application, rather than its limitations;Although referring to aforementioned reality Example is applied the application is described in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution should all Comprising within the scope of protection of this application.

Claims (10)

1. a kind of electronic contract signs method characterized by comprising
After logging in electronic contract signature system, the first identity information in the identity card chip of the user is obtained;
Obtain the face information of the user;
Calculate the similarity of the face information Yu first identity information;
Compare the size of the similarity and preset threshold;
When the similarity is greater than the preset threshold, then real-name authentication success;
The certificate signature open command for obtaining the user, signs open command according to the certificate and opens certificate signature;
The signature information for obtaining the user completes electronic contract signature according to the signature information.
2. electronic contract according to claim 1 signs method, which is characterized in that described signed according to the certificate is opened Certificate signature is opened in instruction, comprising:
Obtain the modification logging of user's input;
The modification logging is compared with pre-stored login password, is judged whether consistent;
When the modification logging is consistent with the pre-stored modification logging, the user is prompted to carry out certificate certification;
Obtain the second identity information in the identity card chip of the user;
First identity information and the second identity information are compared, is judged whether consistent;
When first identity information is consistent with second identity information, certificate signature is opened successfully.
3. electronic contract according to claim 2 signs method, which is characterized in that compare the first identity letter described Breath and the second identity information, after judging whether unanimously, further includes:
When first identity information and inconsistent second identity information, failure, Xiang Suoshu user are opened in certificate signature Failure prompt information is presented.
4. electronic contract according to claim 2 signs method, which is characterized in that described to be completed according to the signature information Electronic contract signature, comprising:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature algorithm Complete electronic contract signature.
5. electronic contract according to any one of claims 1 to 4 signs method, which is characterized in that described in the comparison After the size of similarity and preset threshold, further includes:
When the similarity is less than the preset threshold, the face information for reacquiring the user is compared;
When comparing the frequency of failure greater than preset times threshold value, lock operation is executed to the user account of the user.
6. a kind of electronic contract signs device characterized by comprising
First obtains module, for obtaining in the identity card chip of the user after logging in electronic contract signature system First identity information;
Second obtains module, for obtaining the face information of the user;
Computing module, for calculating the similarity of the face information Yu first identity information;
Comparison module, the size for the similarity and preset threshold;
Authentication module, for when the similarity is greater than the preset threshold, then real-name authentication to be successful;
Opening module, the certificate for obtaining the user sign open command, sign open command according to the certificate and open Certificate signature;
Module is signed, for obtaining the signature information of the user, electronic contract signature is completed according to the signature information.
7. electronic contract according to claim 6 signs device, which is characterized in that the opening module includes:
Password acquiring unit, for obtaining the modification logging of user's input;
First comparing unit judges whether consistent for the modification logging to be compared with pre-stored login password;
Prompt unit, for prompting the user to demonstrate,prove when the modification logging is consistent with the pre-stored modification logging Part certification;
First acquisition unit, the second identity information in identity card chip for obtaining the user;
Second comparing unit judges whether consistent for comparing first identity information and the second identity information;
Opening unit, for when first identity information is consistent with second identity information, certificate signature to be opened successfully.
8. electronic contract according to claim 7 signs device, which is characterized in that the signature module includes:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature algorithm Complete electronic contract signature.
9. a kind of terminal device, which is characterized in that in the memory and can be in institute including memory, processor and storage The computer program run on processor is stated, the processor realizes such as claim 1 to 5 times when executing the computer program The step of one electronic contract signature method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the electronic contract signature method as described in any one of claim 1 to 5 is realized when the computer program is executed by processor Step.
CN201910014973.3A 2019-01-08 2019-01-08 Electronic contract signs method, apparatus, terminal device and storage medium Pending CN109858220A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910014973.3A CN109858220A (en) 2019-01-08 2019-01-08 Electronic contract signs method, apparatus, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910014973.3A CN109858220A (en) 2019-01-08 2019-01-08 Electronic contract signs method, apparatus, terminal device and storage medium

Publications (1)

Publication Number Publication Date
CN109858220A true CN109858220A (en) 2019-06-07

Family

ID=66894134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910014973.3A Pending CN109858220A (en) 2019-01-08 2019-01-08 Electronic contract signs method, apparatus, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN109858220A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047284A (en) * 2019-11-28 2020-04-21 盛业信息科技服务(深圳)有限公司 Contract signing method and device and computer equipment
CN111464307A (en) * 2019-10-14 2020-07-28 高新兴科技集团股份有限公司 Method for acquiring electronic signature stamp, computer storage medium, and electronic device
CN112101215A (en) * 2020-09-15 2020-12-18 Oppo广东移动通信有限公司 Face input method, terminal equipment and computer readable storage medium
CN112686650A (en) * 2021-02-18 2021-04-20 深圳星算科技有限公司 Electronic contract signature application equipment device based on block chain intelligent contract technology
CN113128177A (en) * 2021-03-12 2021-07-16 厦门航空有限公司 Electronic signing method and device for maintenance work card
CN113486316A (en) * 2021-06-30 2021-10-08 平安信托有限责任公司 User identity authentication method and device, electronic equipment and readable storage medium
CN114024723A (en) * 2021-10-22 2022-02-08 富途网络科技(深圳)有限公司 Online signing method, device, equipment and medium based on ESOP system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107844946A (en) * 2017-06-19 2018-03-27 深圳法大大网络科技有限公司 A kind of method, apparatus and server of electronic contract signature
CN108648067A (en) * 2018-05-09 2018-10-12 平安普惠企业管理有限公司 The loan measures and procedures for the examination and approval, device, computer equipment and storage medium
CN108765789A (en) * 2018-05-22 2018-11-06 北京翔云在线数据技术有限公司 Intelligence is opened an account robot and account-opening method
CN109034830A (en) * 2018-10-15 2018-12-18 上海译会信息科技有限公司 A kind of management of personal money auxiliary system
CN109063682A (en) * 2018-08-28 2018-12-21 袁重玉 A kind of method of Internet authentication authorization and data survey service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107844946A (en) * 2017-06-19 2018-03-27 深圳法大大网络科技有限公司 A kind of method, apparatus and server of electronic contract signature
CN108648067A (en) * 2018-05-09 2018-10-12 平安普惠企业管理有限公司 The loan measures and procedures for the examination and approval, device, computer equipment and storage medium
CN108765789A (en) * 2018-05-22 2018-11-06 北京翔云在线数据技术有限公司 Intelligence is opened an account robot and account-opening method
CN109063682A (en) * 2018-08-28 2018-12-21 袁重玉 A kind of method of Internet authentication authorization and data survey service
CN109034830A (en) * 2018-10-15 2018-12-18 上海译会信息科技有限公司 A kind of management of personal money auxiliary system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐海明: "《中国电子商务法律问题研究》", 28 February 2017, 北京理工大学出版社 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464307A (en) * 2019-10-14 2020-07-28 高新兴科技集团股份有限公司 Method for acquiring electronic signature stamp, computer storage medium, and electronic device
CN111464307B (en) * 2019-10-14 2023-03-07 高新兴科技集团股份有限公司 Method for acquiring electronic signature, computer storage medium and electronic device
CN111047284A (en) * 2019-11-28 2020-04-21 盛业信息科技服务(深圳)有限公司 Contract signing method and device and computer equipment
CN112101215A (en) * 2020-09-15 2020-12-18 Oppo广东移动通信有限公司 Face input method, terminal equipment and computer readable storage medium
CN112686650A (en) * 2021-02-18 2021-04-20 深圳星算科技有限公司 Electronic contract signature application equipment device based on block chain intelligent contract technology
CN113128177A (en) * 2021-03-12 2021-07-16 厦门航空有限公司 Electronic signing method and device for maintenance work card
CN113128177B (en) * 2021-03-12 2022-07-12 厦门航空有限公司 Electronic signing method and device for maintenance work card
CN113486316A (en) * 2021-06-30 2021-10-08 平安信托有限责任公司 User identity authentication method and device, electronic equipment and readable storage medium
CN114024723A (en) * 2021-10-22 2022-02-08 富途网络科技(深圳)有限公司 Online signing method, device, equipment and medium based on ESOP system
CN114024723B (en) * 2021-10-22 2024-01-16 富途网络科技(深圳)有限公司 Online signing method and device based on ESOP system, equipment and medium

Similar Documents

Publication Publication Date Title
CN109858220A (en) Electronic contract signs method, apparatus, terminal device and storage medium
CN107800725B (en) Remote online management device and method for digital certificates
US20170264608A1 (en) Visual biometric authentication supplemented with a time-based secondary authentication factor
CN106899551B (en) Authentication method, authentication terminal and system
CN106850201B (en) Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system
CN101321069A (en) Mobile phone biological identity certification production and authentication method, and its authentication system
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN104462922A (en) Method for verifying authorization on basis of biological recognition
US20160104140A1 (en) Authenticated self-service terminal (sst) access
WO2008149366A2 (en) Device method & system for facilitating mobile transactions
CN109741509A (en) A kind of the face access control system and information authentication method of double authentication
JP2015138545A (en) Electronic payment system and electronic payment method
CN111490879A (en) Digital certificate generation method and system based on biological characteristics
CN107784501A (en) A kind of safe method of payment and system based on recognition of face
US10601822B2 (en) Multifactor authentication device
CN104135480A (en) Entrance guard authorization system and entrance guard authorization method
CN110738764A (en) Security control system and method based on intelligent lock
CN106156549B (en) application program authorization processing method and device
US20190019189A1 (en) Payment authentication
CN113205342A (en) User identity authentication method and device based on multi-terminal payment
CN109584120A (en) A kind of certificate chain enforcement system and its application method
US12019719B2 (en) Method and electronic device for authenticating a user
CN106710033B (en) Entrance guard opening method and device
KR101787389B1 (en) Iris Scan USB Device using an OTP Function and Controlling Method for the Same
WO2018006326A1 (en) Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190607

RJ01 Rejection of invention patent application after publication