CN112270556A - Method for verifying authenticity of electronic contract, electronic device and storage medium - Google Patents

Method for verifying authenticity of electronic contract, electronic device and storage medium Download PDF

Info

Publication number
CN112270556A
CN112270556A CN202011325548.5A CN202011325548A CN112270556A CN 112270556 A CN112270556 A CN 112270556A CN 202011325548 A CN202011325548 A CN 202011325548A CN 112270556 A CN112270556 A CN 112270556A
Authority
CN
China
Prior art keywords
electronic contract
signing
user
identification information
authenticity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011325548.5A
Other languages
Chinese (zh)
Inventor
崔巧红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Yuanqi Software Co ltd
Original Assignee
Suzhou Yuanqi Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Yuanqi Software Co ltd filed Critical Suzhou Yuanqi Software Co ltd
Priority to CN202011325548.5A priority Critical patent/CN112270556A/en
Publication of CN112270556A publication Critical patent/CN112270556A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The specification discloses an authenticity verification method of an electronic contract, electronic equipment and a storage medium, wherein the method comprises the following steps: the first user terminal sends a first electronic contract, a first signature and a signing request for signing the first electronic contract, and issues the signing request to the block chain; the second user end verifies whether the first signature is legal or not; if the first signature is legal, the first electronic contract is signed and then sent to the first user end, and meanwhile, the signed message is issued to the block chain; each node of the block chain receives a request for verifying the authenticity of the first electronic contract sent by a request end, acquires and verifies the authenticity of the first electronic contract according to the corresponding signing request and signing message and then returns a verification result; the request end finally determines whether the first electronic contract is true or not based on the verification results returned by the nodes, so that the technical problems that the authenticity of the electronic contract in the prior art is difficult to confirm and the implementation cost is high are solved.

Description

Method for verifying authenticity of electronic contract, electronic device and storage medium
Technical Field
The present invention relates to the field of document processing technologies, and in particular, to an authenticity verification method for an electronic contract, an electronic device, and a storage medium.
Background
At present, electronic contracts are usually stored on a centralized information system, so that the possibility of tampering exists, and the authenticity of the electronic contract is difficult to guarantee.
By providing a decentralized information system to store electronic contracts, the risk of tampering with the electronic contract can be reduced, however, the cost of building a decentralized information system is typically expensive, making it difficult to commercially successfully implement.
Therefore, there is a need to provide a method for verifying the authenticity of an electronic contract to solve the above-mentioned problems of the prior art.
Disclosure of Invention
The present specification aims to provide an authenticity verification method of an electronic contract, an electronic device, and a storage medium, so as to solve the technical problems that the authenticity of the electronic contract in the prior art is difficult to confirm and the implementation cost is high.
The above purpose is realized by adopting the following technical scheme:
one or more embodiments of the present specification provide a method of verifying authenticity of an electronic contract, the method comprising:
a first user terminal sends a first electronic contract, a first signature and a signing request for signing the first electronic contract to a second user terminal, and the first user terminal issues the signing request to each node of a block chain, wherein each node of the block chain comprises a plurality of nodes including the first user terminal and the second user terminal, and the signing request comprises identification information of the first user terminal and/or identification information of the second user terminal;
the second user end verifies whether the first signature is legal or not;
if the first signature is legal, the second user terminal signs the first electronic contract and sends the signed first electronic contract to the first user terminal, and meanwhile, the second user terminal issues a signing message for signing the first electronic contract to the block chain, wherein the signing message comprises identification information of the first user terminal and/or identification information of the second user terminal;
each node of the block chain receives a request for verifying the authenticity of the first electronic contract sent by a request end, acquires a signing request and a signing message corresponding to the first electronic contract, and returns a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract;
and finally determining whether the first electronic contract is authentic or not by the request end based on the verification result returned by each node.
Optionally, the method further comprises:
a first user terminal issues a first public key to each node of the block chain, wherein a first private key corresponding to the first public key can be used for encrypting the first electronic contract to obtain a first signature, the first signature is obtained by encrypting an information digest of the first electronic contract by using the first private key, and the information digest of the first electronic contract is obtained by performing hash calculation on the first electronic contract;
optionally, the verifying, by the second user end, whether the first signature is legal includes:
the second user terminal obtains the first public key from the block chain;
the second user terminal decrypts the first signature by using the first public key, and if the decryption is unsuccessful, the first signature is judged to be illegal;
and if the decryption is successful, performing hash calculation on the first electronic contract, comparing the calculated hash value with the information digest obtained by decrypting the first signature, judging whether the calculated hash value is consistent with the information digest obtained by decrypting the first signature, if so, judging that the first signature is legal, and otherwise, judging that the first signature is illegal.
Optionally, the returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract includes:
acquiring the identification information of the first user side from the signing request corresponding to the first electronic contract, and acquiring the identification information of the first user side from the signing message corresponding to the first electronic contract;
and judging whether the identification information of the first user side, which is acquired from the signing request corresponding to the first electronic contract, is consistent with the identification information of the first user side, which is acquired from the signing message corresponding to the first electronic contract, if not, judging that the first electronic contract is not authentic.
Optionally, the returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract includes:
acquiring the identification information of the second user side from the signing request corresponding to the first electronic contract, and acquiring the identification information of the second user side from the signing message corresponding to the first electronic contract;
and judging whether the identification information of the second user side, which is acquired from the signing request corresponding to the first electronic contract, is consistent with the identification information of the second user side, which is acquired from the signing message corresponding to the first electronic contract, if so, judging that the first electronic contract is true, otherwise, judging that the first electronic contract is not true.
Optionally, the returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract includes:
obtaining the identification information of the first user end and the identification information of the second user end from the signing request corresponding to the first electronic contract, and
acquiring the identification information of the first user end and the identification information of the second user end from the signing message corresponding to the first electronic contract;
judging whether the identification information of the first user end acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user end acquired from the signing message corresponding to the first electronic contract, and if not, judging that the first electronic contract is not authentic;
otherwise, judging whether the identification information of the second user end acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user end acquired from the signing message corresponding to the first electronic contract, if so, judging that the first electronic contract is true, otherwise, judging that the first electronic contract is not true.
Optionally, the determining, by the requesting end, whether the first electronic contract is authentic based on the verification result returned by each node, includes:
obtaining the number of nodes with returned verification results as the first electronic contract is true;
judging whether the number of the nodes with the returned verification result that the first electronic contract is real exceeds a preset value or not, wherein the preset value is determined by the number of the nodes in the block chain;
and finally determining that the first electronic contract is authentic if the preset value is exceeded, or else, finally determining that the first electronic contract is not authentic.
Optionally, the request end is any node of the block chain.
The present specification also provides an authenticity verification apparatus for an electronic contract, the apparatus including:
a signing request module, configured to send, by a first user end, a first electronic contract, a first signature, and a signing request for signing the first electronic contract to a second user end, and the first user end issues the signing request to each node of a block chain, where each node of the block chain includes multiple nodes including the first user end and the second user end, and the signing request includes identification information of the first user end and/or identification information of the second user end;
the validity verification module is used for verifying whether the first signature is legal or not by the second user terminal;
a signing message module, configured to sign the first electronic contract and send the signed first electronic contract to the first user if the first signature is legal, and meanwhile, the second user issues a signing message for signing the first electronic contract to the block chain, where the signing message includes identification information of the first user and/or identification information of the second user;
the authenticity verification module is used for receiving a request for verifying the authenticity of the first electronic contract sent by a request end by each node of the block chain, acquiring a signing request and a signing message corresponding to the first electronic contract, verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract and returning a verification result;
and the authenticity determining module is used for finally determining whether the first electronic contract is authentic or not based on the verification result returned by each node by the requesting end.
Optionally, the apparatus further comprises:
a public key issuing module, configured to issue, by a first user, a first public key to each node of the block chain, where the first electronic contract is encrypted by using a first private key corresponding to the first public key to obtain a first signature, the first signature is obtained by encrypting an information digest of the first electronic contract by using the first private key, and the information digest of the first electronic contract is obtained by performing hash calculation on the first electronic contract;
optionally, the validity verifying module includes:
a public key obtaining unit, configured to obtain, by the second user end, the first public key from the block chain;
the signature decryption unit is used for decrypting the first signature by the second user end by using the first public key, and if the decryption is unsuccessful, judging that the first signature is illegal;
and the hash value comparison unit is used for carrying out hash calculation on the first electronic contract if the decryption is successful, comparing the calculated hash value with the information abstract obtained by decrypting the first signature, judging whether the calculated hash value is consistent with the information abstract, judging whether the first signature is legal if the calculated hash value is consistent with the information abstract, and judging that the first signature is illegal if the calculated hash value is not consistent with the information abstract.
Optionally, the authenticity verification module comprises:
a first identifier obtaining unit, configured to obtain identifier information of the first user from a signing request corresponding to the first electronic contract, and obtain identifier information of the first user from a signing message corresponding to the first electronic contract;
a first identifier determining unit, configured to determine whether the identifier information of the first user obtained from the signing request corresponding to the first electronic contract is consistent with the identifier information of the first user obtained from the signing message corresponding to the first electronic contract, and if not, determine that the first electronic contract is not authentic.
Optionally, the authenticity verification module comprises:
a second identifier obtaining unit, configured to obtain the identifier information of the second user from the signing request corresponding to the first electronic contract, and obtain the identifier information of the second user from the signing message corresponding to the first electronic contract;
and the second identification judgment unit is used for judging whether the identification information of the second user side, which is acquired from the signing request corresponding to the first electronic contract, is consistent with the identification information of the second user side, which is acquired from the signing message corresponding to the first electronic contract, if so, judging that the first electronic contract is true, otherwise, judging that the first electronic contract is not true.
Optionally, the authenticity verification module comprises:
a third identifier obtaining unit, configured to obtain, from a signing request corresponding to the first electronic contract, identifier information of the first user and identifier information of the second user;
a fourth identifier obtaining unit, configured to obtain, from a signed message corresponding to the first electronic contract, identifier information of the first user and identifier information of the second user;
a third identification judgment unit, configured to judge whether the identification information of the first user obtained from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user obtained from the signing message corresponding to the first electronic contract, and if not, judge that the first electronic contract is not authentic;
a fourth identification determination unit, configured to determine whether the identification information of the second user obtained from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user obtained from the signing message corresponding to the first electronic contract, if so, determine that the first electronic contract is true, otherwise, determine that the first electronic contract is not true.
Optionally, the authenticity determination module comprises:
a quantity obtaining unit, configured to obtain the quantity of the nodes for which the returned verification result is that the first electronic contract is authentic;
the quantity judgment unit is used for judging whether the quantity of the nodes returning the verification result that the first electronic contract is real exceeds a preset value, wherein the preset value is determined by the quantity of the nodes in the block chain;
and the truth determining unit is used for finally determining that the first electronic contract is authentic if the preset value is exceeded, and finally determining that the first electronic contract is not authentic if the preset value is not exceeded.
Optionally, the request end is any node of the block chain.
The present specification also provides an electronic device comprising a processor and a memory, said memory being configured to store executable instructions of said processor, said processor being configured to perform the steps in the above-mentioned method of authenticity verification of an electronic contract via execution of said executable instructions.
The present specification also provides a computer-readable storage medium having stored thereon a computer program that, when executed, implements the steps in the above-described method of verifying authenticity of an electronic contract.
The present specification also provides a computer program product comprising instructions which, when run on a computer, cause the computer to carry out the steps of the above-mentioned method of authenticity verification of an electronic contract.
In the method, the electronic device, and the storage medium for verifying the authenticity of the electronic contract provided in each embodiment of the present specification, in this embodiment, when the first user sends the first electronic contract, the first signature, and the signing request for signing the first electronic contract to the second user, the signing request is issued to each node of the block chain, and after the second user signs the first electronic contract, the signing message for signing the first electronic contract is issued to the block chain, so that, when the authenticity of the first electronic contract needs to be verified, the authenticity of the first electronic contract can be verified by using each node of the block chain according to the signing request and the signing message corresponding to the first electronic contract, and finally, whether the first electronic contract is authentic or not is determined based on the verification result returned by each node, so that after the second user signs the first electronic contract sent by the first user, the third party can verify the authenticity signed by the first electronic contract and ensure the credible authenticity verification result, wherein each user end with business connection including the first user end and the second user end forms each node of the block chain, so that the block chain does not need to be additionally constructed, and the realization cost is low.
Drawings
The present description will be further explained with reference to the drawings and examples.
Fig. 1 is a schematic flow chart of an authenticity verification method of an electronic contract provided in an embodiment of the present specification;
FIG. 2 is a schematic flow chart of a further method of verifying authenticity of an electronic contract as provided in an embodiment of the present description;
FIG. 3 is a schematic flow chart of step S2 in FIG. 1 or FIG. 2;
FIG. 4 is a schematic flow chart of step S4 in FIG. 1 or FIG. 2;
FIG. 5 is another schematic flow chart of step S4 in FIG. 1 or FIG. 2;
FIG. 6 is a schematic view of a further flowchart of step S4 in FIG. 1 or FIG. 2;
fig. 7 is a schematic flow chart of step S5 in fig. 1 or fig. 2;
fig. 8 is a schematic structural diagram of an authenticity verifying apparatus for an electronic contract provided in an embodiment of the present specification;
fig. 9 is a schematic configuration diagram of an authenticity verification apparatus for yet another electronic contract provided in an embodiment of the present specification;
FIG. 10 is a schematic structural diagram of module M2 in FIG. 8 or FIG. 9;
FIG. 11 is a schematic structural diagram of module M4 in FIG. 8 or FIG. 9;
FIG. 12 is another schematic diagram of module M4 of FIG. 8 or 9;
FIG. 13 is a schematic diagram of a further structure of module M4 of FIG. 8 or 9;
FIG. 14 is a schematic structural diagram of module M5 in FIG. 8 or FIG. 9;
fig. 15 is a block diagram of one configuration of an electronic apparatus provided in an embodiment of the present specification.
Fig. 16 is a schematic structural diagram of a program product implementing an authenticity verification method for an electronic contract provided in an embodiment of the present specification.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the present description. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 shows an authenticity verification method of an electronic contract of the present specification. As shown in fig. 1, the method may include:
step S1, the first user sends a first electronic contract, a first signature, and a signing request for signing the first electronic contract to the second user, and the first user issues the signing request to each node of a blockchain, where each node of the blockchain includes multiple nodes including the first user and the second user, and the signing request includes identification information of the first user and/or identification information of the second user. The user terminal may be a computer or a handheld computer device, such as a tablet computer, a smart phone, and the like. The first electronic contract may be a data telegram or an email. In one example, the signing request may include only identification information of the first user; in another example, the signing request may include only identification information of the second user; in yet another example, the signing request may include identification information of the first user and identification information of the second user. The identification information is information that can verify authenticity of the user side, and specifically, the identification information may be IP address information of the user side, or may be a name given to the user side according to a predetermined rule.
And step S2, the second user end verifies whether the first signature is legal or not.
Step S3, if the first signature is legal, the second user signs the first electronic contract, and sends the signed first electronic contract to the first user, and meanwhile, the second user issues a signing message for signing the first electronic contract to the block chain, where the signing message includes identification information of the first user and/or identification information of the second user. In one example, the signed message may include only identification information of the first user; in another example, the signed message may include only identification information of the second user; in yet another example, the signed message may include identification information of the first user terminal and identification information of the second user terminal.
Step S4, each node of the block chain receives a request for verifying the authenticity of the first electronic contract sent by a request end, acquires a signing request and a signing message corresponding to the first electronic contract, and returns a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract.
The request end may be any node of the block chain. In one example, the requesting peer may be a first user peer; in another example, the requesting peer may be a second user peer; in other examples, the requesting end may be other user ends besides the first user end and the second user end which form the block chain. Because the request end is any node of the block chain, each user end with the electronic contract signing service and the user end needing to verify the authenticity of the electronic contract can form each node of the block chain, so that the authenticity of the electronic contract can be reliably verified, the implementation is easy, and the cost is low.
Step S5, the requesting end finally determines whether the first electronic contract is authentic based on the verification result returned by each node.
Because the first user end sends the first electronic contract, the first signature and the signing request for signing the first electronic contract to the second user end, the signing request is issued to each node of the block chain, and the second user end issues the signing message for signing the first electronic contract to the block chain after signing the first electronic contract, when the authenticity of the first electronic contract needs to be verified, each node of the block chain can be used for verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract, and whether the first electronic contract is authentic or not is finally determined based on the verification result returned by each node, so that after the second user end signs the first electronic contract sent by the first user end, a third party can be provided for verifying the authenticity of the signing of the first electronic contract, and the authenticity verification result is ensured to be credible, wherein each user side with service contact including the first user side and the second user side forms each node of the block chain, so that the block chain does not need to be additionally constructed, and the realization cost is low.
As shown in fig. 2, in other embodiments, the method for verifying authenticity of the electronic contract may further include:
step S6, the first user issues a first public key to each node of the block chain, where the first electronic contract may be encrypted by using a first private key corresponding to the first public key to obtain the first signature, the first signature is obtained by encrypting an information digest of the first electronic contract by using the first private key, and the information digest of the first electronic contract is obtained by performing hash calculation on the first electronic contract. In this way, the first public key is issued at each node of the block chain, so that the first public key is difficult to be tampered, the authenticity of the first public key can be ensured, and the security of signing the first electronic contract is ensured.
As shown in fig. 3, in the step of the method for verifying the authenticity of the electronic contract, the step S2, specifically, the second user verifying whether the first signature is legal, may include:
step S21, the second user terminal obtains the first public key from the block chain;
step S22, the second user terminal uses the first public key to decrypt the first signature, if the decryption is unsuccessful, the first signature is judged to be illegal;
step S23, if the decryption is successful, the hash calculation is carried out on the first electronic contract, the calculated hash value is compared with the information abstract obtained by decrypting the first signature, whether the calculated hash value is consistent with the information abstract is judged, if so, the first signature is judged to be legal, otherwise, the first signature is judged to be illegal.
The first public key is acquired from the block chain to decrypt the first signature, if the decryption is unsuccessful, the first signature is judged to be illegal, if the decryption is successful, a hash value obtained by hash calculation of the first electronic contract is compared with an information abstract obtained by decryption of the first signature, and finally the first signature is judged to be illegal.
As shown in fig. 4, in the step of the method for verifying the authenticity of the electronic contract, the step S4, specifically, the step of returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract, may include:
step S411, obtaining the identification information of the first user from the signing request corresponding to the first electronic contract, and obtaining the identification information of the first user from the signing message corresponding to the first electronic contract;
step S412, determining whether the identification information of the first user obtained from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user obtained from the signing message corresponding to the first electronic contract, and if not, determining that the first electronic contract is not authentic.
Since the signing request is sent by the first user terminal, the signing request includes the identification information of the first user terminal, the signing message is sent by the second terminal, and the signing message also includes the identification information of the first user terminal, it can be determined whether the first electronic contract is authentic by determining whether the identification information of the first user terminal acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user terminal acquired from the signing message corresponding to the first electronic contract, wherein the signing request and the signing message are respectively stored on the nodes of the block chain, the possibility of being tampered is reduced, and thus the verification result can be guaranteed to be authentic.
As shown in fig. 5, in the steps of the method for verifying the authenticity of the electronic contract, as an alternative implementation, the step S4, specifically, returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract, may include:
step S421, obtaining the identification information of the second user from the signing request corresponding to the first electronic contract, and obtaining the identification information of the second user from the signing message corresponding to the first electronic contract;
step S422, determining whether the identification information of the second user obtained from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user obtained from the signing message corresponding to the first electronic contract, if so, determining that the first electronic contract is authentic, otherwise, determining that the first electronic contract is not authentic.
Since the signing request is sent by the first user terminal, the signing request comprises the identification information of the second user terminal, the signing message is sent by the second terminal, and the signing message also comprises the identification information of the second user terminal, whether the first electronic contract is authentic can be judged by judging whether the identification information of the second user terminal acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user terminal acquired from the signing message corresponding to the first electronic contract, wherein the signing request and the signing message are respectively stored on the nodes of the block chain, the possibility of being tampered is reduced, and the verification result can be ensured to be credible.
As shown in fig. 6, in the steps of the method for verifying the authenticity of the electronic contract, as a preferred implementation, the step S4, specifically, the step S may include that the step S4 returns a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract, and includes:
step S431, obtaining the identification information of the first user and the identification information of the second user from the signing request corresponding to the first electronic contract;
step S432, obtaining the identification information of the first user and the identification information of the second user from the signed message corresponding to the first electronic contract;
step S433 of determining whether the identification information of the first user obtained from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user obtained from the signing message corresponding to the first electronic contract, and if not, determining that the first electronic contract is not authentic;
step S434, otherwise, determining whether the identification information of the second user end obtained from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user end obtained from the signing message corresponding to the first electronic contract, if so, determining that the first electronic contract is true, otherwise, determining that the first electronic contract is not true.
On the basis of judging whether the identification information of the first user side acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user side acquired from the signing message corresponding to the first electronic contract, whether the identification information of the second user side acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user side acquired from the signing message corresponding to the first electronic contract is also judged, so that the authenticity of the first electronic contract is subjected to double verification, the difficulty of tampering the verification result is increased, and the reliability of the verification result is ensured.
As shown in fig. 7, in the step of the method for verifying the authenticity of the electronic contract, the step S5, specifically, the step of determining whether the first electronic contract is authentic finally by the request end based on the verification result returned by each node, includes:
step S51, obtaining the number of nodes with returned verification results as the first electronic contract is true;
step S52, determining whether the number of nodes returning a verification result that the first electronic contract is true exceeds a preset value, where the preset value is determined by the number of nodes in the block chain;
and step S53, if the preset value is exceeded, the first electronic contract is finally determined to be true, otherwise, the first electronic contract is finally determined to be not true.
The authenticity of the first electronic contract is verified through each node of the block chain, whether the first electronic contract is authentic or not is finally determined according to whether the number of the nodes with the returned verification results that the first electronic contract is authentic exceeds a preset value or not, and the authenticity verification result of the first electronic contract is extremely low in possibility of being tampered because the number of the nodes exceeding the preset value is attacked or the bribery cost is extremely high, so that the reliability of the verification result can be ensured.
It should be understood that, the sequence numbers of the steps in the above embodiments do not mean the execution sequence, and the execution sequence of each process should be determined by the function and the inherent logic thereof, and should not constitute any limitation to the implementation process of the present specification.
Fig. 8 shows an authenticity verification apparatus of an electronic contract provided in an embodiment of the present specification. As shown in fig. 8, the apparatus may include:
a signing request module M1, configured to send, by a first user end, a first electronic contract, a first signature, and a signing request for signing the first electronic contract to a second user end, and the first user end issues the signing request to each node of a blockchain, where each node of the blockchain includes multiple nodes including the first user end and the second user end, and the signing request includes identification information of the first user end and/or identification information of the second user end.
A validity verifying module M2, configured to verify, by the second user end, whether the first signature is valid.
A signing message module M3, configured to sign the first electronic contract and send the signed first electronic contract to the first user if the first signature is legal, and meanwhile, the second user issues a signing message for signing the first electronic contract to the block chain, where the signing message includes identification information of the first user and/or identification information of the second user.
And the authenticity verification module M4 is configured to receive, by each node of the blockchain, a request for verifying the authenticity of the first electronic contract sent by a request end, acquire a signing request and a signing message corresponding to the first electronic contract, and return a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract. The request end may be any node of the block chain.
An authenticity determination module M5, configured to determine, based on the verification results returned by the respective nodes, whether the first electronic contract is authentic at the end of the request.
As shown in fig. 9, in other embodiments, the apparatus for verifying authenticity of the electronic contract may further include:
a public key issuing module M6, configured to issue, by a first user, a first public key to each node of the block chain, where the first public key may be used to encrypt the first electronic contract to obtain the first signature, the first signature is obtained by encrypting an information digest of the first electronic contract using the first private key, and the information digest of the first electronic contract is obtained by performing hash calculation on the first electronic contract;
as shown in fig. 10, in the above-mentioned authenticity verifying apparatus for the electronic contract, the validity verifying module M2 may include:
a public key obtaining unit M21, configured to obtain, by the second user end, the first public key from the blockchain;
a signature decryption unit M22, configured to decrypt the first signature by using the first public key by the second user side, and if the decryption is unsuccessful, determine that the first signature is illegal;
and the hash value comparison unit M23 is used for performing hash calculation on the first electronic contract if the decryption is successful, comparing the calculated hash value with the information digest obtained by decrypting the first signature, judging whether the calculated hash value and the information digest are consistent, judging whether the first signature is legal if the calculated hash value and the information digest are consistent, and judging that the first signature is illegal if the calculated hash value and the information digest are not consistent.
As shown in fig. 11, in the above-mentioned authenticity verification apparatus for an electronic contract, the authenticity verification module M4 may include:
a first identifier obtaining unit M411, configured to obtain the identifier information of the first user from the signing request corresponding to the first electronic contract, and obtain the identifier information of the first user from the signing message corresponding to the first electronic contract;
a first identifier determining unit M412, configured to determine whether the identifier information of the first user obtained from the signing request corresponding to the first electronic contract is consistent with the identifier information of the first user obtained from the signing message corresponding to the first electronic contract, and if not, determine that the first electronic contract is not authentic.
As shown in fig. 12, in the above-mentioned authenticity verification apparatus for electronic contracts, as an alternative embodiment, the authenticity verification module M4 may include:
a second identifier obtaining unit M421, configured to obtain the identifier information of the second user from the signing request corresponding to the first electronic contract, and obtain the identifier information of the second user from the signing message corresponding to the first electronic contract;
a second identifier determining unit M422, configured to determine whether the identifier information of the second user obtained from the signing request corresponding to the first electronic contract is consistent with the identifier information of the second user obtained from the signing message corresponding to the first electronic contract, if so, determine that the first electronic contract is true, otherwise, determine that the first electronic contract is not true.
As shown in fig. 12, in the above-mentioned authenticity verifying apparatus for electronic contract, as a preferred embodiment, the authenticity verifying module M4 may include:
a third identifier obtaining unit M431, configured to obtain, from the signing request corresponding to the first electronic contract, the identifier information of the first user side and the identifier information of the second user side;
a fourth identifier obtaining unit M432, configured to obtain, from the signed message corresponding to the first electronic contract, the identifier information of the first user and the identifier information of the second user;
a third identifier determining unit M433, configured to determine whether the identifier information of the first user obtained from the signing request corresponding to the first electronic contract is consistent with the identifier information of the first user obtained from the signing message corresponding to the first electronic contract, and if not, determine that the first electronic contract is not authentic;
a fourth identifier determining unit M434, configured to determine, if the identifier information of the second user end obtained from the signing request corresponding to the first electronic contract is not consistent with the identifier information of the second user end obtained from the signing message corresponding to the first electronic contract, if so, determine that the first electronic contract is true, and otherwise, determine that the first electronic contract is not true.
As shown in fig. 14, in the above-mentioned authenticity verification apparatus for an electronic contract, the authenticity determination module M5 may include:
a number obtaining unit M51, configured to obtain the number of nodes that return verification results that are true for the first electronic contract;
a quantity judgment unit M52, configured to judge whether the quantity of the nodes returning the verification result that the first electronic contract is true exceeds a preset value, where the preset value is determined by the quantity of the nodes in the block chain;
a trueness determining unit M53, configured to finally determine that the first electronic contract is trueness if the preset value is exceeded, and otherwise, finally determine that the first electronic contract is not trueness.
It should be noted that the functional implementation of each module in the authenticity verification apparatus for an electronic contract corresponds to each step in the embodiment of the authenticity verification method for an electronic contract, and the functions and implementation processes thereof are not described in detail herein.
Referring to fig. 15, an embodiment of the present specification provides an electronic device 3, and the electronic device 3 includes at least one storage unit 31, at least one processing unit 32, and a bus 33 connecting different platform systems.
The storage unit 31 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)311 and/or a cache memory unit 312, and may further include a read only memory unit (ROM) 313.
Wherein the storage unit 31 further stores a program product 4, the program product 4 is executable by the processing unit 32, so that the processing unit 32 performs the steps of the method for verifying authenticity of an electronic contract according to the above-described embodiment (as shown in fig. 1-7). The storage unit 31 may also include a program/utility 314 having a set (at least one) of program modules 315, including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Accordingly, the processing unit 32 may execute the program product 4 described above, and may execute the program/utility 314.
Bus 33 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 3 may also communicate with one or more external devices 34, such as a keyboard, pointing device, bluetooth device, etc., and may also communicate with one or more devices capable of interacting with the electronic device 3, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 3 to communicate with one or more other computing devices. Such communication may be through input/output (I/O) interfaces 35. Also, the electronic device 3 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 36. The network adapter 36 may communicate with other modules of the electronic device 3 via the bus 33. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 3, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage platforms, to name a few.
The present specification also provides a computer-readable storage medium for storing a computer program which, when executed, implements the steps of the method for verifying authenticity of an electronic contract (as shown in fig. 1-7) in the above-described embodiments.
Fig. 16 shows a program product 4 provided by an embodiment of the present specification for implementing the above method, which can employ a portable compact disc read only memory (CD-ROM) and include program code, and can be run on a user-side device, such as a personal computer. However, the program product 4 of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. Program product 4 may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The above description and drawings are only preferred embodiments of the present specification and are not intended to limit the present specification, so that all the similar or equivalent structures, devices, features and the like to those of the present specification, i.e., all the equivalent substitutions or modifications made in the scope of the present specification, shall fall within the scope of the present specification.

Claims (10)

1. A method for verifying authenticity of an electronic contract, the method comprising:
a first user terminal sends a first electronic contract, a first signature and a signing request for signing the first electronic contract to a second user terminal, and the first user terminal issues the signing request to each node of a block chain, wherein each node of the block chain comprises a plurality of nodes including the first user terminal and the second user terminal, and the signing request comprises identification information of the first user terminal and/or identification information of the second user terminal;
the second user end verifies whether the first signature is legal or not;
if the first signature is legal, the second user terminal signs the first electronic contract and sends the signed first electronic contract to the first user terminal, and meanwhile, the second user terminal issues a signing message for signing the first electronic contract to the block chain, wherein the signing message comprises identification information of the first user terminal and/or identification information of the second user terminal;
each node of the block chain receives a request for verifying the authenticity of the first electronic contract sent by a request end, acquires a signing request and a signing message corresponding to the first electronic contract, and returns a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract;
and finally determining whether the first electronic contract is authentic or not by the request end based on the verification result returned by each node.
2. The method of verifying authenticity of an electronic contract according to claim 1, characterized in that it further comprises:
the first user terminal issues a first public key to each node of the block chain, wherein the first signature can be obtained by encrypting the first electronic contract with a first private key corresponding to the first public key, the first signature is obtained by encrypting an information digest of the first electronic contract with the first private key, and the information digest of the first electronic contract is obtained by performing hash calculation on the first electronic contract.
3. The method for verifying the authenticity of an electronic contract according to claim 2, wherein the second user verifying whether the first signature is legitimate comprises:
the second user terminal obtains the first public key from the block chain;
the second user terminal decrypts the first signature by using the first public key, and if the decryption is unsuccessful, the first signature is judged to be illegal;
and if the decryption is successful, performing hash calculation on the first electronic contract, comparing the calculated hash value with the information digest obtained by decrypting the first signature, judging whether the calculated hash value is consistent with the information digest obtained by decrypting the first signature, if so, judging that the first signature is legal, and otherwise, judging that the first signature is illegal.
4. The method for verifying the authenticity of an electronic contract according to claim 3, wherein the step of returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract comprises:
acquiring the identification information of the first user side from the signing request corresponding to the first electronic contract, and acquiring the identification information of the first user side from the signing message corresponding to the first electronic contract;
and judging whether the identification information of the first user side, which is acquired from the signing request corresponding to the first electronic contract, is consistent with the identification information of the first user side, which is acquired from the signing message corresponding to the first electronic contract, if not, judging that the first electronic contract is not authentic.
5. The method for verifying the authenticity of an electronic contract according to claim 3, wherein the step of returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract comprises:
acquiring the identification information of the second user side from the signing request corresponding to the first electronic contract, and acquiring the identification information of the second user side from the signing message corresponding to the first electronic contract;
and judging whether the identification information of the second user side, which is acquired from the signing request corresponding to the first electronic contract, is consistent with the identification information of the second user side, which is acquired from the signing message corresponding to the first electronic contract, if so, judging that the first electronic contract is true, otherwise, judging that the first electronic contract is not true.
6. The method for verifying the authenticity of an electronic contract according to claim 3, wherein the step of returning a verification result after verifying the authenticity of the first electronic contract according to the signing request and the signing message corresponding to the first electronic contract comprises:
obtaining the identification information of the first user end and the identification information of the second user end from the signing request corresponding to the first electronic contract, and
acquiring the identification information of the first user end and the identification information of the second user end from the signing message corresponding to the first electronic contract;
judging whether the identification information of the first user end acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the first user end acquired from the signing message corresponding to the first electronic contract, and if not, judging that the first electronic contract is not authentic;
otherwise, judging whether the identification information of the second user end acquired from the signing request corresponding to the first electronic contract is consistent with the identification information of the second user end acquired from the signing message corresponding to the first electronic contract, if so, judging that the first electronic contract is true, otherwise, judging that the first electronic contract is not true.
7. The method for verifying the authenticity of an electronic contract according to any of the claims 4-6, wherein said requesting end finally determines whether said first electronic contract is authentic based on the verification results returned by said respective nodes, comprising:
obtaining the number of nodes with returned verification results as the first electronic contract is true;
judging whether the number of the nodes with the returned verification result that the first electronic contract is real exceeds a preset value or not, wherein the preset value is determined by the number of the nodes in the block chain;
and finally determining that the first electronic contract is authentic if the preset value is exceeded, or else, finally determining that the first electronic contract is not authentic.
8. The method for verifying authenticity of an electronic contract according to claim 7, wherein said requesting end is any node of said block chain.
9. An electronic device comprising a processor and a memory configured to store executable instructions of the processor, characterized in that the processor is configured to perform the steps in a method of authenticity verification of an electronic contract according to any of claims 1-8 via execution of the executable instructions.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed, implements the steps in a method of verifying the authenticity of an electronic contract according to any of claims 1-8.
CN202011325548.5A 2020-11-23 2020-11-23 Method for verifying authenticity of electronic contract, electronic device and storage medium Pending CN112270556A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011325548.5A CN112270556A (en) 2020-11-23 2020-11-23 Method for verifying authenticity of electronic contract, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011325548.5A CN112270556A (en) 2020-11-23 2020-11-23 Method for verifying authenticity of electronic contract, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN112270556A true CN112270556A (en) 2021-01-26

Family

ID=74339869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011325548.5A Pending CN112270556A (en) 2020-11-23 2020-11-23 Method for verifying authenticity of electronic contract, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN112270556A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015079004A1 (en) * 2013-11-29 2015-06-04 Koninklijke Philips N.V. Method and apparatus for supporting verification of a contract
CN109936457A (en) * 2019-02-20 2019-06-25 深圳前海微众银行股份有限公司 Block chain witnesses method, apparatus, equipment and computer readable storage medium in many ways
CN110113334A (en) * 2019-05-05 2019-08-09 江苏全链通信息科技有限公司 Contract processing method, equipment and storage medium based on block chain
CN110287732A (en) * 2019-05-15 2019-09-27 杭州趣链科技有限公司 One kind depositing card method based on block chain electronic contract
CN110879809A (en) * 2019-11-12 2020-03-13 北京芯际科技有限公司 Judicial data evidence storage method based on block chain
CN111224788A (en) * 2020-04-21 2020-06-02 国网区块链科技(北京)有限公司 Electronic contract management method, device and system based on block chain
CN111311172A (en) * 2019-12-12 2020-06-19 曾广君 Electronic signing method, system and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015079004A1 (en) * 2013-11-29 2015-06-04 Koninklijke Philips N.V. Method and apparatus for supporting verification of a contract
CN109936457A (en) * 2019-02-20 2019-06-25 深圳前海微众银行股份有限公司 Block chain witnesses method, apparatus, equipment and computer readable storage medium in many ways
CN110113334A (en) * 2019-05-05 2019-08-09 江苏全链通信息科技有限公司 Contract processing method, equipment and storage medium based on block chain
CN110287732A (en) * 2019-05-15 2019-09-27 杭州趣链科技有限公司 One kind depositing card method based on block chain electronic contract
CN110879809A (en) * 2019-11-12 2020-03-13 北京芯际科技有限公司 Judicial data evidence storage method based on block chain
CN111311172A (en) * 2019-12-12 2020-06-19 曾广君 Electronic signing method, system and storage medium
CN111224788A (en) * 2020-04-21 2020-06-02 国网区块链科技(北京)有限公司 Electronic contract management method, device and system based on block chain

Similar Documents

Publication Publication Date Title
US11520912B2 (en) Methods, media, apparatuses and computing devices of user data authorization based on blockchain
CN110336774B (en) Mixed encryption and decryption method, equipment and system
CN110061846B (en) Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
US11258792B2 (en) Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN101019369B (en) Method of delivering direct proof private keys to devices using an on-line service
CN105427099A (en) Network authentication method for secure electronic transactions
CN101527633A (en) System and method for intelligent key devices to obtain digital certificates
CN109981287B (en) Code signing method and storage medium thereof
CN106936588B (en) Hosting method, device and system of hardware control lock
CN110084600B (en) Processing and verifying method, device, equipment and medium for resolution transaction request
CN111931158A (en) Bidirectional authentication method, terminal and server
KR20150059347A (en) Mobile terminal, terminal and method for authentication using security cookie
CN101527634A (en) System and method for binding account information with certificates
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN114448605A (en) Encrypted ciphertext verification method, system, equipment and computer readable storage medium
CN111200593A (en) Application login method and device and electronic equipment
CN112733180A (en) Data query method and device and electronic equipment
CN115134090A (en) Identity authentication method and device based on privacy protection, computer equipment and medium
CN112308236A (en) Method, device, electronic equipment and storage medium for processing user request
CN116633582A (en) Secure communication method, apparatus, electronic device and storage medium
CN112270556A (en) Method for verifying authenticity of electronic contract, electronic device and storage medium
CN114584347A (en) Verification short message receiving and sending method, server, terminal and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination