CN111681141A - File authentication method, file authentication device and terminal equipment - Google Patents

File authentication method, file authentication device and terminal equipment Download PDF

Info

Publication number
CN111681141A
CN111681141A CN202010467224.9A CN202010467224A CN111681141A CN 111681141 A CN111681141 A CN 111681141A CN 202010467224 A CN202010467224 A CN 202010467224A CN 111681141 A CN111681141 A CN 111681141A
Authority
CN
China
Prior art keywords
file
confirmed
template
evidence
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010467224.9A
Other languages
Chinese (zh)
Other versions
CN111681141B (en
Inventor
蔡智才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202010467224.9A priority Critical patent/CN111681141B/en
Publication of CN111681141A publication Critical patent/CN111681141A/en
Application granted granted Critical
Publication of CN111681141B publication Critical patent/CN111681141B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The file authentication method provided by the application comprises the following steps: after a file generation instruction is obtained, extracting a target file template and attribute information of preset parameters in the target file template according to a file template number represented in the file generation instruction; acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter; filling the target file template according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, and extracting and generating operation information; sending the file to be confirmed to at least one account node related to the file generation instruction; if the feedback information of each account node is acquired and each feedback information meets the corresponding preset condition, the confirmation of the file to be confirmed is completed, and an evidence file is generated; and authenticating the evidence file and the confirmed file to be confirmed to obtain an authentication certificate.

Description

File authentication method, file authentication device and terminal equipment
Technical Field
The present application belongs to the technical field of document authentication, and in particular, relates to a document authentication method, a document authentication apparatus, a terminal device, and a computer-readable storage medium.
Background
With the rapid development of national economy and global economy, when various businesses are developed, a plurality of participants often sign or authenticate some documents together to use the documents as certificates. In order to ensure the authenticity and the validity of the document, a plurality of participants need to send out workers to go back and forth or transmit the document through logistics, so that the processes of signing or authenticating the document and the like need to consume large manpower and material resources, and the processing efficiency is low.
Disclosure of Invention
The embodiment of the application provides a file authentication method, a file authentication device, a terminal device and a computer readable storage medium, which can solve the problems that under some existing conditions, a plurality of parties sign or authenticate some files together, and the processing process when the files are used as certificates needs to consume large manpower and material resources, so that the processing efficiency is low.
In a first aspect, an embodiment of the present application provides a file authentication method, including:
after a file generation instruction is obtained, extracting a target file template and attribute information of preset parameters in the target file template according to a file template number represented in the file generation instruction;
acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
filling the target file template according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, and extracting and generating operation information, wherein the generated operation information comprises information associated with a generation process of generating the file to be confirmed;
sending the file to be confirmed to at least one account node related to the file generation instruction;
if the feedback information of each account node is acquired and each feedback information meets the corresponding preset condition, the confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generated operation information is generated;
and authenticating the evidence file and the confirmed file to be confirmed to obtain authentication credentials of the evidence file and the confirmed file to be confirmed.
In a second aspect, an embodiment of the present application provides a document authentication apparatus, including:
the file generation method comprises the steps that a first obtaining module is used for extracting a target file template and attribute information of preset parameters in the target file template according to a file template number represented in a file generation instruction after the file generation instruction is obtained;
the second acquisition module is used for acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
the first generation module is used for filling the target file template according to the attribute information and the parameter content of each preset parameter so as to generate a file to be confirmed, and extracting and generating operation information, wherein the generation operation information comprises information associated with a generation process for generating the file to be confirmed;
the sending module is used for sending the file to be confirmed to at least one account node related to the file generation instruction;
the second generation module is used for finishing the confirmation of the file to be confirmed and generating an evidence file containing the feedback information of each account node and the generated operation information if the feedback information of each account node is acquired and each feedback information meets the corresponding preset condition;
and the authentication module is used for authenticating the evidence file and the confirmed file to be confirmed to obtain authentication credentials of the evidence file and the confirmed file to be confirmed.
In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory, a processor, a display, and a computer program stored in the memory and executable on the processor, where the processor implements the file authentication method according to the first aspect when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the document authentication method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a computer program product, which, when running on a terminal device, causes the terminal device to execute the file authentication method described in the first aspect.
Compared with the prior art, the embodiment of the application has the advantages that: in the embodiment of the application, after a file generation instruction is obtained, according to a file template number related to the file generation instruction, extracting a target file template and attribute information of preset parameters in the target file template, and according to a source corresponding to each preset parameter, obtaining parameter content corresponding to each preset parameter, so that the target file template is filled according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, the file to be confirmed can be quickly and conveniently obtained, the operation process is simple, manual input is not needed, and flexible configuration can be conveniently performed through the target file template; further, the generation operation information including information associated with a generation process of generating the file to be confirmed is acquired, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is acquired and each feedback information meets a corresponding preset condition, confirmation of the file to be confirmed is completed, and an evidence file including the feedback information of each account node and the generation operation information is generated, at this time, the evidence file may include real information of a related operation of generating the file to be confirmed and a feedback of each account node; furthermore, the evidence file and the confirmed file to be confirmed are authenticated, so that the evidence file and the confirmed certificate of the confirmed file to be confirmed can be obtained, and the evidence file and the confirmed file to be confirmed can not be tampered, so that the authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and subsequent proof taking is facilitated. Through the embodiment of the application, the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants can be conveniently realized, and the method is low in cost of manpower and material resources and high in processing efficiency.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a document authentication method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of step S104 according to an embodiment of the present application;
fig. 3 is a schematic flowchart of step S106 according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a document authentication apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The file authentication method provided by the embodiment of the application can be applied to terminal devices such as a server, a desktop computer, a mobile phone, a tablet computer, a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, a super-mobile personal computer (UMPC), a netbook, and a Personal Digital Assistant (PDA), and the embodiment of the application does not limit the specific types of the terminal devices at all.
Specifically, fig. 1 shows a flowchart of a document authentication method provided in an embodiment of the present application, where the document authentication method may be applied to a terminal device.
The document authentication method may include:
step S101, after a file generation instruction is obtained, extracting a target file template and attribute information of preset parameters in the target file template according to a file template number represented in the file generation instruction.
In this embodiment of the application, the file generation instruction may instruct to generate a file to be confirmed. The document to be confirmed may be, for example, a legal document to be certified by signing a contract or a document requiring a plurality of parties for certification, and when applied in the financial field, the document to be confirmed may also be a contract or an analysis document including macro economic data such as currency and exchange rate, finance, stock index, financing product, future, option, bond, bank, enterprise/financial risk assessment, and the like.
In the embodiment of the present application, the file generation instruction may be acquired in various manners, for example, the file generation instruction may be received by a terminal device executing the embodiment of the present application through a preset information transmission manner; in addition, the operation may be generated by the terminal device after receiving a specific operation of the user from an application page or a web page. For example, the specific operation may be a touch operation on a specific virtual key or a pressing operation on a physical key, and the like. At this time, after the file generation instruction is acquired, the file template number related to the file generation instruction may be acquired from an application page or a web page associated with the preset file generation instruction.
Wherein the document template number associated with the document generation instruction uniquely identifies the target document template. Preset parameters can be preset in the target file template. In some cases, the preset parameters may be presented to the user in the form of a name plus a to-be-filled portion. The attribute information of the preset parameter may include one or more of a name, an identification value in the target document template, a field filling type (selection box, text box, input box, etc.), a field content length, a field content format (regular expression), a source, and the like.
The size type, the name and the like of the preset parameter can be determined according to actual needs. For example, if the target document template is used to generate a contract, the preset parameters may include one or more of the name, address, contact information, contract terms, and the like of the relevant party.
In the embodiment of the application, the target file template can be configured in advance and stored in a preset database, so that the target file template can be called quickly in an application and used for quickly generating a required file to be confirmed.
Step S102, obtaining the parameter content of each preset parameter according to the source corresponding to each preset parameter.
In this embodiment, the source corresponding to the preset parameter may be configured in the target file template in advance, or may be input by the user during the use process. Illustratively, the source may be a particular database link, a web page or terminal device local storage space, or the like.
For example, in a specific application scenario, the file generation instruction is used to generate a contract to be confirmed (i.e. a file to be confirmed) in which multiple parties participate, and in a preset database, client information of each client (e.g. each enterprise, administrator, etc.) is stored in advance, preset parameters in the target file template include client information preset parameters such as a client name, a client address, a contact way, etc., and a storage address (i.e. a source corresponding to each preset parameter) of each client information in the preset database is configured in advance.
In the application process, after the file generation instruction is obtained, the client associated with the file to be confirmed can be obtained, so that the parameter content of the preset parameter of each client information, such as the contact information, the client name, the client address and the like of the client associated with the file to be confirmed, can be obtained from the preset database according to the storage address of the client information of each client in the preset database.
It should be noted that the above examples are only illustrative and not limiting to the present embodiment.
Step S103, according to the attribute information and the parameter content of each preset parameter, filling the target file template to generate a file to be confirmed, and extracting and generating operation information, wherein the generating operation information comprises information associated with a generating process of generating the file to be confirmed.
In this embodiment of the application, the target document template after the completion of the filling may be used as the document to be confirmed. The generation operation information may be obtained in real time in the process of generating the file to be confirmed, for example, the generation operation information may be obtained in real time in a screenshot mode, a screen recording mode, a webpage extraction mode, an application information extraction mode, or the like.
For example, the generating operation information may include one or more of an initiator (such as an account issuing the file generating instruction) generating the file to be confirmed, a generating time (which may be represented by a timestamp), generating content of the file to be confirmed, a file number to be confirmed, and a related operation page. The specific storage form of the generated operation information may be determined according to an actual application scenario, and may be, for example, a screenshot of a related operation page or a document, a table, a video, and the like.
The generation operation information may be subsequently used as a certificate for the file to be confirmed to identify whether the file to be confirmed is subsequently tampered or the like.
And step S104, sending the file to be confirmed to at least one account node related to the file generation instruction.
In this embodiment of the application, at least one account node related to the file generation instruction may be determined according to information such as content of the file to be confirmed, an account associated with an initiating account initiating the file generation instruction, and/or pre-stored customer account information. For example, the account node may include a review account node, a recheck account node, a file signing account node such as a credit client/core enterprise/supervisor/core enterprise after-sale branch company, and the like. In a specific application scenario, if the document to be confirmed is a contract to be signed, the at least one account node related to the document generation instruction may include an internal audit account node (such as a department manager account node) of an initiator of the contract to be signed and account nodes of other signatory parties.
It should be noted that the files to be confirmed can be sequentially sent to at least part of account nodes according to a preset sequence, so as to implement at least part of a hierarchical auditing process; in addition, the file to be confirmed can also be sent to at least part of the account nodes in parallel, so that the part of the account nodes can process the file to be confirmed in parallel, and the processing efficiency is improved.
As shown in fig. 2, in some embodiments, the account nodes include an audit account node and a file signing account node;
the sending the file to be confirmed to at least one account node related to the file generation instruction comprises:
step S201, sequentially sending the files to be confirmed to each checking account node according to a preset checking sequence and confirmation information of a front account node corresponding to each checking account node;
and step S202, after the confirmation information of each audit account node is received in sequence, the file to be confirmed is sent to each file signing account node.
In the embodiment of the application, the audit account node can audit the file to be confirmed, and the file signing account node can sign and confirm the file to be confirmed.
For example, the audit account node may include an upper account node of an account node that initiates the file generation instruction, and the file signing account node may include an external customer account node, a supervisor account node, and the like.
In this embodiment, the to-be-confirmed file is sequentially sent to each audit account node according to a preset audit sequence and the confirmation information of the pre-account node corresponding to each audit account node, so that the audit process of the to-be-confirmed file can be realized after the confirmation information of each audit account node is obtained at one time. Further, the file to be confirmed after the auditing is completed can be sent to each file signing account node. At this time, the to-be-confirmed file after the audit is completed may be sent to each file signing account node in parallel, so that each file signing account node can process the to-be-confirmed file in parallel, thereby improving the information processing efficiency.
Step S105, if the feedback information of each account node is acquired and each feedback information meets the corresponding preset condition, the confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generated operation information is generated.
In the embodiment of the application, each feedback information meeting the corresponding preset condition can be determined according to the corresponding requirements, attributes and the like of each account node. For example, for a certain piece of the feedback information, the condition that the feedback information satisfies the corresponding preset condition may include: if the feedback information includes confirmation information and specific data information of the corresponding account node, it can be confirmed that the feedback information satisfies the corresponding preset condition. Of course, the preset condition may be adjusted according to a specific application scenario. It should be noted that the confirmation of the file to be confirmed can be determined according to the actual operation of the file to be confirmed. For example, if the document to be confirmed is a contract to be signed, the completion of the confirmation of the document to be confirmed may include the completion of the signing of the contract to be signed.
In the embodiment of the application, the preset conditions corresponding to different account nodes may be different.
For example, for an audit account node, if the feedback information of the audit account node includes audit confirmation information of the audit account node on the file to be confirmed, the feedback information of the audit account node may be considered to satisfy a corresponding preset condition;
for the file signing account node, the file signing account node may be an account node of an external client, so that in some specific application scenarios, a signature original text of a file to be confirmed can be signed through a USBKEY certificate to obtain a signature ciphertext, so as to ensure the security of feedback information of the account node of the external client. At this time, the feedback information may include the signature ciphertext information, corresponding USBKEY certificate verification information, signing operation information of the file signing account node, and the like, and if the USBKEY certificate verification information indicates that the USBKEY certificate is verified to be passed, and the signing operation information of the file signing account node indicates that the file signing account node confirms to sign the file to be confirmed, it may be determined that the feedback information of the file signing account node satisfies a corresponding preset condition.
The specific storage form of the evidence file can be determined according to the actual application scene, and for example, the specific storage form can include one or more of documents, tables, videos, pictures (such as screenshots of related operation pages) and the like. The evidence file comprises the feedback information and the generation operation information, so that the evidence file can comprise evidence about relevant operation processes and evidence such as signature texts, ciphertext and associated files of relevant clients, a comprehensive evidence chain can be formed, and the evidence effectiveness in subsequent testification is improved.
In some embodiments, after generating the evidence file containing the feedback information of each account node and the generation operation information, the method further includes:
and uploading the evidence file to a preset platform for storage, wherein the preset platform is a data storage platform built based on a block chain.
In the embodiment of the application, the preset platform may be a data storage platform built based on a block chain, and the like. Based on the characteristics of block chain decentralization, no tampering, whole-course trace retention and the like, the evidence file can be uploaded to a preset platform for storage, subsequent evidence obtaining can be facilitated, meanwhile, the preset platform can be used for storing the evidence file in a centralized mode, and excessive storage space occupation in the terminal equipment executing the embodiment of the application is avoided.
Step S106, the evidence file and the confirmed file to be confirmed are authenticated, and authentication credentials of the evidence file and the confirmed file to be confirmed are obtained.
In the embodiment of the present application, there are various ways to authenticate the file to be confirmed and the evidence file, and specifically, the ways may be determined according to an actual application scenario. In some cases, the to-be-confirmed file and the evidence file may be authenticated by a third party authentication method with high public trust, and at this time, the to-be-confirmed file and the evidence file may be sent to a third party, and an authentication certificate fed back by the third party may be received as an authentication credential for the to-be-confirmed file and the evidence file. Of course, in some cases, the document to be confirmed and the evidence document may also be authenticated by using a custom authentication manner commonly identified by a plurality of parties according to the embodiment of the present application.
As shown in fig. 3, in some embodiments, the authenticating the evidence file and the confirmed file completed to obtain the authentication credentials about the evidence file and the confirmed file completed to include:
step S301, sending the evidence file and the confirmed file to be confirmed to an authentication platform;
step S302, receiving a digital certificate obtained after the authentication platform authenticates the evidence file and the confirmed file to be confirmed, and using the digital certificate as the authentication credential.
In this embodiment, the authentication platform may be a third party authentication platform except for the interested parties involved in steps S101 to S105. For example, the authentication platform may be a China financial authentication center (CFCA) or the like.
The specific obtaining mode of the digital certificate can be determined by the authentication platform according to actual requirements. In some embodiments, the digital certificate may be obtained by processing, by the authentication platform, the evidence file and the confirmed file to be confirmed by using various encryption algorithms.
In the embodiment of the application, after the evidence file and the confirmed file to be confirmed are obtained, the evidence file and the confirmed file to be confirmed are authenticated through the authentication platform, so that an evidence obtaining party and an evidence authenticating party are effectively separated, and authenticity and validity of relevant evidence information are guaranteed.
In some embodiments, before extracting the target file template and the attribute information of the preset parameter in the target file template according to the file template number represented in the file generation instruction, the method further includes:
and generating a file template set, wherein the file template set comprises at least one file template and file template numbers respectively corresponding to the file templates, each file template number respectively identifies each file template, and the target file template is at least one of the file templates.
In the embodiment of the application, each file template can be uniquely identified by a corresponding file template number.
In the embodiment of the application, the types of the file templates in the file template set can be determined according to actual application scenarios, and the preset parameters and the attribute information thereof in each file template can be individually set, so that flexible configuration of the file templates is realized, the applicability is good, the development efficiency is improved, repeated development is not needed, and the maintenance cost is low.
In some embodiments, after the file generation instruction is obtained, extracting the target file template and the attribute information of the preset parameter in the target file template according to the file template number represented in the file generation instruction includes:
after a file generation instruction is acquired, acquiring a file template number related to the file generation instruction from a display page associated with the file generation instruction;
and acquiring a target file template from the file template set according to the file template number related to the file generation instruction, and acquiring the attribute information of preset parameters in the target file template.
In some embodiments, the user may trigger the file generation instruction by performing a specific operation (e.g., a selection operation, an operation of inputting a text, etc.) on the display page, at this time, the display page may be a display page associated with the file generation instruction, and the terminal device may obtain a file template number associated with the file generation instruction through information such as a script of the corresponding display page, so as to find a corresponding file template through the file template number, so as to obtain a target file template.
In some embodiments, the file authentication methods may be applied to a block chain (Blockchain), where the block chain in this embodiment is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, and an encryption algorithm. The block chain, which is essentially a decentralized database, is a string of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, which is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
By realizing the file authentication method embodiments through the block chain, the authenticity of each operation, such as generation operation information, feedback information and authentication, can be ensured, and information verification, transmission, sharing and the like of each account node are facilitated.
In the embodiment of the application, after a file generation instruction is obtained, a target file template and attribute information of preset parameters in the target file template are obtained according to a file template number related to the file generation instruction, and parameter contents corresponding to the preset parameters are obtained from sources corresponding to the preset parameters respectively, so that the target file template is filled according to the attribute information and the parameter contents of the preset parameters to generate a file to be confirmed, the file to be confirmed can be obtained quickly and conveniently, the operation process is simple, manual input is not needed, and flexible configuration can be conveniently performed through the target file template; further, the generation operation information including information associated with a generation process of generating the file to be confirmed is acquired, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is acquired and each feedback information meets a corresponding preset condition, confirmation of the file to be confirmed is completed, and an evidence file including the feedback information of each account node and the generation operation information is generated, at this time, the evidence file may include real information of a related operation of generating the file to be confirmed and a feedback of each account node; furthermore, the evidence file and the confirmed file to be confirmed are authenticated, so that the evidence file and the confirmed certificate of the confirmed file to be confirmed can be obtained, and the evidence file and the confirmed file to be confirmed can not be tampered, so that the authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and subsequent proof taking is facilitated. Through the embodiment of the application, the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants can be conveniently realized, and the method is low in cost of manpower and material resources and high in processing efficiency.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 4 shows a block diagram of a document authentication apparatus according to an embodiment of the present application, which corresponds to the document authentication method described in the above embodiment, and only the relevant parts of the embodiment of the present application are shown for convenience of description.
Referring to fig. 4, the document authentication apparatus 4 includes:
the first obtaining module 401 is configured to, after a file generation instruction is obtained, extract a target file template and attribute information of a preset parameter in the target file template according to a file template number represented in the file generation instruction;
a second obtaining module 402, configured to obtain parameter content of each preset parameter according to a source corresponding to each preset parameter;
a first generating module 403, configured to fill the target file template according to the attribute information and the parameter content of each preset parameter to generate a to-be-confirmed file, and extract generating operation information, where the generating operation information includes information associated with a generating process of generating the to-be-confirmed file;
a sending module 404, configured to send the file to be confirmed to at least one account node related to the file generation instruction;
a second generating module 405, configured to complete confirmation of the file to be confirmed and generate an evidence file including the feedback information of each account node and the generated operation information if the feedback information of each account node is obtained and each feedback information meets a corresponding preset condition;
an authentication module 406, configured to authenticate the evidence file and the confirmed file to be confirmed, and obtain an authentication credential about the evidence file and the confirmed file to be confirmed.
Optionally, the document authentication apparatus 4 further includes:
and the third generation module is used for generating a file template set, wherein the file template set comprises at least one file template and file template numbers respectively corresponding to the file templates, each file template number respectively identifies each file template, and the target file template is at least one of the file templates.
Optionally, the first obtaining module 401 specifically includes:
the file generation device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a file template number related to a file generation instruction from a display page related to the file generation instruction after acquiring the file generation instruction;
and the second acquisition unit is used for acquiring a target file template from the file template set according to the file template number related to the file generation instruction and acquiring the attribute information of the preset parameter in the target file template.
Optionally, the account node includes an audit account node and a file signing account node;
the sending module 404 specifically includes:
the first sending unit is used for sequentially sending the files to be confirmed to each checking account node according to a preset checking sequence and the confirmation information of the pre-account nodes corresponding to each checking account node;
and the second sending unit is used for sending the file to be confirmed to each file signing account node after receiving the confirmation information of each checking account node in sequence.
Optionally, the document authentication apparatus 4 further includes:
and the uploading module is used for uploading the evidence file to a preset platform for storage, wherein the preset platform is a data storage platform built based on a block chain.
Optionally, the authentication module 406 specifically includes:
the sending unit is used for sending the file to be confirmed and the evidence file to an authentication platform;
and the receiving unit is used for receiving a digital certificate obtained after the authentication platform authenticates the file to be confirmed and the evidence file, and taking the digital certificate as the authentication certificate.
In the embodiment of the application, after a file generation instruction is obtained, a target file template and attribute information of preset parameters in the target file template are obtained according to a file template number related to the file generation instruction, and parameter contents corresponding to the preset parameters are obtained from sources corresponding to the preset parameters respectively, so that the target file template is filled according to the attribute information and the parameter contents of the preset parameters to generate a file to be confirmed, the file to be confirmed can be obtained quickly and conveniently, the operation process is simple, manual input is not needed, and flexible configuration can be conveniently performed through the target file template; further, the generation operation information including information associated with a generation process of generating the file to be confirmed is acquired, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is acquired and each feedback information meets a corresponding preset condition, confirmation of the file to be confirmed is completed, and an evidence file including the feedback information of each account node and the generation operation information is generated, at this time, the evidence file may include real information of a related operation of generating the file to be confirmed and a feedback of each account node; furthermore, the evidence file and the confirmed file to be confirmed are authenticated, so that the evidence file and the confirmed certificate of the confirmed file to be confirmed can be obtained, and the evidence file and the confirmed file to be confirmed can not be tampered, so that the authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and subsequent proof taking is facilitated. Through the embodiment of the application, the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants can be conveniently realized, and the method is low in cost of manpower and material resources and high in processing efficiency.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 5, the terminal device 5 of this embodiment includes: at least one processor 50 (only one is shown in fig. 5), a memory 51, and a computer program 52 stored in the memory 51 and operable on the at least one processor 50, wherein the processor 50 implements the steps in any of the various document authentication method embodiments described above when executing the computer program 52.
The terminal device 5 may be a server, a mobile phone, a wearable device, an Augmented Reality (AR)/Virtual Reality (VR) device, a desktop computer, a notebook, a desktop computer, a palmtop computer, or other computing devices. The terminal device may include, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is merely an example of the terminal device 5, and does not constitute a limitation of the terminal device 5, and may include more or less components than those shown, or combine some of the components, or different components, such as may also include input devices, output devices, network access devices, etc. The input device may include a keyboard, a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, a camera, and the like, and the output device may include a display, a speaker, and the like.
The Processor 50 may be a Central Processing Unit (CPU), and the Processor 50 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 51 may be an internal storage unit of the terminal device 5, such as a hard disk or a memory of the terminal device 5. In other embodiments, the memory 51 may also be an external storage device of the terminal device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 5. Further, the memory 51 may include both an internal storage unit and an external storage device of the terminal device 5. The memory 51 is used for storing an operating system, an application program, a Boot Loader (Boot Loader), data, and other programs, such as program codes of the computer programs. The above-mentioned memory 51 may also be used to temporarily store data that has been output or is to be output.
In addition, although not shown, the terminal device 5 may further include a network connection module, such as a bluetooth module Wi-Fi module, a cellular network module, and the like, which is not described herein again.
In this embodiment, when the processor 50 executes the computer program 52 to implement the steps in any of the above-mentioned embodiments of the file authentication method, after a file generation instruction is obtained, according to a file template number related to the file generation instruction, an object file template and attribute information of preset parameters in the object file template are obtained, and parameter contents corresponding to the preset parameters are respectively obtained from sources corresponding to the preset parameters, so that the object file template is filled according to the attribute information and the parameter contents of the preset parameters to generate a file to be confirmed, and the file to be confirmed can be quickly and conveniently obtained, and the operation flow is simple, manual input is not required, and flexible configuration is facilitated through the object file template; further, the generation operation information including information associated with a generation process of generating the file to be confirmed is acquired, and the file to be confirmed is sent to at least one account node related to the file generation instruction, so that when feedback information of each account node is acquired and each feedback information meets a corresponding preset condition, confirmation of the file to be confirmed is completed, and an evidence file including the feedback information of each account node and the generation operation information is generated, at this time, the evidence file may include real information of a related operation of generating the file to be confirmed and a feedback of each account node; furthermore, the evidence file and the confirmed file to be confirmed are authenticated, so that the evidence file and the confirmed certificate of the confirmed file to be confirmed can be obtained, and the evidence file and the confirmed file to be confirmed can not be tampered, so that the authenticity of the file to be confirmed, a related generation process and a feedback process is guaranteed, and subsequent proof taking is facilitated. Through the embodiment of the application, the processes of acquiring, signing, authenticating and the like of the files to be confirmed by a plurality of participants can be conveniently realized, and the method is low in cost of manpower and material resources and high in processing efficiency.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above method embodiments.
The embodiments of the present application provide a computer program product, which when running on a terminal device, enables the terminal device to implement the steps in the above method embodiments when executed.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form. The computer-readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/terminal apparatus, a recording medium, computer Memory, Read-Only Memory (ROM), random-access Memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other ways. For example, the above-described apparatus/network device embodiments are merely illustrative, and for example, the division of the above modules or units is only one logical function division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A method of document authentication, comprising:
after a file generation instruction is obtained, extracting a target file template and attribute information of preset parameters in the target file template according to a file template number represented in the file generation instruction;
acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
filling the target file template according to the attribute information and the parameter content of each preset parameter to generate a file to be confirmed, and extracting and generating operation information, wherein the generated operation information comprises information associated with a generation process of generating the file to be confirmed;
sending the file to be confirmed to at least one account node related to the file generation instruction;
if the feedback information of each account node is acquired and each feedback information meets the corresponding preset condition, the confirmation of the file to be confirmed is completed, and an evidence file containing the feedback information of each account node and the generated operation information is generated;
and authenticating the evidence file and the confirmed file to be confirmed to obtain authentication credentials of the evidence file and the confirmed file to be confirmed.
2. The document authentication method according to claim 1, before extracting the target document template and the attribute information of the preset parameter in the target document template according to the document template number represented in the document generation instruction, further comprising:
and generating a file template set, wherein the file template set comprises at least one file template and file template numbers respectively corresponding to the file templates, each file template number respectively identifies each file template, and the target file template is at least one of the file templates.
3. The file authentication method according to claim 2, wherein after the file generation instruction is obtained, extracting the target file template and the attribute information of the preset parameter in the target file template according to the file template number represented in the file generation instruction comprises:
after a file generation instruction is acquired, acquiring a file template number related to the file generation instruction from a display page associated with the file generation instruction;
and acquiring a target file template from the file template set according to the file template number related to the file generation instruction, and acquiring the attribute information of preset parameters in the target file template.
4. The document authentication method of claim 1, wherein the account nodes include an audit account node and a document signing account node;
the sending the file to be confirmed to at least one account node related to the file generation instruction comprises:
according to a preset auditing sequence and the confirmation information of the pre-account nodes corresponding to the auditing account nodes, the files to be confirmed are sequentially sent to the auditing account nodes;
and after the confirmation information of each audit account node is received in sequence, the file to be confirmed is sent to each file signing account node.
5. The document authentication method according to claim 1, further comprising, after generating the evidence document containing the feedback information of each account node and the generation operation information:
and uploading the evidence file to a preset platform for storage, wherein the preset platform is a data storage platform built based on a block chain.
6. The document authentication method according to any one of claims 1 to 5, wherein the authenticating the evidence document and the document to be confirmed that is confirmed to be completed to obtain authentication credentials about the evidence document and the document to be confirmed that is confirmed to be completed comprises:
sending the evidence file and the confirmed file to be confirmed to an authentication platform;
and receiving a digital certificate obtained after the authentication platform authenticates the evidence file and the confirmed file to be confirmed, and taking the digital certificate as the authentication certificate.
7. A document authentication apparatus, comprising:
the file generation method comprises the steps that a first obtaining module is used for extracting a target file template and attribute information of preset parameters in the target file template according to a file template number represented in a file generation instruction after the file generation instruction is obtained;
the second acquisition module is used for acquiring the parameter content of each preset parameter according to the source corresponding to each preset parameter;
the first generation module is used for filling the target file template according to the attribute information and the parameter content of each preset parameter so as to generate a file to be confirmed, and extracting and generating operation information, wherein the generation operation information comprises information associated with a generation process for generating the file to be confirmed;
the sending module is used for sending the file to be confirmed to at least one account node related to the file generation instruction;
the second generation module is used for finishing the confirmation of the file to be confirmed and generating an evidence file containing the feedback information of each account node and the generated operation information if the feedback information of each account node is acquired and each feedback information meets the corresponding preset condition;
and the authentication module is used for authenticating the evidence file and the confirmed file to be confirmed to obtain authentication credentials of the evidence file and the confirmed file to be confirmed.
8. The document authentication device according to claim 7, wherein the authentication module specifically includes:
the sending unit is used for sending the file to be confirmed and the evidence file to an authentication platform;
and the receiving unit is used for receiving a digital certificate obtained after the authentication platform authenticates the file to be confirmed and the evidence file, and taking the digital certificate as the authentication certificate.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the document authentication method according to any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements a document authentication method according to any one of claims 1 to 6.
CN202010467224.9A 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment Active CN111681141B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010467224.9A CN111681141B (en) 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010467224.9A CN111681141B (en) 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment

Publications (2)

Publication Number Publication Date
CN111681141A true CN111681141A (en) 2020-09-18
CN111681141B CN111681141B (en) 2024-05-10

Family

ID=72434358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010467224.9A Active CN111681141B (en) 2020-05-28 2020-05-28 File authentication method, file authentication device and terminal equipment

Country Status (1)

Country Link
CN (1) CN111681141B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112561473A (en) * 2020-12-14 2021-03-26 平安国际融资租赁有限公司 Intention file generation method and device, computer equipment and storage medium
CN112783829A (en) * 2021-01-11 2021-05-11 广州中海云科技有限公司 Maritime evidence storage method and device, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
WO2019037396A1 (en) * 2017-08-24 2019-02-28 深圳壹账通智能科技有限公司 Account clearing method, device and equipment and storage medium
CN110443596A (en) * 2019-06-19 2019-11-12 深圳壹账通智能科技有限公司 Data processing method, device, computer equipment and storage medium
WO2020062642A1 (en) * 2018-09-27 2020-04-02 深圳壹账通智能科技有限公司 Blockchain-based method, device, and equipment for electronic contract signing, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
WO2019037396A1 (en) * 2017-08-24 2019-02-28 深圳壹账通智能科技有限公司 Account clearing method, device and equipment and storage medium
WO2020062642A1 (en) * 2018-09-27 2020-04-02 深圳壹账通智能科技有限公司 Blockchain-based method, device, and equipment for electronic contract signing, and storage medium
CN110443596A (en) * 2019-06-19 2019-11-12 深圳壹账通智能科技有限公司 Data processing method, device, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112561473A (en) * 2020-12-14 2021-03-26 平安国际融资租赁有限公司 Intention file generation method and device, computer equipment and storage medium
CN112783829A (en) * 2021-01-11 2021-05-11 广州中海云科技有限公司 Maritime evidence storage method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111681141B (en) 2024-05-10

Similar Documents

Publication Publication Date Title
CN110493007B (en) Block chain based information verification method, device, equipment and storage medium
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
CN108898389B (en) Content verification method and device based on block chain and electronic equipment
CN111080295B (en) Electronic contract processing method and device based on blockchain
WO2020134653A1 (en) Method and device for uploading electronic certificate
CN109784922B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
US20190251556A1 (en) Distributed ledger on-boarding system for standby guarantee resources
CN112215608A (en) Data processing method and device
TWI648679B (en) License management system and method using blockchain
WO2021218166A1 (en) Contract signing method and apparatus, device and computer-readable storage medium
US11558199B1 (en) Systems and methods for privacy preserving distributed ledger consensus
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN112199721A (en) Authentication information processing method, device, equipment and storage medium
CN108242999B (en) Key escrow method, device and computer-readable storage medium
CN110598460B (en) Block chain-based electronic signature method and device and storage medium
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN111881483A (en) Resource account binding method, device, equipment and medium based on block chain
CN111325585A (en) Asset transfer method, device and computer readable storage medium
CN111681141B (en) File authentication method, file authentication device and terminal equipment
CN112862589A (en) Identity verification method, device and system in financial scene
CN111311259A (en) Bill processing method, device, terminal and computer readable storage medium
CN114519206A (en) Method for anonymously signing electronic contract and signature system
CN111444493A (en) Electronic contract signing method and device, electronic equipment and readable storage medium
CN113129008A (en) Data processing method and device, computer readable medium and electronic equipment
CN111259411B (en) Block chain management method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant