CN109858220A - Electronic contract signs method, apparatus, terminal device and storage medium - Google Patents
Electronic contract signs method, apparatus, terminal device and storage medium Download PDFInfo
- Publication number
- CN109858220A CN109858220A CN201910014973.3A CN201910014973A CN109858220A CN 109858220 A CN109858220 A CN 109858220A CN 201910014973 A CN201910014973 A CN 201910014973A CN 109858220 A CN109858220 A CN 109858220A
- Authority
- CN
- China
- Prior art keywords
- signature
- information
- user
- electronic contract
- identity information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present application is suitable for technical field of electronic commerce, disclose a kind of electronic contract signature method, apparatus, terminal device and computer readable storage medium, method includes: to obtain the first identity information in the identity card chip of user after logging in electronic contract signature system;Obtain the face information of user;Calculate the similarity of face information and the first identity information;Compare the size of similarity and preset threshold;When similarity is greater than preset threshold, then real-name authentication success;The certificate for obtaining user signs open command, signs open command according to certificate and opens certificate signature;The signature information for obtaining user completes electronic contract signature according to signature information.The safety of electronic contract signature can be improved by the embodiment of the present application.
Description
Technical field
The application belongs to technical field of electronic commerce more particularly to a kind of electronic contract signature method, apparatus, terminal device
And computer readable storage medium.
Background technique
With the continuous development of e-commerce, electronic contract is also more and more common.
The signature process of electronic contract, which generally requires, first carries out real-name authentication, and signature interface, the label are entered after authenticating successfully
There is corresponding contract information in administration in interface, after both sides' confirmation contract, then can pass through the carry out contract signature that signs electronically.
Currently, there are many real-name authentications and signature mode of electronic contract.And user faster authenticates in addition to demand and
Signature, while also pursuing higher safety.As real-name authentication step 1 in the market using identity card scanning+recognition of face into
Row real-name authentication, specifically, user shoot the front and back sides of identity card by camera, are uploaded to system, system is according to photo array
The face information of identity card, and be compared with the face information of collected user, it compares consistent then real-name authentication and passes through, no
Consistent then real-name authentication fails.There is the risk of safety in this mode, the information that the scanning of one side identity card is got may be pseudo-
It makes;On the other hand, the identity document of user is once lost, it is possible to bring risk.
Summary of the invention
In view of this, the embodiment of the present application a kind of electronic contract signature method, apparatus, terminal device and computer are provided can
Storage medium is read, the safety to solve the problems, such as real-name authentication in existing electronic contract signature is lower.
The first aspect of the embodiment of the present application provides a kind of electronic contract signature method, comprising:
After logging in electronic contract signature system, the first identity information in the identity card chip of the user is obtained;
Obtain the face information of the user;
Calculate the similarity of the face information Yu first identity information;
Compare the size of the similarity and preset threshold;
When the similarity is greater than the preset threshold, then real-name authentication success;
The certificate signature open command for obtaining the user, signs open command according to the certificate and opens certificate signature;
The signature information for obtaining the user completes electronic contract signature according to the signature information.
With reference to first aspect, described that open command unlatching is signed according to the certificate in a kind of feasible implementation
Certificate signature, comprising:
Obtain the modification logging of user's input;
The modification logging is compared with pre-stored login password, is judged whether consistent;
When the modification logging is consistent with the pre-stored modification logging, the user is prompted to carry out certificate certification;
Obtain the second identity information in the identity card chip of the user;
First identity information and the second identity information are compared, is judged whether consistent;
When first identity information is consistent with second identity information, certificate signature is opened successfully.
With reference to first aspect, in a kind of feasible implementation, first identity information and second are compared described
Identity information, after judging whether unanimously, further includes:
When first identity information and inconsistent second identity information, failure, Xiang Suoshu are opened in certificate signature
Failure prompt information is presented in user.
With reference to first aspect, described that electronic contract is completed according to the signature information in a kind of feasible implementation
Signature, comprising:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature
Algorithm completes electronic contract signature.
With reference to first aspect, in a kind of feasible implementation, in the similarity and preset threshold
After size, further includes:
When the similarity is less than the preset threshold, the face information for reacquiring the user is compared;
When comparing the frequency of failure greater than preset times threshold value, lock operation is executed to the user account of the user.
The second aspect of the embodiment of the present application provides a kind of electronic contract signature device, comprising:
First obtains module, for obtaining the identity card chip of the user after logging in electronic contract signature system
The first interior identity information;
Second obtains module, for obtaining the face information of the user;
Computing module, for calculating the similarity of the face information Yu first identity information;
Comparison module, the size for the similarity and preset threshold;
Authentication module, for when the similarity is greater than the preset threshold, then real-name authentication to be successful;
Opening module, the certificate for obtaining the user sign open command, sign open command according to the certificate
Open certificate signature;
Module is signed, for obtaining the signature information of the user, electronic contract signature is completed according to the signature information.
In conjunction with second aspect, in a kind of feasible implementation, the opening module includes:
Password acquiring unit, for obtaining the modification logging of user's input;
First comparing unit judges whether consistent for the modification logging to be compared with pre-stored login password;
Prompt unit, for when the modification logging is consistent with the pre-stored modification logging, prompt the user into
The certification of row certificate;
First acquisition unit, the second identity information in identity card chip for obtaining the user;
Second comparing unit judges whether consistent for comparing first identity information and the second identity information;
Opening unit, for when first identity information is consistent with second identity information, certificate signature to be opened
Success.
In conjunction with second aspect, in a kind of feasible implementation, the opening module further include:
Failure prompt unit, is used for the certificate label when first identity information and inconsistent second identity information
Failure is opened by administration, and failure prompt information is presented in Xiang Suoshu user.
In conjunction with second aspect, in a kind of feasible implementation, the signature module includes:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature
Algorithm completes electronic contract signature.
In conjunction with second aspect, in a kind of feasible implementation, further includes:
Module is reacquired, for reacquiring the people of the user when the similarity is less than the preset threshold
Face information is compared;
Locking module, for being held to the user account of the user when comparing the frequency of failure greater than preset times threshold value
Row lock operation.
The third aspect of the embodiment of the present application provides a kind of terminal device, including memory, processor and is stored in institute
The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program
The step of now electronic contract signs method as described in above-mentioned any one of first aspect.
The fourth aspect of the embodiment of the present application provides a kind of computer readable storage medium, the computer-readable storage medium
Matter is stored with computer program, realizes when the computer program is executed by processor electric as described in above-mentioned any one of first aspect
The step of sub- contract signature method.
Existing beneficial effect is the embodiment of the present application compared with prior art:
The embodiment of the present application by obtain user identity demonstrate,prove chip in identity information, and by the identity information and acquisition
Judgement is compared in face information, real-name authentication is carried out, compared to current real name identification method, by identity card chip
Information has the credibility and legitimacy of height, forgery, the counterfeit risk by real-name authentication is avoid or reduced, to mention
The safety of real-name authentication in high electronic contract signature.
Detailed description of the invention
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some of the application
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the schematic process flow diagram that a kind of electronic contract provided by the embodiments of the present application signs method;
Fig. 2 is the schematic process flow diagram of unlatching certificate signature provided by the embodiments of the present application;
Fig. 3 is the schematic process flow diagram that certificate provided by the embodiments of the present application signs process;
Fig. 4 is the structural schematic block diagram that a kind of electronic contract provided by the embodiments of the present application signs device;
Fig. 5 is the schematic diagram of terminal device provided by the embodiments of the present application.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, so as to provide a thorough understanding of the present application embodiment.However, it will be clear to one skilled in the art that there is no these specific
The application also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, so as not to obscure the description of the present application with unnecessary details.
In order to illustrate technical solution described herein, the following is a description of specific embodiments.
Embodiment one
Electronic contract signature method provided by the embodiments of the present application can be realized by mobile terminal or WEB mode, that is, be used
Family can realize that electronic contract is signed by WEB mode, can also realize that electronic contract signature, the movement are whole by mobile terminal
End can include but is not limited to the mobile device that mobile phone, plate, PDA etc. carry camera.
It referring to Figure 1, is a kind of schematic process flow diagram of electronic contract signature method provided by the embodiments of the present application, the party
Method may comprise steps of:
Step S101, after logging in electronic contract signature system, the first identity in the identity card chip of user is obtained
Information.
Specifically, for user after logging on electronic contract signature system by user account, user carries out certificate real name
Certification, system prompt user select the type of credential of certification, after choosing authentication ids to user, prompt user by identity card
It is placed in NFC induction region, system identifies the identity information in reading identity card chip by NFC function, when obtaining on successfully,
Then the identity information is stored, when failure, user is prompted to adjust placement region, identifies and obtain again through NFC function
Identity information in identity card chip.
It is understood that above-mentioned first identity information refers to storage in identity card chip, for characterizing user identity
Information.It may include the relevant informations such as the face picture information of user, native place, gender, licence issuing authority.The information is public security
Information in system database, legitimacy and confidence level with height, it is not easy to be forged by criminal, is counterfeit, to mention
The high safety of real-name authentication process.
It should be noted that the first identity information herein and the second identity information hereafter, tiers e'tat information are
Refer to the information stored in user identity card chip, statement is not both for the ease of distinguishing the difference for the time for obtaining information.
Step S102, the face information of user is obtained.
After getting the information in user identity card chip, user is prompted to input face information, system passes through camera
Image Acquisition is carried out to the blink of user, the movements such as nod, open one's mouth, smile, to obtain the human face image information of user.
Step S103, the similarity of face information and the first identity information is calculated.
Step S104, the size for comparing similarity and preset threshold, judges whether similarity is greater than preset threshold, when similar
When degree is greater than preset threshold, real-name authentication success enters step S105, conversely, then prompting when similarity is less than preset threshold
Re-authentication is authenticated using other methods.
Specifically, the similarity for calculating the portrait picture in the first identity information and face information collected, according to phase
The identity of user is identified like the size of degree, when similarity is greater than preset threshold, then it is assumed that active user and identity card phase
Symbol, real-name authentication success.It is on the contrary, then it is assumed that active user is not consistent with identity card, real-name authentication failure.
It should be noted that above-mentioned preset threshold can be set according to actual needs.The comparison of above-mentioned facial image
Process is by as it is known to those skilled in the art that details are not described herein.
After real-name authentication success, then S105 is entered step, conversely, can be recognized again after real-name authentication failure
Card can also be authenticated using other methods.
It optionally, can also include: when similarity is less than default threshold after the relatively size of similarity and preset threshold
When value, the face information for reacquiring user is compared;When comparing the frequency of failure greater than preset times threshold value, to user's
User account executes lock operation.
Specifically, after real-name authentication failure, corresponding prompt information is shown, on a display screen to prompt user again
Face information is inputted, the face information that user re-enters is compared system with the first identity information, judge whether unanimously,
If consistent, enter next step, conversely, then continuing that user is prompted to input face information.
When the real-name authentication frequency of failure is greater than a certain preset times threshold value, for example, 3 times, it is 5 inferior, then can be to the use
The user account at family executes lock operation, in this way, the user account can not then carry out the relevant operations such as electronic contract signature.It waits
A period of time is unlocked the user using other unlocking methods, and after account unlock, user can continue reality
The relevant operations such as name certification.
Step S105, the certificate for obtaining user signs open command, signs open command according to certificate and opens certificate signature.
After real-name authentication success, user can enter contract on electronic contract signature system and sign process.Into
Enter to before signature interface, needs to open certificate signature service.In certificate signature service process, need to carry out certificate to user
Certification, certification just enter signature interface after passing through.
Specifically, user clicks certificate signature in system and opens option, and system is obtained according to the interactive operation of user and demonstrate,proved
Part signs open command, according to the open command, executes certificate verification process, certification is opened certificate after passing through and signed successfully.
It should be noted that the opening process of above-mentioned certificate signature can use existing opening process, existing certificate
Signature opening process is authenticated especially by traditional USB Key, that is, in advance with issuing one UKey hardware of user, when with
When family carries out certificate signature, then the USB hardware being inserted into the USB interface that system provides, system reads corresponding key information,
It is identified according to identity of the key information to contractor.
The purpose that certificate signature is also able to achieve the embodiment of the present application is carried out using USB key.But it needs additionally
USB hardware carries, using highly inconvenient, in addition, the key is also easy to be cracked, forge, security risk is higher.
In order to further increase safety and the convenience of electronic contract signature, can use the information of identity card chip into
The signature certification of row certificate.Therefore optionally, in some embodiments, the process schematic block for opening certificate signature shown in Figure 2
Figure, it is above-mentioned to may include: according to certificate signature open command unlatching certificate signature
Step S201, the modification logging of user's input is obtained.
Specifically, after user inputs certificate signature open command, user is prompted to input modification logging again, with verifying
It whether is to operate in person.
Step S202, modification logging is compared with pre-stored login password, judge whether it is consistent, when modification logging with
When pre-stored modification logging is consistent, S203 is entered step, conversely, then prompting user password inconsistent when inconsistent.
Step S203, prompt user carries out certificate certification.
When modification logging is consistent, certificate certification is carried out by display screen, for example, by identity card close to NFC induction region
Deng.
Step S204, the second identity information in the identity card chip of user is obtained.
When user by identity card close to the NFC induction region of the terminals such as mobile phone after, system reads identity by NFC function
Demonstrate,prove the subscriber identity information stored in chip.
Step S205, the first identity information and the second identity information are compared, judge whether it is consistent, when the first identity information and
When second identity information is consistent, S206 is entered step, conversely, when the first identity information and inconsistent the second identity information, then
Enter step S207.
The second acquired identity information is compared with the first identity information acquired in real-name authentication, judgement is
It is no consistent, when consistent, then illustrate real-name authentication and the user in certificate signature period is same user, user identity identification is logical
It crosses, then certificate is opened successfully., whereas if the two comparison is inconsistent, then illustrate the user of real-name authentication and certificate signature period
It is not same user, user identity identification does not pass through, and failure is opened in certificate signature.Prompt user re-starts certification or use
Other methods are authenticated.
Step S206, certificate signature is opened successfully.
Step S207, failure is opened in certificate signature, and failure prompt information is presented to user.
As can be seen that it is different from by USB Key progress certificate signature certification, pass through the information and reality in identity card chip
Chip information in name verification process is compared, so that carrying out the process that certificate signature is opened further improves electronic contract
The convenience of signature process and safety.
Step S106, the signature information for obtaining user completes electronic contract signature according to signature information.
Certificate signature open successfully after, user can enter the interface that signs documents, if both sides to treaty content without
After objection, then signature button can be clicked at the interface that signs documents, carry out electronic contract signature.It is calculated by existing electronic signature
Method is signed on signing documents, and completes signature.
During file signature, contractor is possible to sign opening process with the certificate of front, during real-name authentication
Contractor be not same user.And in order to further increase electronic contract signature safety, the present embodiment can again into
Row certificate certification, to confirm the identity legitimacy of active user.
Optionally, in some embodiments, the schematic process flow diagram of certificate shown in Figure 3 signature process, above-mentioned
It can be specifically included according to the process that signature information completes electronic contract signature:
Step S301, the tiers e'tat information in the identity card chip of user is obtained.
Specifically, after signing button when the user clicks, then user is prompted to input certificate information, for example, prompt user will
Identity card is placed in NFC induction region, and system obtains the tiers e'tat information of user by NFC function.
Step S302, tiers e'tat information and the second identity information are compared, judge whether it is consistent, when the second identity information and
When tiers e'tat information is consistent, S303 is entered step, conversely, when there is inconsistency, then re-starting certification or using other sides
Formula is signed.
After getting the identity information stored in user identity card chip, by the tiers e'tat information and the second identity
Information is compared, i.e., the tiers e'tat information is compared with the identity information in certificate signature opening process, judgement is
It is no consistent, when consistent, then carry out file signature.
Step S303, according to signature information, electronic contract signature is completed by signature algorithm.
It should be noted that above-mentioned signature algorithm can be existing any particular algorithms, and electronics is completed according to signature information
The process of contract signature is by as it is known to those skilled in the art that details are not described herein.
As can be seen that the present embodiment carries out certificate signature by the identity information in identity card chip, it can be utmostly
The upper legitimacy for guaranteeing signer's identity, and then further increase the safety of electronic signature contract.
In some embodiments of the present application, real-name authentication, certificate signature are opened, certificate signs three processes and is all made of use
Identity information in the identity card chip of family can guarantee the peace during electronic contract signature as judgement basis to the maximum extent
Quan Xing.In addition, identity information and the identity information of real-name authentication process are compared in certificate signature opening process, in certificate label
Identity information is compared with the identity information in certificate signature opening process during administration, can be guaranteed to the maximum extent whole
The identity legitimacy of signer in a signature process, to guarantee the safety of electronic contract signature to greatest extent.
The embodiment of the present application by obtain user identity demonstrate,prove chip in identity information, and by the identity information and acquisition
Judgement is compared in face information, real-name authentication is carried out, compared to current real name identification method, by identity card chip
Information has the credibility and legitimacy of height, forgery, the counterfeit risk by real-name authentication is avoid or reduced, to mention
The safety of real-name authentication in high electronic contract signature.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit
It is fixed.
Embodiment two
Fig. 4 is referred to, for a kind of structural schematic block diagram of electronic contract signature device provided by the embodiments of the present application, the dress
It sets and may include:
First obtains module 41, for obtaining in the identity card chip of user after logging in electronic contract signature system
The first identity information;
Second obtains module 42, for obtaining the face information of user;
Computing module 43, for calculating the similarity of face information Yu the first identity information;
Comparison module 44, for comparing the size of similarity and preset threshold;
Authentication module 45, for when similarity is greater than preset threshold, then real-name authentication to be successful;
Opening module 46, the certificate for obtaining user sign open command, sign open command according to certificate and open card
Part signature;
Module 47 is signed, for obtaining the signature information of user, electronic contract signature is completed according to signature information.
In a kind of feasible implementation, above-mentioned opening module includes:
Password acquiring unit, for obtaining the modification logging of user's input;
First comparing unit judges whether consistent for modification logging to be compared with pre-stored login password;
Prompt unit, for prompting user to carry out certificate certification when modification logging is consistent with pre-stored modification logging;
First acquisition unit, the second identity information in identity card chip for obtaining user;
Second comparing unit judges whether consistent for comparing the first identity information and the second identity information;
Opening unit, for when the first identity information and consistent the second identity information, certificate signature to be opened successfully.
In a kind of feasible implementation, above-mentioned opening module further include:
Failure prompt unit, for when the first identity information and inconsistent the second identity information, mistake to be opened in certificate signature
It loses, failure prompt information is presented to user.
In a kind of feasible implementation, above-mentioned signature module includes:
Obtain the tiers e'tat information in the identity card chip of user;
Tiers e'tat information and the second identity information are compared, is judged whether consistent;
When the second identity information is consistent with tiers e'tat information, according to signature information, electronics is completed by signature algorithm
Contract signature.
In a kind of feasible implementation, above-mentioned apparatus further include:
Module is reacquired, for when similarity is less than preset threshold, the face information for reacquiring user to compare
It is right;
Locking module, for executing lock to the user account of user when comparing the frequency of failure greater than preset times threshold value
Fixed operation.
It should be noted that the electronic contract signature device and above-mentioned electronic contract signature method of the present embodiment introduction are implemented
Example corresponds, and specific introduce refers to corresponding contents above, and details are not described herein.
The embodiment of the present application by obtain user identity demonstrate,prove chip in identity information, and by the identity information and acquisition
Judgement is compared in face information, real-name authentication is carried out, compared to current real name identification method, by identity card chip
Information has the credibility and legitimacy of height, forgery, the counterfeit risk by real-name authentication is avoid or reduced, to mention
The safety of real-name authentication in high electronic contract signature.
Embodiment three
Fig. 5 is the schematic diagram for the terminal device that one embodiment of the application provides.As shown in figure 5, the terminal of the embodiment is set
Standby 5 include: processor 50, memory 51 and are stored in the meter that can be run in the memory 51 and on the processor 50
Calculation machine program 52.The processor 50 realizes that above-mentioned each electronic contract signature method is implemented when executing the computer program 52
Step in example, such as step S101 to S106 shown in FIG. 1.Alternatively, the processor 50 executes the computer program 52
Each module or the function of unit in the above-mentioned each Installation practice of Shi Shixian, such as the function of module 41 to 47 shown in Fig. 4.
Illustratively, the computer program 52 can be divided into one or more modules or unit, it is one or
The multiple modules of person or unit are stored in the memory 51, and are executed by the processor 50, to complete the application.It is described
One or more modules or unit can be the series of computation machine program instruction section that can complete specific function, which uses
In implementation procedure of the description computer program 52 in the terminal device 5.For example, the computer program 52 can be by
It is divided into the first acquisition module, second to obtain module, computing module, comparison module, authentication module, opening module and signature mould
Block, each module concrete function are as follows:
First obtains module, for obtaining in the identity card chip of user after logging in electronic contract signature system
First identity information;Second obtains module, for obtaining the face information of user;Computing module, for calculate face information with
The similarity of first identity information;Comparison module, for comparing the size of similarity and preset threshold;Authentication module, for working as
When similarity is greater than preset threshold, then real-name authentication success;Opening module, the certificate for obtaining user sign open command,
Open command, which is signed, according to certificate opens certificate signature;Module is signed, for obtaining the signature information of user, according to signature information
Complete electronic contract signature.
The terminal device may include, but be not limited only to, processor 50, memory 51.Those skilled in the art can manage
Solution, Fig. 5 is only the example of terminal device 5, does not constitute the restriction to terminal device 5, may include more or more than illustrating
Few component perhaps combines certain components or different components, such as the terminal device can also be set including input and output
Standby, network access equipment, bus etc..
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 51 can be the internal storage unit of the terminal device 5, such as the hard disk or interior of terminal device 5
It deposits.The memory 51 is also possible to the External memory equipment of the terminal device 5, such as be equipped on the terminal device 5
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the terminal device 5
Member also includes External memory equipment.The memory 51 is for storing needed for the computer program and the terminal device
Other programs and data.The memory 51 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
In embodiment provided herein, it should be understood that disclosed device, terminal device and method, it can be with
It realizes by another way.For example, device described above, terminal device embodiment are only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module or unit are realized in the form of SFU software functional unit and sell as independent product
Or it in use, can store in a computer readable storage medium.Based on this understanding, the application realizes above-mentioned reality
The all or part of the process in a method is applied, relevant hardware can also be instructed to complete by computer program, it is described
Computer program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that
The step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, the computer program
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..Computer-readable Jie
Matter may include: can carry the computer program code any entity or device, recording medium, USB flash disk, mobile hard disk,
Magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions
Believe signal.
Embodiment described above is only to illustrate the technical solution of the application, rather than its limitations;Although referring to aforementioned reality
Example is applied the application is described in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution should all
Comprising within the scope of protection of this application.
Claims (10)
1. a kind of electronic contract signs method characterized by comprising
After logging in electronic contract signature system, the first identity information in the identity card chip of the user is obtained;
Obtain the face information of the user;
Calculate the similarity of the face information Yu first identity information;
Compare the size of the similarity and preset threshold;
When the similarity is greater than the preset threshold, then real-name authentication success;
The certificate signature open command for obtaining the user, signs open command according to the certificate and opens certificate signature;
The signature information for obtaining the user completes electronic contract signature according to the signature information.
2. electronic contract according to claim 1 signs method, which is characterized in that described signed according to the certificate is opened
Certificate signature is opened in instruction, comprising:
Obtain the modification logging of user's input;
The modification logging is compared with pre-stored login password, is judged whether consistent;
When the modification logging is consistent with the pre-stored modification logging, the user is prompted to carry out certificate certification;
Obtain the second identity information in the identity card chip of the user;
First identity information and the second identity information are compared, is judged whether consistent;
When first identity information is consistent with second identity information, certificate signature is opened successfully.
3. electronic contract according to claim 2 signs method, which is characterized in that compare the first identity letter described
Breath and the second identity information, after judging whether unanimously, further includes:
When first identity information and inconsistent second identity information, failure, Xiang Suoshu user are opened in certificate signature
Failure prompt information is presented.
4. electronic contract according to claim 2 signs method, which is characterized in that described to be completed according to the signature information
Electronic contract signature, comprising:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature algorithm
Complete electronic contract signature.
5. electronic contract according to any one of claims 1 to 4 signs method, which is characterized in that described in the comparison
After the size of similarity and preset threshold, further includes:
When the similarity is less than the preset threshold, the face information for reacquiring the user is compared;
When comparing the frequency of failure greater than preset times threshold value, lock operation is executed to the user account of the user.
6. a kind of electronic contract signs device characterized by comprising
First obtains module, for obtaining in the identity card chip of the user after logging in electronic contract signature system
First identity information;
Second obtains module, for obtaining the face information of the user;
Computing module, for calculating the similarity of the face information Yu first identity information;
Comparison module, the size for the similarity and preset threshold;
Authentication module, for when the similarity is greater than the preset threshold, then real-name authentication to be successful;
Opening module, the certificate for obtaining the user sign open command, sign open command according to the certificate and open
Certificate signature;
Module is signed, for obtaining the signature information of the user, electronic contract signature is completed according to the signature information.
7. electronic contract according to claim 6 signs device, which is characterized in that the opening module includes:
Password acquiring unit, for obtaining the modification logging of user's input;
First comparing unit judges whether consistent for the modification logging to be compared with pre-stored login password;
Prompt unit, for prompting the user to demonstrate,prove when the modification logging is consistent with the pre-stored modification logging
Part certification;
First acquisition unit, the second identity information in identity card chip for obtaining the user;
Second comparing unit judges whether consistent for comparing first identity information and the second identity information;
Opening unit, for when first identity information is consistent with second identity information, certificate signature to be opened successfully.
8. electronic contract according to claim 7 signs device, which is characterized in that the signature module includes:
Obtain the tiers e'tat information in the identity card chip of the user;
The tiers e'tat information and second identity information are compared, is judged whether consistent;
When second identity information is consistent with the tiers e'tat information, according to the signature information, pass through signature algorithm
Complete electronic contract signature.
9. a kind of terminal device, which is characterized in that in the memory and can be in institute including memory, processor and storage
The computer program run on processor is stated, the processor realizes such as claim 1 to 5 times when executing the computer program
The step of one electronic contract signature method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the electronic contract signature method as described in any one of claim 1 to 5 is realized when the computer program is executed by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910014973.3A CN109858220A (en) | 2019-01-08 | 2019-01-08 | Electronic contract signs method, apparatus, terminal device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910014973.3A CN109858220A (en) | 2019-01-08 | 2019-01-08 | Electronic contract signs method, apparatus, terminal device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109858220A true CN109858220A (en) | 2019-06-07 |
Family
ID=66894134
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910014973.3A Pending CN109858220A (en) | 2019-01-08 | 2019-01-08 | Electronic contract signs method, apparatus, terminal device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109858220A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111047284A (en) * | 2019-11-28 | 2020-04-21 | 盛业信息科技服务(深圳)有限公司 | Contract signing method and device and computer equipment |
CN111464307A (en) * | 2019-10-14 | 2020-07-28 | 高新兴科技集团股份有限公司 | Method for acquiring electronic signature stamp, computer storage medium, and electronic device |
CN112101215A (en) * | 2020-09-15 | 2020-12-18 | Oppo广东移动通信有限公司 | Face input method, terminal equipment and computer readable storage medium |
CN112686650A (en) * | 2021-02-18 | 2021-04-20 | 深圳星算科技有限公司 | Electronic contract signature application equipment device based on block chain intelligent contract technology |
CN113128177A (en) * | 2021-03-12 | 2021-07-16 | 厦门航空有限公司 | Electronic signing method and device for maintenance work card |
CN113486316A (en) * | 2021-06-30 | 2021-10-08 | 平安信托有限责任公司 | User identity authentication method and device, electronic equipment and readable storage medium |
CN114024723A (en) * | 2021-10-22 | 2022-02-08 | 富途网络科技(深圳)有限公司 | Online signing method, device, equipment and medium based on ESOP system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107844946A (en) * | 2017-06-19 | 2018-03-27 | 深圳法大大网络科技有限公司 | A kind of method, apparatus and server of electronic contract signature |
CN108648067A (en) * | 2018-05-09 | 2018-10-12 | 平安普惠企业管理有限公司 | The loan measures and procedures for the examination and approval, device, computer equipment and storage medium |
CN108765789A (en) * | 2018-05-22 | 2018-11-06 | 北京翔云在线数据技术有限公司 | Intelligence is opened an account robot and account-opening method |
CN109034830A (en) * | 2018-10-15 | 2018-12-18 | 上海译会信息科技有限公司 | A kind of management of personal money auxiliary system |
CN109063682A (en) * | 2018-08-28 | 2018-12-21 | 袁重玉 | A kind of method of Internet authentication authorization and data survey service |
-
2019
- 2019-01-08 CN CN201910014973.3A patent/CN109858220A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107844946A (en) * | 2017-06-19 | 2018-03-27 | 深圳法大大网络科技有限公司 | A kind of method, apparatus and server of electronic contract signature |
CN108648067A (en) * | 2018-05-09 | 2018-10-12 | 平安普惠企业管理有限公司 | The loan measures and procedures for the examination and approval, device, computer equipment and storage medium |
CN108765789A (en) * | 2018-05-22 | 2018-11-06 | 北京翔云在线数据技术有限公司 | Intelligence is opened an account robot and account-opening method |
CN109063682A (en) * | 2018-08-28 | 2018-12-21 | 袁重玉 | A kind of method of Internet authentication authorization and data survey service |
CN109034830A (en) * | 2018-10-15 | 2018-12-18 | 上海译会信息科技有限公司 | A kind of management of personal money auxiliary system |
Non-Patent Citations (1)
Title |
---|
徐海明: "《中国电子商务法律问题研究》", 28 February 2017, 北京理工大学出版社 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111464307A (en) * | 2019-10-14 | 2020-07-28 | 高新兴科技集团股份有限公司 | Method for acquiring electronic signature stamp, computer storage medium, and electronic device |
CN111464307B (en) * | 2019-10-14 | 2023-03-07 | 高新兴科技集团股份有限公司 | Method for acquiring electronic signature, computer storage medium and electronic device |
CN111047284A (en) * | 2019-11-28 | 2020-04-21 | 盛业信息科技服务(深圳)有限公司 | Contract signing method and device and computer equipment |
CN112101215A (en) * | 2020-09-15 | 2020-12-18 | Oppo广东移动通信有限公司 | Face input method, terminal equipment and computer readable storage medium |
CN112686650A (en) * | 2021-02-18 | 2021-04-20 | 深圳星算科技有限公司 | Electronic contract signature application equipment device based on block chain intelligent contract technology |
CN113128177A (en) * | 2021-03-12 | 2021-07-16 | 厦门航空有限公司 | Electronic signing method and device for maintenance work card |
CN113128177B (en) * | 2021-03-12 | 2022-07-12 | 厦门航空有限公司 | Electronic signing method and device for maintenance work card |
CN113486316A (en) * | 2021-06-30 | 2021-10-08 | 平安信托有限责任公司 | User identity authentication method and device, electronic equipment and readable storage medium |
CN114024723A (en) * | 2021-10-22 | 2022-02-08 | 富途网络科技(深圳)有限公司 | Online signing method, device, equipment and medium based on ESOP system |
CN114024723B (en) * | 2021-10-22 | 2024-01-16 | 富途网络科技(深圳)有限公司 | Online signing method and device based on ESOP system, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109858220A (en) | Electronic contract signs method, apparatus, terminal device and storage medium | |
CN107800725B (en) | Remote online management device and method for digital certificates | |
US20170264608A1 (en) | Visual biometric authentication supplemented with a time-based secondary authentication factor | |
CN106899551B (en) | Authentication method, authentication terminal and system | |
CN106850201B (en) | Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system | |
CN101321069A (en) | Mobile phone biological identity certification production and authentication method, and its authentication system | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN104462922A (en) | Method for verifying authorization on basis of biological recognition | |
US20160104140A1 (en) | Authenticated self-service terminal (sst) access | |
WO2008149366A2 (en) | Device method & system for facilitating mobile transactions | |
CN109741509A (en) | A kind of the face access control system and information authentication method of double authentication | |
JP2015138545A (en) | Electronic payment system and electronic payment method | |
CN111490879A (en) | Digital certificate generation method and system based on biological characteristics | |
CN107784501A (en) | A kind of safe method of payment and system based on recognition of face | |
US10601822B2 (en) | Multifactor authentication device | |
CN104135480A (en) | Entrance guard authorization system and entrance guard authorization method | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
CN106156549B (en) | application program authorization processing method and device | |
US20190019189A1 (en) | Payment authentication | |
CN113205342A (en) | User identity authentication method and device based on multi-terminal payment | |
CN109584120A (en) | A kind of certificate chain enforcement system and its application method | |
US12019719B2 (en) | Method and electronic device for authenticating a user | |
CN106710033B (en) | Entrance guard opening method and device | |
KR101787389B1 (en) | Iris Scan USB Device using an OTP Function and Controlling Method for the Same | |
WO2018006326A1 (en) | Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190607 |
|
RJ01 | Rejection of invention patent application after publication |