CN115392913B - Electronic contract generating method based on user identity recognition and storage medium - Google Patents

Electronic contract generating method based on user identity recognition and storage medium Download PDF

Info

Publication number
CN115392913B
CN115392913B CN202211326725.0A CN202211326725A CN115392913B CN 115392913 B CN115392913 B CN 115392913B CN 202211326725 A CN202211326725 A CN 202211326725A CN 115392913 B CN115392913 B CN 115392913B
Authority
CN
China
Prior art keywords
key information
user
contract
verification
importance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211326725.0A
Other languages
Chinese (zh)
Other versions
CN115392913A (en
Inventor
毛秀允
华允慧
韩杰
宋明君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qiandai Digital Technology Co ltd
Original Assignee
Hangzhou Qiandai Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qiandai Digital Technology Co ltd filed Critical Hangzhou Qiandai Digital Technology Co ltd
Priority to CN202211326725.0A priority Critical patent/CN115392913B/en
Publication of CN115392913A publication Critical patent/CN115392913A/en
Application granted granted Critical
Publication of CN115392913B publication Critical patent/CN115392913B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides an electronic contract generating method based on user identity recognition and a storage medium, belonging to the field of electronic contracts and specifically comprising the following steps: the identity authentication terminal carries out identity identification on the user to obtain the identity of the user, and automatically associates the contract to obtain an associated contract and automatically fills the contract; identifying to obtain key information of the associated contract based on the identification of the type of the associated contract, and constructing the importance of the obtained key information; based on the difference of the importance of the key information and the difference of the word number of the key information, different verification modes and verification time are adopted, when the importance of the key information is larger than a first importance threshold value, the identity of the user is verified again to obtain a verification result, when the verification result is accurate, the key information is verified through a voice recognition result or a handwriting recognition result of the user, and the electronic contract is automatically generated after the verification is completed, so that the efficiency and the accuracy of the electronic contract generation are further improved.

Description

Electronic contract generating method based on user identity recognition and storage medium
Technical Field
The invention belongs to the technical field of electronic contracts, and particularly relates to an electronic contract generation method and a storage medium based on user identity recognition.
Background
With the development of electronic technology, electronic contracts appear with the characteristics of convenient transmission, saving and the like, the electronic contracts are used as agreements for establishing, changing and terminating property civil right obligation relations between two parties or multiple parties in an electronic form through an electronic information network, have the same legal benefits as paper contracts in the legal level, but have the difference from paper contracts in that the risk of signing the electronic contracts is larger than that of common paper contracts due to the problems of limited identity verification, limited reading and the like.
In order to ensure that an endorser fully understands and affirms the terms of an electronic contract, in an authorized invention patent publication No. CN107707970B, an electronic contract endorsement method, a system and a terminal, after a camera of an equipment terminal is started and enters a video recording interface to start video recording, contract key information extracted from an electronic contract text is displayed on the video recording interface, and a user correctly completes confirmation operation according to prompt information, then the recorded video information is stored, electronic signature data is obtained, whether an effective contract text is generated or not is judged according to the electronic signature data, so that the video information is used as an original proof evidence kept in the financial product transaction process, the safety and reliability of the financial transaction process are improved, the user experience is improved, but the technical problem exists:
1. different verification means are not adopted according to different importance of key information of the contract, the importance of important appointments such as digital appointments in the contract is obviously higher than that of conventional appointed terms, and for the digital appointments, if the identity of the user cannot be confirmed again and the user definitely confirms the appointments at the moment in a voice mode or a handwriting digital mode and the like on the basis, the risk problem in the contract signing process caused by the fact that the user is not familiar with or clear of the terms can be caused, and the reliability and the safety of transactions are greatly influenced.
2. The identity of the user is not verified, when the identity of the user is in doubt, the next contract generation and confirmation work is not needed, meanwhile, the electronic contract is not automatically generated based on the identity of the user, and the content required to be signed by the user in the electronic contract is automatically generated, so that the signing efficiency of the electronic contract is influenced to a certain extent.
3. The importance of different contract key information is not evaluated according to the specific type of the electronic contract, so that the difference setting of the verification mode and the verification time cannot be carried out according to the importance of the contract key information, the understanding of contract terms can be more accurately realized by a user on the basis of ensuring the verification efficiency, and meanwhile, the risk of default in the later stage is also reduced.
Based on the above technical problem, it is necessary to design an electronic contract generating method and a storage medium based on user identification.
Disclosure of Invention
The invention aims to provide an electronic contract generating method based on user identity recognition and a storage medium.
In order to solve the above technical problem, a first aspect of the present invention provides an electronic contract generating method based on user identification, including:
s11, carrying out identity identification on a user based on an identity authentication terminal to obtain the identity of the user, automatically associating a contract according to the identity of the user to obtain an associated contract, and automatically filling according to the identity of the user by identifying the type of the associated contract;
s12, identifying and obtaining key information of the association contract based on the identification of the type of the association contract, and constructing and obtaining the importance of the key information according to the key of the key information in the association contract, the key of the key information to the user, the word number of the key information and whether the key information contains specific numbers;
s13, based on the difference of the importance of the key information and the difference of the word number of the key information, different verification modes and verification time are adopted, when the importance of the key information is larger than a first importance threshold value, the user is verified again to obtain a verification result, when the verification result is accurate, the key information is verified through a voice recognition result or a handwriting recognition result of the user, and after the verification result of the key information is completed, an electronic contract is automatically generated.
The identification of the user identity is firstly realized, the generation of the associated contract is automatically carried out on the basis, and the filling is automatically carried out, so that the efficiency of contract generation is further improved, and the problem of errors possibly caused by the filling of the user is also avoided.
The importance of the key information is constructed and obtained based on the key of the key information in the associated contract, the key of the key information to the user, the word number of the key information and whether the key information contains specific numbers, so that the identification of the importance of the key information is realized, the key information and the contract are considered, and the identification is combined with the benefits of the user, so that the construction result of the importance is more accurate, and a foundation is laid for a differential verification mode and verification time according to the importance.
Different verification modes and verification time are adopted according to different importance of the key information and different word numbers of the key information, so that the verification modes and the verification time of the key information can be inclined to the key information with higher importance, the understanding and the control of a user on a contract are further improved, and unnecessary disputes and risks are avoided.
Through the setting of the first importance threshold value, the key information with higher importance can be definitely confirmed by the user, so that the user can more accurately understand contract content and self obligations, and meanwhile, the later disputes and risk problems are avoided.
The further technical scheme is that the identity authentication terminal realizes the identification of the identity of the user by adopting a mode based on face identification or fingerprint identification or account number authentication.
The further technical scheme is that the automatic filling method comprises the following specific steps:
s21, determining the basic information of the user based on the identification result;
s22, identifying the type of the associated contract, and determining the content to be filled in the associated contract according to the content to be filled in the set associated contract of the same type;
and S23, automatically filling the content to be filled based on the basic information of the user.
The further technical scheme is that the type of the associated contract is identified based on the identification of the keywords of the type of the associated contract, the type of the associated contract is obtained through the identification of the type of the associated contract, and the key information of the associated contract is determined based on the set key information position and content of the contract of the same type according to the type of the associated contract.
The further technical scheme is that the calculation formula of the importance is as follows:
Figure 44774DEST_PATH_IMAGE001
of which N, H 1 、H 2 Respectively the word number of the key information, the key of the key information in the association contract and the key of the key information to the user, wherein H 1 、H 2 All determined by means of expert scoring, J represents whether the key information contains specific numbers, and is 1 when the specific numbers exist and is 0,K when the specific numbers do not exist 1 、K 2 、K 3 、K 4 、K 5 Is a constant.
The further technical scheme is that the specific steps for determining the verification mode and the verification time of the key information comprise:
s31, extracting the importance of the key information, determining whether the importance of the key information is greater than a second importance threshold value, if so, entering a step S32, otherwise, verifying the key information by adopting a single verification mode, and determining verification time required by the key information by adopting a set word number according to the word number of the key information;
s32, the verification of the key information is realized by adopting at least more than two verification modes, and the single time is corrected according to the importance of the key information to obtain corrected single characters, wherein the corrected single characters are larger than the single characters.
S33, based on the time for correcting the single character and the word number of the key information, the verification time needed by the key information is determined.
Through the setting of the second importance threshold, more verification time and a tighter verification mode are adopted for more important key information, and the user can be ensured to master the key information more accurately, so that the risk is further reduced.
The further technical scheme is that the calculation formula for correcting the single characters is as follows:
Figure 999172DEST_PATH_IMAGE002
wherein K 6 、K 7 、K 8 Is constant, G, T 1 The importance of key information and the time of single characters.
The further technical scheme is that the second importance threshold is smaller than the first importance threshold, and the first importance threshold and the second importance threshold are determined according to the type of the associated contract and the age of the user, wherein the more important the type of the associated contract is, the greater the age of the user is, the smaller the first importance threshold and the second importance threshold at the moment are.
The further technical scheme is that when the verification result is accurate, the specific steps for verifying the key information are as follows:
s41, determining the age of the user based on the authentication result of the user;
s42, judging whether the age of the user is greater than a first age threshold, if so, entering a step S43, otherwise, randomly generating a verification requirement and generating a verification result, wherein the verification requirement comprises a verification result which requires the user to read the key information to obtain a voice form or a verification result which requires the user to write the key information to obtain a character form, and verifying the key information according to an analysis result of the verification result;
s43, requiring the user to adopt any one of the verification requirements to verify the key information.
Different verification requirements are selected based on different ages of the users, so that the experience of the older users is improved on the basis of ensuring higher verification accuracy, and the verification of the key information can be realized in an easier mode.
In another aspect, a computer-readable storage medium having a computer program stored thereon is provided, wherein the computer program is configured to implement the electronic contract generating method based on user identification.
Additional features and advantages will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
Fig. 1 is a flowchart of an electronic contract generation method based on user identification according to embodiment 1;
fig. 2 is a block diagram of a computer-readable storage medium in embodiment 2.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar structures, and thus their detailed description will be omitted.
The terms "a," "an," "the," "said" are used to indicate the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. other than the listed elements/components/etc.
Example 1
To solve the above problem, according to an aspect of the present invention, as shown in fig. 1, there is provided an electronic contract generating method based on user identification, including:
s11, carrying out identity identification on a user based on an identity verification terminal to obtain the identity of the user, automatically carrying out contract association according to the identity of the user to obtain an associated contract, and automatically filling according to the identity of the user by identifying the type of the associated contract;
specifically, the user identity includes the user's gender, name, identification card number, and home address information, and the associated contract can be obtained from the system by analyzing the user's name and identification card number, and the user identity is automatically filled according to the type of the associated contract, the set position and content to be filled in.
For example, the authentication terminal may adopt any one of authentication methods based on shared key authentication, biometric feature authentication, and public key encryption algorithm authentication, or a combination of multiple authentication methods.
For example, the authentication based on the shared key means that the server and the user have one or a group of passwords together. When the user needs to perform authentication, the user submits the password commonly owned by the user and the server through inputting or through the device in which the password is kept. After receiving the password submitted by the user, the server checks whether the password submitted by the user is consistent with the password stored by the server side, and if so, the user is judged to be a legal user. And if the password submitted by the user is inconsistent with the password stored by the server, judging that the authentication fails.
Specifically, for example, the authentication based on biological characteristics refers to authentication based on characteristics unique to each person, such as fingerprints, irises, faces, and the like.
S12, identifying and obtaining key information of the association contract based on the identification of the type of the association contract, and constructing and obtaining the importance of the key information according to the key of the key information in the association contract, the key of the key information to the user, the word number of the key information and whether the key information contains specific numbers;
for example, if the type of the associated contract is a loan contract, the key information of the associated contract may be determined to be related agreed terms of loan term, interest rate, repayment period, and repayment mode according to the identified type of the associated contract, and the identification of importance may be implemented by constructing an empirical formula or using an importance prediction model based on the set key information about the criticality of the associated contract, the criticality of the key information to the user, the word count of the key information, and whether the key information includes specific numbers.
For example, if the criticality of the key information in the association contract is 0.7, the criticality of the key information to the user is 1, the word number of the key information is 20 words, and the key information includes specific numbers, the importance at this time is (0.7 +1+ 20/(20 + 1) 2 +1)/4=0.68625。
S13, different verification modes and verification time are adopted based on different importance of the key information and different word numbers of the key information, when the importance of the key information is larger than a first importance threshold value, the user is verified again to obtain a verification result, when the verification result is accurate, the key information is verified through a voice recognition result or a handwriting recognition result of the user, and after the verification result of the key information is completed, an electronic contract is automatically generated.
For example, the more important the key information is, the more complicated and complete the verification method is, and the more important the key information is, the more the number of words of the key information is, the longer the verification time is required. If the importance of the key information is 0.68 and the first importance threshold is 0.5, the user needs to perform authentication again to confirm the identity of the user, and when the authentication result is accurate, namely the same person, the key information is authenticated through a voice recognition result generated by reading the key information or a handwritten key information font recognition result.
The method and the device realize the generation of the electronic contract and the automatic filling of the content on the basis of the identification of the user identity, thereby solving the technical problem of low efficiency caused by the prior identification of the user identity. On the basis, the identification of the key information of the associated contract can be realized by identifying the type of the associated contract, and on the basis, the importance of the key information is obtained by constructing an empirical formula or an importance prediction model on the basis of the set key information on the key of the associated contract, the key of the key information to the user, the word number of the key information and whether the key information contains specific numbers, so that the technical problem that the key information cannot be distinguished due to the fact that the key information is not distinguished in the prior art is solved, and the accuracy of the verification is further improved on the basis of ensuring the verification efficiency. According to the different importance and the different word numbers, different verification modes are adopted, the verification efficiency and accuracy are improved, the user identity is verified again through the setting of the first importance threshold value when the importance of the key information is larger than the first importance threshold value, on the basis, the verification of the key information is achieved through a voice or handwriting mode, the information with higher importance can be mastered by the user more accurately, and the occurrence of late disputes and default risks is reduced.
The identification of the user identity is firstly realized, the generation of the associated contract is automatically carried out on the basis, and the filling is automatically carried out, so that the efficiency of contract generation is further improved, and the problem of errors possibly caused by the filling of the user is also avoided.
The importance of the key information is constructed and obtained based on the key of the key information in the associated contract, the key of the key information to the user, the word number of the key information and whether the key information contains specific numbers, so that the identification of the importance of the key information is realized, the key information and the contract are considered, and the identification is combined with the benefits of the user, so that the construction result of the importance is more accurate, and a foundation is laid for a differential verification mode and verification time according to the importance.
Different verification modes and verification time are adopted according to different importance of the key information and different word numbers of the key information, so that the verification modes and the verification time of the key information can be inclined to the key information with higher importance, the understanding and the control of a user on a contract are further improved, and unnecessary disputes and risks are avoided.
Through the setting of the first importance threshold value, the key information with higher importance can be definitely confirmed by the user, so that the user can more accurately understand contract content and self obligations, and meanwhile, the later disputes and risk problems are avoided.
In another possible embodiment, the identity verification terminal identifies the identity of the user by adopting a mode based on face recognition, fingerprint recognition or account verification.
In another possible embodiment, the automatic filling includes the following specific steps:
s21, determining the basic information of the user based on the identification result;
specifically, the user identity includes the user's sex, name, identification number, home address information, and may further include credit-related information such as historical default records and work units.
S22, identifying the type of the associated contract, and determining the content to be filled in the associated contract according to the content to be filled in the set associated contracts of the same type;
specifically, for example, if the type of the associated contract is a loan contract, the information to be filled in at this time is the identification number, the sex, the home address information, the name, and the work unit, and the information is automatically filled in the associated contract according to the identification result.
And S23, automatically filling the content to be filled based on the basic information of the user.
In another possible embodiment, the identification of the type of the associated contract is realized to obtain the type of the associated contract based on the identification of the keyword of the type of the associated contract, and the key information of the associated contract is determined based on the set key information position and content of the contract of the same type according to the type of the associated contract.
Specifically, for example, if the key of the type of the associated contract is personal loan, and the type of the associated contract at this time belongs to the personal loan contract, the location of the key information of the associated contract can be determined according to the position and the content of the key information in the set personal loan contract.
In another possible embodiment, the formula for calculating the importance is:
Figure 407020DEST_PATH_IMAGE003
of which N, H 1 、H 2 Respectively the word number of the key information, the key of the key information in the association contract and the key of the key information to the user, wherein H 1 、H 2 All determined by an expert scoring mode, wherein J represents whether the key information contains a specific number, and is 1 when the specific number exists and is 0,K when the specific number does not exist 1 、K 2 、K 3 、K 4 、K 5 Is a constant.
In another possible embodiment, the specific steps of determining the verification mode and the verification time of the key information include:
s31, extracting the importance of the key information, determining whether the importance of the key information is greater than a second importance threshold value, if so, entering a step S32, otherwise, verifying the key information by adopting a single verification mode, and determining verification time required by the key information by adopting set word number according to the word number of the key information;
specifically, for example, if the importance of the key information is 0.65 and the second importance threshold is 0.5, then step S32 is performed;
for example, if the importance of the key information is 0.4 and the second importance threshold is 0.5, the verification of the key information is implemented by using a fingerprint or a human face or other methods, and meanwhile, the number of the words of the key information is 20, and the time for using a single word is 1s, the verification time required by the key information is 20s.
S32, the verification of the key information is realized by adopting at least more than two verification modes, and the single time is corrected according to the importance of the key information to obtain corrected single characters, wherein the corrected single characters are larger than the single characters.
S33, based on the time for correcting the single character and the word number of the key information, the verification time needed by the key information is determined.
Through the setting of the second importance threshold, more verification time and a tighter verification mode are adopted for more important key information, and the user can be ensured to master the key information more accurately, so that the risk is further reduced.
In another possible embodiment, the calculation formula for correcting the single character is as follows:
Figure 963903DEST_PATH_IMAGE004
wherein K 6 、K 7 、K 8 Is constant, G, T 1 The importance of key information and the time of single characters.
In another possible embodiment, the second importance threshold is smaller than the first importance threshold, and the first importance threshold and the second importance threshold are determined according to the type of the associated contract and the age of the user, wherein the more important the type of the associated contract is and the age of the user is, the smaller the first importance threshold and the second importance threshold are.
In another possible embodiment, when the verification result is accurate, the specific step of verifying the key information is:
s41, determining the age of the user based on the authentication result of the user;
s42, judging whether the age of the user is greater than a first age threshold, if so, entering a step S43, otherwise, randomly generating a verification requirement and generating a verification result, wherein the verification requirement comprises a verification result which requires the user to read the key information to obtain a voice form or a verification result which requires the user to write the key information to obtain a character form, and verifying the key information according to an analysis result of the verification result;
specifically, for example, the first age threshold is set to be 50 years old, when the age of the user is less than or equal to 50 years old, the authentication requirement is randomly generated and the authentication result is generated, and when the age of the user is greater than 50 years old, any one of the authentication requirements is used for authentication.
S43, requiring the user to adopt any one of the verification requirements to verify the key information.
Different verification requirements are selected based on different ages of the users, so that the experience of the older users is improved on the basis of ensuring higher verification accuracy, and the verification of the key information can be realized in an easier mode.
Example 2
As shown in fig. 2, the present invention provided in the embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, wherein the computer program is configured to implement the above-mentioned electronic contract generating method based on user identification when executed.
In the several embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other ways. The system embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.

Claims (7)

1. An electronic contract generating method based on user identity recognition is characterized by specifically comprising the following steps:
s11, carrying out identity identification on a user based on an identity authentication terminal to obtain the identity of the user, automatically associating a contract according to the identity of the user to obtain an associated contract, and automatically filling according to the identity of the user by identifying the type of the associated contract;
s12, identifying and obtaining key information of the association contract based on the identification of the type of the association contract, and constructing and obtaining the importance of the key information according to the criticality of the key information in the association contract, the criticality of the key information to the user, the word number of the key information and whether the key information contains specific numbers;
the formula for calculating the importance is:
Figure FDA0004021098630000011
of which N, H 1 、H 2 Are respectively as followsThe word number of the key information, the criticality of the key information in the association contract, the criticality of the key information to the user, wherein H 1 、H 2 All determined by means of expert scoring, J represents whether the key information contains specific numbers, and is 1 when the specific numbers exist and is 0,K when the specific numbers do not exist 1 、K 2 、K 3 、K 4 、K 5 Is a constant;
s13, based on the difference between the importance of the key information and the word number of the key information, adopting different verification modes and verification time, when the importance of the key information is greater than a first importance threshold value, verifying the identity of the user again to obtain a verification result, when the verification result is accurate, verifying the key information through a voice recognition result or a handwritten recognition result of the user, and automatically generating an electronic contract after the verification result of the key information is finished;
the specific steps of determining the verification mode and the verification time of the key information are as follows:
s31, extracting the importance of the key information, determining whether the importance of the key information is greater than a second importance threshold value, if so, entering a step S32, otherwise, verifying the key information by adopting a single verification mode, and determining verification time required by the key information by adopting set word number according to the word number of the key information;
s32, verifying the key information by adopting at least two verification modes, and correcting the single character use time according to the importance of the key information to obtain corrected single character use time, wherein the corrected single character use time is greater than the single character use time;
s33, based on the time for correcting the single character and the word number of the key information, the verification time needed by the key information is determined.
2. The electronic contract generation method according to claim 1, wherein the identity verification terminal recognizes the identity of the user by means of face recognition, fingerprint recognition or account verification.
3. The electronic contract generation method according to claim 1, wherein the specific steps of performing automatic filling are:
s21, determining the basic information of the user based on the identity recognition result;
s22, identifying the type of the associated contract, and determining the content to be filled in the associated contract according to the content to be filled in the set associated contracts of the same type;
and S23, automatically filling the content to be filled based on the basic information of the user.
4. The electronic contract generation method according to claim 3, wherein the identification of the type of the associated contract is achieved based on the identification of the keyword of the type of the associated contract to obtain the type of the associated contract, and the key information of the associated contract is determined based on the set key information position and content of the contract of the same type according to the type of the associated contract.
5. The electronic contract generating method according to claim 1, wherein the calculation formula for correcting the individual character is:
Figure FDA0004021098630000021
wherein K 6 、K 7 、K 8 Is constant, G, T 1 The importance of key information and the time of single characters.
6. The electronic contract generating method according to claim 1, wherein when the verification result is accurate, the specific step of performing verification of the key information is:
s41, determining the age of the user based on the authentication result of the user;
s42, judging whether the age of the user is greater than a first age threshold, if so, entering a step S43, otherwise, randomly generating a verification requirement and generating a verification result, wherein the verification requirement comprises a verification result which requires the user to read the key information to obtain a voice form or a verification result which requires the user to write the key information to obtain a character form, and verifying the key information according to an analysis result of the verification result;
s43, requiring the user to adopt any one of the verification requirements to verify the key information.
7. A computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed, implements the method for generating an electronic contract based on user identification according to any one of claims 1 to 6.
CN202211326725.0A 2022-10-27 2022-10-27 Electronic contract generating method based on user identity recognition and storage medium Active CN115392913B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211326725.0A CN115392913B (en) 2022-10-27 2022-10-27 Electronic contract generating method based on user identity recognition and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211326725.0A CN115392913B (en) 2022-10-27 2022-10-27 Electronic contract generating method based on user identity recognition and storage medium

Publications (2)

Publication Number Publication Date
CN115392913A CN115392913A (en) 2022-11-25
CN115392913B true CN115392913B (en) 2023-03-10

Family

ID=84129208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211326725.0A Active CN115392913B (en) 2022-10-27 2022-10-27 Electronic contract generating method based on user identity recognition and storage medium

Country Status (1)

Country Link
CN (1) CN115392913B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117252690B (en) * 2023-11-17 2024-02-23 杭州钱袋数字科技有限公司 Loan contract online signing method and system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103138921A (en) * 2011-11-22 2013-06-05 阿里巴巴集团控股有限公司 Method and system for verifying identity information
CN107707970A (en) * 2017-09-14 2018-02-16 深圳市佰仟金融服务有限公司 A kind of electronic contract signature method, system and terminal
JP6290459B1 (en) * 2016-08-31 2018-03-07 株式会社オプティム Contract management system, contract management method, and contract management program
KR20180024857A (en) * 2016-08-31 2018-03-08 한국정보인증주식회사 Server and method for providing electronic contracting service
CN108494559A (en) * 2018-03-12 2018-09-04 北京航空航天大学 A kind of electron contract method based on semi trusted third party
CN109460966A (en) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 Contract signing method, apparatus and terminal device based on requesting party's classification
CN109872233A (en) * 2019-01-17 2019-06-11 深圳壹账通智能科技有限公司 Contract signing method, apparatus, computer equipment and storage medium
CN110111206A (en) * 2019-04-04 2019-08-09 国美金控投资有限公司 It is a kind of that guarantor's Contract Signing system and method is prolonged based on block chain
CN111651744A (en) * 2020-06-10 2020-09-11 上海德易车信息科技有限公司 Electronic contract signing method and device, computer equipment and storage medium
CN112116221A (en) * 2020-09-01 2020-12-22 上海康诚建设工程咨询有限公司 Evaluation method and system for comprehensive evaluation, electronic device and storage medium
CN112818300A (en) * 2021-01-21 2021-05-18 深圳壹账通智能科技有限公司 Electronic contract generating method and device, computer equipment and storage medium
CN113129008A (en) * 2021-05-19 2021-07-16 京东科技控股股份有限公司 Data processing method and device, computer readable medium and electronic equipment
CN114239501A (en) * 2021-12-13 2022-03-25 北京字跳网络技术有限公司 Contract generation method, apparatus, device and medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11734678B2 (en) * 2016-01-25 2023-08-22 Apple Inc. Document importation into secure element
US10956674B2 (en) * 2018-10-09 2021-03-23 International Business Machines Corporation Creating cost models using standard templates and key-value pair differential analysis
CN110557376B (en) * 2019-08-01 2022-12-30 平安科技(深圳)有限公司 Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
US20210065304A1 (en) * 2019-09-03 2021-03-04 William Greene Contract automation with blockchain based interaction and recording

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103138921A (en) * 2011-11-22 2013-06-05 阿里巴巴集团控股有限公司 Method and system for verifying identity information
JP6290459B1 (en) * 2016-08-31 2018-03-07 株式会社オプティム Contract management system, contract management method, and contract management program
KR20180024857A (en) * 2016-08-31 2018-03-08 한국정보인증주식회사 Server and method for providing electronic contracting service
CN107707970A (en) * 2017-09-14 2018-02-16 深圳市佰仟金融服务有限公司 A kind of electronic contract signature method, system and terminal
CN108494559A (en) * 2018-03-12 2018-09-04 北京航空航天大学 A kind of electron contract method based on semi trusted third party
CN109460966A (en) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 Contract signing method, apparatus and terminal device based on requesting party's classification
CN109872233A (en) * 2019-01-17 2019-06-11 深圳壹账通智能科技有限公司 Contract signing method, apparatus, computer equipment and storage medium
CN110111206A (en) * 2019-04-04 2019-08-09 国美金控投资有限公司 It is a kind of that guarantor's Contract Signing system and method is prolonged based on block chain
CN111651744A (en) * 2020-06-10 2020-09-11 上海德易车信息科技有限公司 Electronic contract signing method and device, computer equipment and storage medium
CN112116221A (en) * 2020-09-01 2020-12-22 上海康诚建设工程咨询有限公司 Evaluation method and system for comprehensive evaluation, electronic device and storage medium
CN112818300A (en) * 2021-01-21 2021-05-18 深圳壹账通智能科技有限公司 Electronic contract generating method and device, computer equipment and storage medium
CN113129008A (en) * 2021-05-19 2021-07-16 京东科技控股股份有限公司 Data processing method and device, computer readable medium and electronic equipment
CN114239501A (en) * 2021-12-13 2022-03-25 北京字跳网络技术有限公司 Contract generation method, apparatus, device and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
可信电子合同支撑***在电子商务中的应用;李长军等;《信息与电脑(理论版)》;20110815(第08期);第145-146页 *

Also Published As

Publication number Publication date
CN115392913A (en) 2022-11-25

Similar Documents

Publication Publication Date Title
US11681790B2 (en) System and method for user enrollment in a secure biometric verification system
US7690032B1 (en) Method and system for confirming the identity of a user
US8977861B2 (en) Method and system for biometric authentication
US10650379B2 (en) Method and system for validating personalized account identifiers using biometric authentication and self-learning algorithms
US8520903B2 (en) Method and system of accounting for positional variability of biometric features
US7676069B2 (en) Method and apparatus for rolling enrollment for signature verification
US8832800B2 (en) Method for producing an electro-biometric signature allowing legal interaction between and identification of persons
WO2019153982A1 (en) Payment processing method and device, computer apparatus, and storage medium
CN110276178B (en) Risk control method, device and equipment based on identity verification
CN115392913B (en) Electronic contract generating method based on user identity recognition and storage medium
US20190257033A1 (en) System and method for a financial transaction system having a secure biometric verification system
CN110324314A (en) User registering method and device, storage medium, electronic equipment
US20180060379A1 (en) Automated correlation and deduplication of identities
US20070220258A1 (en) Method, apparatus, and computer product for computing credibility
EP2254093B1 (en) Method and system for confirming the identity of a user
TWM603588U (en) Insurance transaction data processing device with multiple identity authentication and transaction confirmation
CN115150150A (en) Information recording method based on block chain technology
AU2009227510B2 (en) Method and system for confirming the identity of a user
Ranyali Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho
JPH11110544A (en) Method and device for certifying ic card
EP2354999A1 (en) Method and system for biometric authentication
CN1285940A (en) IC card authenticating method and device
CN115809448A (en) Login authentication-based platform experience method and device
CN112686641A (en) Voucher vault system based on block chain
JPH11110543A (en) Method and device for certifying ic card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant