WO2024108900A1 - 一种电子签名验证方法及装置 - Google Patents

一种电子签名验证方法及装置 Download PDF

Info

Publication number
WO2024108900A1
WO2024108900A1 PCT/CN2023/090977 CN2023090977W WO2024108900A1 WO 2024108900 A1 WO2024108900 A1 WO 2024108900A1 CN 2023090977 W CN2023090977 W CN 2023090977W WO 2024108900 A1 WO2024108900 A1 WO 2024108900A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic signature
terminal device
request message
service system
message
Prior art date
Application number
PCT/CN2023/090977
Other languages
English (en)
French (fr)
Inventor
冯军辉
张春河
庄乃峰
王坤
徐长月
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024108900A1 publication Critical patent/WO2024108900A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1083In-session procedures
    • H04L65/1089In-session procedures by adding media; by removing media
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the embodiments of the present application relate to the field of communication technology, and in particular, to a method and device for electronic signature verification.
  • HD voice can be called high-definition call or long-term evolution voice bearer. Verifying the user's electronic signature in online services is a difficult point.
  • the method for verifying a user's electronic signature is: the user's terminal device sends the electronic signature to the customer service's terminal device, and the customer service manually verifies the electronic signature.
  • the customer service needs to handle it manually, and the customer service may tamper with the electronic signature, resulting in low credibility of the electronic signature verification result.
  • the embodiments of the present application provide an electronic signature verification method and device for improving the credibility of the electronic signature verification result.
  • an embodiment of the present application provides an electronic signature verification method.
  • the method can be executed by a service system, or can be executed by a device having the functions of a service system.
  • the service system can be implemented, for example, by one or more computing devices, such as a server.
  • the following description takes the execution of the electronic signature verification method by a service system as an example.
  • the method includes: the service system receives a first request message, the first request message is used to request an electronic signature corresponding to a first terminal device; sends a second request message to the first terminal device, the second request message is used to request to obtain the electronic signature corresponding to the first terminal device; receives a feedback message from the first terminal device, the feedback message indicates the first electronic signature; determines the verification result of the first electronic signature.
  • the verification result may indicate that the first electronic signature verification is passed, or the verification result indicates that the first electronic signature verification is not passed.
  • the service system can directly invite the user to sign electronically, obtain the electronic signature of the user (such as the first electronic signature) from the terminal device corresponding to the user (such as the first terminal device), and determine the verification result of the first electronic signature.
  • the service system can directly invite the user to sign electronically, obtain the electronic signature of the user (such as the first electronic signature) from the terminal device corresponding to the user (such as the first terminal device), and determine the verification result of the first electronic signature.
  • the first request message indicates the first terminal device.
  • the service system may determine the first terminal device based on the first request message, so that the service system can communicate with the first terminal device.
  • the first request message is received from a second terminal device, wherein the first request message includes an identifier of a first session, and the first session indicates that the first terminal device and the second terminal device
  • the device establishes a call channel; sending a second request message to the first terminal device, including: sending the second request message to the first terminal device based on the call channel.
  • the second terminal device can trigger the service system to obtain the user's electronic signature during the process of establishing a call with the first terminal device, without the user triggering the service system, which is conducive to reducing user operations.
  • the service system can directly interact with the first terminal device based on the call channel established between the second terminal device and the first terminal device to obtain the electronic signature. For the user, it is equivalent to completing the process of inputting the electronic signature during a call, which is conducive to reducing user operations and improving user experience.
  • the use of the call channel to transmit the feedback message indicating the electronic signature can ensure the transmission security of the feedback message to a certain extent.
  • the second request message includes an electronic signature capability identifier
  • the electronic signature capability identifier indicates that the service system has the capability to transmit an electronic signature.
  • the electronic signature capability identifier is used to request to obtain the electronic signature of the user.
  • the second request message may indicate the identifier of the electronic signature capability of the service system, so that the first terminal device can determine the capability of the service system, thereby ensuring that the service system can subsequently successfully obtain the first electronic signature.
  • the second request message is carried in a session description protocol message
  • the identifier of the electronic signature function is carried in a first field of the session description protocol message.
  • the first field is a field in a header of the session description protocol message, or a field in a body of the session description protocol message.
  • the second request message can be carried in the session description protocol message, without sending the second request message through a dedicated message, thereby reducing the interaction between the first terminal device and the service system.
  • the service system can reuse the first field in the session description protocol message to carry the identifier of the electronic signature function, without adding a new field to the session description protocol message, thereby reducing the changes to the session description protocol message.
  • the second request message includes first media resource information of the service system, and the first media resource information indicates a first resource of the service system used to transmit video; the method also includes: receiving second media resource information from the first terminal device, and the second media resource information indicates a second resource of the first terminal device used to transmit video; receiving a feedback message from the first terminal device, including: receiving the feedback message through the first resource; decoding the feedback message according to the second resource to obtain the first electronic signature, and the first electronic signature is in the form of an image or a video.
  • the service system and the first terminal device can negotiate the resources for transmitting the video, so that the first terminal device can transmit the first electronic signature in the form of an image or video to enrich the content of the electronic signature.
  • the service system and the first terminal device negotiate the resources so that the service system can successfully decode and obtain the first electronic signature.
  • the feedback message further includes a signature video, where the signature video indicates a process of inputting the first electronic signature.
  • the first terminal device can also send a video of the user inputting the first electronic signature to the service system to enrich the content of the feedback message.
  • the service system can also verify the authenticity of the signature video, further ensuring the credibility of the verification.
  • the method further includes: sending the verification result to the second terminal device.
  • the service system when the second terminal device triggers the service system to obtain the electronic signature, the service system can send the verification result of the first electronic signature to the service system after determining the verification result of the first electronic signature, so that the customer service corresponding to the second terminal device can handle business for the user based on the verification result.
  • determining the verification result of the first electronic signature includes: sending the first electronic signature to a business system, and receiving the verification result from the business system.
  • the service system may receive the verification result from the business system, so that the service system determines the verification result in a simple and direct manner.
  • the method further includes: encrypting the first electronic signature and the timestamp of the first electronic signature to obtain first encrypted information; and storing the first encrypted information in a blockchain system.
  • the electronic signature and the timestamp etc. may be encrypted and stored to ensure that the first electronic signature cannot be tampered with.
  • an embodiment of the present application provides an electronic signature verification method.
  • the method can be executed by a first terminal device, or can be executed by a chip system having the function of a first terminal device.
  • the method includes: receiving a second request message from a service system, the second request message is used to request to obtain an electronic signature corresponding to the first terminal device; receiving a first electronic signature input by a user; and sending a feedback message to the service system, the feedback message indicating the first electronic signature.
  • receiving the second request message from the service system includes: receiving the second request message from the service system based on a session channel, where the session channel is a call channel established between the first terminal device and the second terminal device.
  • the second request message includes an electronic signature function identifier
  • the electronic signature function identifier indicates that the service system has the capability of transmitting an electronic signature
  • the second request message is carried in a session description protocol message
  • the identifier of the electronic signature function is carried in a first field of the session description protocol message.
  • the first field is a field in a header of the session description protocol message, or a field in a body of the session description protocol message.
  • the method further includes: displaying a signature box, the signature box instructing the user to sign; and obtaining the first electronic signature input by the user through the signature box.
  • the first terminal device may display a signature box to facilitate the user to input the first electronic signature and also facilitate the first terminal device to obtain the first electronic signature input by the user.
  • the method further includes: sending second media resource information of the first terminal device to the service system, the second media resource information indicating a second resource of the first terminal device used to transmit video; based on the second resource, encoding the first electronic signature to obtain the feedback message, the first electronic signature being in the form of an image or video, wherein the feedback message is sent to the service system via the second resource.
  • the method further includes: obtaining permission to turn on a camera of the first terminal device; turning on the camera, and capturing a signature video through the camera, wherein the signature video indicates a process of the user inputting the first electronic signature, and the feedback message also indicates the signature video.
  • the first terminal device may also obtain permission to turn on the camera, and collect the signature video of the user inputting the electronic signature through the camera to ensure that the process of obtaining the signature video is legal.
  • an embodiment of the present application provides an electronic signature verification method, which can be executed by a second terminal device, or can be executed by a chip system having the function of a second terminal device.
  • the method includes: sending a first request message to a service system, the first request message is used to request an electronic signature corresponding to the first terminal device; and receiving a verification result from the service system.
  • the first request message indicates the first terminal device.
  • the first request message includes an identifier of a first session
  • the first session indicates a call channel established between the first terminal device and the second terminal device
  • the identifier of the first session is used to determine the first terminal device.
  • an embodiment of the present application provides an electronic signature verification method, which can be executed by a business system, or can be executed by a chip system having the functions of a business system.
  • the business system can be implemented by one or more computing devices, such as a server.
  • the method includes: receiving a first electronic signature from a service system; verifying the first electronic signature to obtain a verification result.
  • the method further includes: encrypting the first electronic signature and a timestamp of the first electronic signature to obtain first encrypted information, and storing the first encrypted information in a blockchain system.
  • an embodiment of the present application provides a communication device, which may be the service system in the first aspect above, or an electronic device (e.g., a chip system) configured in the service system.
  • the communication device includes corresponding means or modules for executing the first aspect or any possible implementation method above.
  • the communication device includes a processing module (sometimes also referred to as a processing unit) and a transceiver module (sometimes also referred to as a transceiver unit).
  • the transceiver module is used to receive a first request message, where the first request message is used to request the electronic signature corresponding to the communication device, send a second request message to the first terminal device, where the second request message is used to request the electronic signature corresponding to the first terminal device, and receive a feedback message from the first terminal device, where the feedback message indicates the first electronic signature;
  • the processing module is used to determine the verification result of the first electronic signature.
  • the communication device includes a storage module (sometimes also referred to as a storage unit), the processing module is capable of coupling with the storage module and executing programs or instructions in the storage module, thereby enabling the communication device to perform the functions of the service system in the fifth aspect described above.
  • a storage module sometimes also referred to as a storage unit
  • the processing module is capable of coupling with the storage module and executing programs or instructions in the storage module, thereby enabling the communication device to perform the functions of the service system in the fifth aspect described above.
  • an embodiment of the present application provides a communication device, which may be the first terminal device in the second aspect above, or an electronic device (e.g., a chip system) configured in the first terminal device.
  • the communication device includes corresponding means (means) or modules for executing the second aspect above or any possible implementation.
  • the communication device includes a processing module (sometimes also referred to as a processing unit) and a transceiver module (sometimes also referred to as a transceiver unit).
  • the transceiver module is used to receive a second request message from the service system under the control of the processing module, wherein the second request message is used to request the electronic signature corresponding to the first terminal device, receive the first electronic signature input by the user, and send a feedback message to the service system, wherein the feedback message indicates the first electronic signature.
  • the communication device includes a storage module (sometimes also referred to as a storage unit), the processing module is capable of coupling with the storage module and executing programs or instructions in the storage module, enabling the communication device to perform the functions of the first terminal device in the fifth aspect mentioned above.
  • a storage module sometimes also referred to as a storage unit
  • the processing module is capable of coupling with the storage module and executing programs or instructions in the storage module, enabling the communication device to perform the functions of the first terminal device in the fifth aspect mentioned above.
  • an embodiment of the present application provides a communication device, which may be the second terminal device in the third aspect above, or an electronic device (e.g., a chip system) configured in the second terminal device.
  • the communication device includes corresponding means (means) or modules for executing the third aspect above or any possible implementation.
  • the communication device includes a processing module (sometimes also referred to as a processing unit) and a transceiver module (sometimes also referred to as a transceiver unit).
  • the transceiver module is used to send a first request message to the service system under the control of the processing module, and the first request message is used for the electronic signature corresponding to the first terminal device; the transceiver module is also used to receive the verification result from the service system under the control of the processing module.
  • the communication device includes a storage module (sometimes also referred to as a storage unit), the processing module can be coupled to the storage module and execute the program or instruction in the storage module, so that the communication device can perform the above The function of the second terminal device in the fifth aspect.
  • a storage module sometimes also referred to as a storage unit
  • the processing module can be coupled to the storage module and execute the program or instruction in the storage module, so that the communication device can perform the above The function of the second terminal device in the fifth aspect.
  • an embodiment of the present application provides a communication device, which may be the business system in the fourth aspect above, or an electronic device (e.g., a chip system) configured in the business system.
  • the communication device includes corresponding means (means) or modules for executing the fourth aspect above or any possible implementation.
  • the communication device includes a processing module (sometimes also referred to as a processing unit) and a transceiver module (sometimes also referred to as a transceiver unit).
  • the transceiver module is used to receive a first electronic signature from a service system; the processing module is used to verify the first electronic signature to obtain a verification result; the transceiver module is also used to send the verification result to the service system.
  • the communication device includes a storage module (sometimes also referred to as a storage unit), the processing module is capable of coupling with the storage module and executing programs or instructions in the storage module, thereby enabling the communication device to perform the functions of the service system in the fifth aspect described above.
  • a storage module sometimes also referred to as a storage unit
  • the processing module is capable of coupling with the storage module and executing programs or instructions in the storage module, thereby enabling the communication device to perform the functions of the service system in the fifth aspect described above.
  • an embodiment of the present application provides a communication system, which includes the communication device described in aspects five to seven.
  • an embodiment of the present application provides a communication system, which includes the communication device described in aspects five to eight.
  • an embodiment of the present application provides a communication device, comprising: a processor and a memory; the memory is used to store one or more computer programs, and the one or more computer programs include computer execution instructions.
  • the processor executes the one or more computer programs stored in the memory, so that the communication device performs the method as described in any one of the first to fourth aspects.
  • the communication device further includes other components, such as an antenna, an input/output module, an interface, etc.
  • these components may be hardware, software, or a combination of software and hardware.
  • an embodiment of the present application provides a chip system, the chip system comprising: a processor and an interface.
  • the processor is used to call and run instructions from the interface, and when the processor executes the instructions, the method described in any one of the first to fourth aspects is implemented.
  • a computer-readable storage medium which is used to store computer programs or instructions, and when the computer-readable storage medium is executed, it implements any one of the methods described in the first to fourth aspects above.
  • a computer program product comprising instructions, which, when executed on a computer, implements the method described in any one of the first to fourth aspects.
  • FIG1A is a schematic diagram of a scenario to which an embodiment of the present application is applicable.
  • FIG1B is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • FIG2A is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • FIG2B is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • FIG3 is a schematic diagram of another scenario to which the embodiment of the present application is applicable.
  • FIG4 is a flow chart of an electronic signature verification method provided in an embodiment of the present application.
  • FIG5 is a schematic diagram of interface changes of a first terminal device during an electronic signature input process provided by an embodiment of the present application
  • FIG6 is a schematic diagram of an interface of a first terminal device provided in an embodiment of the present application.
  • FIG7 is a schematic diagram of a flow chart of another electronic signature verification method provided in an embodiment of the present application.
  • FIG8 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
  • FIG. 9 is a schematic diagram of the structure of another communication device provided in an embodiment of the present application.
  • a terminal device is a device with wireless transceiver functions, which can be a fixed device, a mobile device, a handheld device, a wearable device, a vehicle-mounted device, or a wireless device built into the above device (for example, a communication module or a chip system, etc.).
  • the terminal device is used to connect people, objects, machines, etc., and can be widely used in various scenarios, such as but not limited to the following scenarios: cellular communication, device-to-device communication (D2D), vehicle to everything (V2X), machine-to-machine/machine-type communication (M2M/MTC), Internet of Things (IoT), virtual reality (VR), augmented reality (AR), industrial control, self-driving, remote medical, smart grid, smart furniture, smart office, smart wear, smart transportation, smart city, drones, robots and other scenarios.
  • the terminal device may sometimes be referred to as user equipment (UE), terminal, access station, UE station, remote station, wireless communication equipment, or user device, etc.
  • Network equipment for example, including access network equipment (or, referred to as access network elements), and/or core network equipment (or, referred to as core network elements).
  • the access network device is a device with wireless transceiver function, which is used to communicate with the terminal device.
  • the access network device includes but is not limited to the base station (BTS, Node B, eNodeB/eNB, or gNodeB/gNB) in the above communication system, the transceiver point (t(R)ANsmission reception point, TRP), the base station of the subsequent evolution of 3GPP, the access node in the wireless fidelity (wireless fidelity, WiFi) system, the wireless relay node, the wireless backhaul node, etc.
  • the base station can be: a macro base station, a micro base station, a micro-micro base station, a small station, a relay station, etc.
  • the base station can include one or more co-site or non-co-site transmission and reception points.
  • the network device can also be a wireless controller, a centralized unit (centralized unit, CU), which can also be called a convergence unit, and/or a distributed unit (distributed unit, DU) in the cloud radio access network (cloud radio access network, C(R)AN) scenario.
  • the network device can also be a server, a wearable device, or an in-vehicle device, etc.
  • the network device in the vehicle to everything (V2X) technology may be a road side unit (RSU).
  • the multiple network devices in the communication system may be base stations of the same type or base stations of different types.
  • the base station may communicate with the terminal device or communicate with the terminal device through a relay station.
  • the terminal device may communicate with multiple base stations in different access technologies.
  • the core network device is used to implement at least one of the functions of mobility management, data processing, session management, policy and billing.
  • the names of the devices that implement the core network functions in systems with different access technologies may be different, and the embodiments of the present application do not limit this.
  • the core network equipment includes: access and mobility management function (AMF), session management function (SMF), PCF or user plane function (UPF), etc.
  • Electronic signature data contained or attached in electronic form in a data message that identifies the signatory and indicates that the signatory approves the content.
  • An example of an electronic signature is a signature image.
  • Computing device refers to a device with processing capabilities.
  • Computing devices are, for example, servers or terminal devices.
  • Application A software module that provides a certain service and can run in a terminal device.
  • the application may be in the form of an application (APP) program, mini-program or web page pre-installed on the terminal device.
  • APP application
  • the number of nouns means “singular noun or plural noun", that is, “one or more”.
  • At least one means one or more
  • plural means two or more.
  • “And/or” describes the association relationship of associated objects, indicating that three relationships may exist.
  • a and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural.
  • the character "/” generally indicates that the previous and next associated objects are in an “or” relationship.
  • A/B means: A or B.
  • “At least one of the following" or similar expressions refers to any combination of these items, including any combination of single or plural items.
  • At least one of a, b, or c means: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c can be single or multiple.
  • Figure 1A is a schematic diagram of a scenario applicable to an embodiment of the present application.
  • Figure 1A can also be understood as a schematic diagram of the architecture of a communication system (also referred to as an electronic signature verification system).
  • the scenario includes a first terminal device and a service system.
  • the implementation of the first terminal device can refer to the above.
  • the service system can be implemented by one or more computing devices.
  • the first terminal device may correspond to the user, in other words, the user may operate the first terminal device.
  • the first terminal device may run a first application, such as a service application or a social application.
  • the first terminal device may communicate with the service system.
  • the first terminal device may send a feedback message to the service system.
  • the feedback message indicates the first electronic signature.
  • the service system may receive the feedback message from the first terminal device.
  • the service system may verify the first electronic signature. The content of the feedback message and the specific process of verifying the first electronic signature will be discussed below.
  • the scenario shown in Figure 1A also includes a blockchain system.
  • the blockchain system can communicate with the service system.
  • the blockchain system may include multiple blockchain nodes. After a blockchain node generates a block, it broadcasts the block. After receiving the block, other blockchain nodes verify the block and update the local blockchain after the verification is passed. The service system may encrypt the first electronic signature and write the encryption result into the blockchain system.
  • Figure 1B is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • Figure 1B can also be understood as a schematic diagram of the architecture of a communication system (also referred to as an electronic signature verification system).
  • the scenario includes a first terminal device, a service system, and a business system.
  • Figure 1B also includes a business system.
  • the business system can be implemented through one or more computing devices.
  • the content of the first terminal device can refer to the content discussed in Figure 1A above.
  • the first terminal device may communicate with the service system.
  • the first terminal device may send a feedback message to the service system.
  • the feedback message indicates the first electronic signature.
  • the service system may receive the feedback message from the first terminal device.
  • the service system may determine the verification result of the first electronic signature. The content of the feedback message and the specific process of determining the verification result of the first electronic signature will be discussed below.
  • the service system can communicate with the business system.
  • the service system can send the first electronic signature to the business system, and the business system can verify the first electronic signature.
  • the scenario shown in FIG1B further includes a blockchain system.
  • the blockchain system can be used with the industry service system to communicate.
  • the blockchain system may include multiple blockchain nodes. After a blockchain node generates a block, it broadcasts the block. After receiving the block, other blockchain nodes verify the block and update the local blockchain after the verification is passed. The business system may encrypt the first electronic signature and write the encryption result into the blockchain system.
  • the number of first terminal devices is 1 for example, but the number of first terminal devices is not actually limited.
  • Figure 2A is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • Figure 2A can also be understood as a schematic diagram of the architecture of a communication system.
  • the scenario includes a first terminal device, a service system, and a second terminal device.
  • Figure 2A also includes a second terminal device.
  • the implementation of the first terminal device, the service system, and the business system can refer to the content of Figure 1A.
  • the second terminal device may correspond to a customer service (or agent), in other words, the customer service may operate the second terminal device.
  • the second terminal device may run a second application.
  • the second application may be an application corresponding to the service system, in other words, the service system may provide background support for the second application.
  • the second application is, for example, a service application.
  • the second terminal device can communicate with the first terminal device, for example, the second terminal device can establish a call with the first terminal device.
  • the second terminal device can also communicate with the service system.
  • the second terminal device sends a request message to the service system.
  • the service system can receive the request message from the first terminal device and process the request message.
  • the service system in FIG. 2A can provide services for the second terminal device corresponding to the customer service, or provide services for the second application in the second terminal device, the service system in FIG. 2A can also be referred to as a customer service system or a customer service platform.
  • Figure 2B is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • Figure 2B can also be understood as a schematic diagram of the architecture of a communication system.
  • the scenario includes a first terminal device, a service system, a business system, and a second terminal device.
  • the service system in Figure 2B can also be called a customer service system or a customer service platform.
  • Figure 2B also includes a business system.
  • the implementation method of the business system can refer to the content of Figure 1B.
  • the second terminal device may correspond to a customer service (or agent), in other words, the customer service may operate the second terminal device.
  • the second terminal device may run a second application.
  • the second application may be an application corresponding to a business system, in other words, the business system may provide background support for the second application.
  • the second application is, for example, a service application.
  • the second terminal device can communicate with the first terminal device, for example, the second terminal device can establish a call with the first terminal device.
  • the second terminal device can also communicate with the business system through the service system.
  • Figure 3 is a schematic diagram of another scenario applicable to the embodiment of the present application.
  • Figure 3 can also be understood as a schematic diagram of the architecture of a communication system.
  • Figure 3 can also be understood as a deployment diagram of each device included in the communication system in Figure 2B.
  • the scenario includes a first terminal device, an access network device, an internet protocol multimedia subsystem (internet protocol multimedia subsystem, IMS) (also referred to as an IMS domain), a service system, a business system, and a second terminal device.
  • IMS internet protocol multimedia subsystem
  • the implementation methods of the first terminal device, the access network device, and the second terminal device can refer to the previous text.
  • the first terminal device may also run a first application, and the content of the first application may refer to the above text.
  • the second terminal device may also run a second application, and the content of the second application may refer to the above text.
  • the IMS may include an evolved packet core (EPC), a fifth generation core (5GC) and an IMS core network.
  • EPC evolved packet core
  • 5GC fifth generation core
  • IMS core network an IMS core network
  • the EPC or 5GC may communicate with the first terminal device through an access network device (such as a first access network device or a second access network device).
  • the EPC may communicate with the IMS core network.
  • the first access network device may be, for example, a 4G base station, and the second access network device may be, for example, a 5G base station.
  • the IMS core network may communicate with the service system, and the IMS core network may also communicate with the EPC.
  • the EPC includes a serving/packet data network gateway (S/PDN-GW). Or S/P-GW).
  • S/P-GW is the core device in EPC.
  • S/P-GW is used to implement the functions provided by the gateway logical entity, and the gateway logical entity includes the service gateway and PDN.
  • the service gateway transmits business plane data to the devices in the wireless access network.
  • the devices in the wireless access network include the first access network device and the second access network device.
  • PDN faces other data networks and realizes access interaction with multiple public data networks.
  • PDN can be an anchor point in the evolved packet system (EPS).
  • EPS evolved packet system
  • 5GC includes various network elements, such as user plane function (UPF) and access and mobility management function (AMF).
  • UPF user plane function
  • AMF access and mobility management function
  • UPF is responsible for user plane functions, packet routing forwarding, policy implementation, traffic reporting, and quality of service (QoS) processing.
  • AMF is responsible for access and mobility management functions, performs registration, connection, reachability, mobility management, and provides a session management message transmission channel for the first terminal device and session management function (SMF), provides authentication and authorization functions for user access, and is the access point of the terminal and the wireless core network control plane.
  • SMF session management function
  • the IMS core network includes interrogating-call session control function (I-CSCF), serving-call session control function (S-CSCF), session border controller (SBC) and proxy-call session control functions (P-CSCF).
  • I-CSCF interrogating-call session control function
  • S-CSCF serving-call session control function
  • SBC session border controller
  • P-CSCF proxy-call session control functions
  • I-CSCF and S-CSCF can be abbreviated as I/S-CSCF.
  • I-CSCF is the unified initial entry point of the IMS network, responsible for the assignment and query of the S-CSCF for user registration.
  • S-CSCF is the central node of the IMS core network, mainly used for user registration, authentication control, session routing, service trigger control, and maintaining session status information.
  • SBC is used to provide secure access and media processing.
  • P-CSCF is the entry node for users to access the IMS core network, mainly responsible for the proxy of signaling and messages.
  • the service system includes a signaling server and a media server.
  • the media server is responsible for audio and video media processing and playback, venue application and release, audio and video encoding and decoding, desktop sharing and electronic signature processing, etc.
  • the signaling server is responsible for signaling negotiation and processing, and controlling customer service to join and leave the meeting.
  • the signaling server can communicate with the S-CSCF through the session initiation protocol (SIP), and the media server can communicate with the SBC through the real-time transport protocol (RTP).
  • SIP session initiation protocol
  • RTP real-time transport protocol
  • a video call can be established between a first terminal device of a user and a second terminal device of a customer service.
  • the second terminal device obtains the electronic signature input by the user through the video call, and verifies the obtained electronic signature, thereby completing the electronic signature verification process.
  • the second terminal device can also send the verification result of the electronic signature to the business system.
  • the first terminal device is, for example, the first terminal device in FIG. 3
  • the second terminal device is, for example, the second terminal device in FIG. 3
  • the business system is, for example, the business system in FIG. 3.
  • an embodiment of the present application provides an electronic signature verification method.
  • the service system may be triggered by a first request message, thereby requesting an electronic signature (such as a first electronic signature) from a first terminal device.
  • an electronic signature such as a first electronic signature
  • the service system may also determine the verification result of the first electronic signature.
  • the electronic signature verification process does not require customer service intervention, thereby improving the credibility of verifying the electronic signature.
  • the customer service operations may be reduced, which is conducive to improving the customer service experience.
  • the first terminal device described in each embodiment of the application is, for example, the first terminal device shown in any one of FIG. 1A, FIG. 1B, FIG. 2A, FIG. 2B or FIG. 3
  • the second terminal device is, for example, the second terminal device shown in FIG. 2A, FIG. 2B or FIG. 3
  • the service system is, for example, the service system shown in any one of FIG. 1A, FIG. 1B, FIG. 2A, FIG. 2B or FIG. 3
  • the business system is, for example, the business system shown in any one of FIG. 1A, FIG. 1B, FIG. 2A, FIG. 2B or FIG. 3
  • the IMS is, for example, the IMS shown in FIG. 3.
  • the media server described in each embodiment of the present application is, for example, the media server shown in FIG. 3, and the signaling server is, for example, the signaling server of FIG. 3.
  • FIG 4 is a flowchart of an electronic signature verification method provided in an embodiment of the present application.
  • the flowchart includes the following steps.
  • S401 The second terminal device sends a first request message to the service system.
  • the service system receives the first request message from the second terminal device.
  • customer service assists users in handling business.
  • the user needs to complete the electronic signature online before it can be completed. Therefore, the customer service can send a first request message to the service system through the second terminal device to obtain the user's first electronic signature through the service system.
  • the second terminal device can send the first request message to the service system through IMS.
  • the second terminal device directly sends the first request message to the service system.
  • the first request message may be used to request a first electronic signature of a user, and the first request message may indicate a first terminal device corresponding to the user.
  • the first request message includes an identifier of a first session.
  • the identifier of the first session indicates the first terminal device.
  • the first session indicates a call channel established between the second terminal device and the first terminal device.
  • the second terminal device may establish a call channel with the first terminal device through the service system.
  • the call channel may be a channel for an interactive user session.
  • An interactive user session may be used to implement interaction of multimedia elements. Multimedia elements may be one or more of video, image, and audio.
  • the communication of an interactive user session may include video calls, interactive voice recognition (IVR), audio calls, instant messaging, online games, or virtual reality.
  • the service system may determine the identifier of the first session corresponding to the call, and send the identifier of the first session to the first terminal device and the second terminal device.
  • the second terminal device may carry the identifier of the first session in the first request message, and send the first request message to the service system. After receiving the first request message, the service system may determine the first terminal device according to the identifier of the first session in the first request message.
  • the first request message includes an identifier of the first terminal device, and the identifier of the first terminal device indicates the first terminal device.
  • the identifier of the first terminal device is, for example, a media access control (MAC) address of the first terminal device.
  • MAC media access control
  • the first terminal device may generate a first request message according to the first operation of the user, and send the first request message to the service system. Accordingly, the service system receives the first request message from the first terminal device.
  • the first operation indicates to perform electronic signature verification.
  • the user can perform a first operation in the first application.
  • the first terminal device generates a first request message in response to the first operation.
  • step S401 is an optional step, which is indicated by a dotted line in FIG. 4 .
  • S402 The service system sends a second request message to the first terminal device.
  • the first terminal device receives the second request message from the service system.
  • the second request message can be used to request to obtain the user's electronic signature.
  • the service system may communicate with the first terminal device based on the call channel indicated by the first session.
  • the service system may send the second request message to the first terminal device via the session initiation protocol (SIP).
  • the service system may send the second request message to the first terminal device via the IMS.
  • the service system directly sends the second request message to the first terminal device.
  • the second request message may be carried in a first session description protocol (SDP) message.
  • SDP session description protocol
  • the first session description protocol message may be referred to as a session description protocol message.
  • the service system uses the session description protocol to describe (or encapsulate, or encode) the second request message.
  • the second request message indicates (or includes) an identifier of an electronic signature function.
  • the identifier of the electronic signature function may also be referred to as an identifier of an electronic signature domain.
  • the identifier of the electronic signature function indicates that the service system has the ability to transmit an electronic signature.
  • the identifier of the electronic signature function may indicate a request to obtain an electronic signature of the first terminal device.
  • the identifier of the electronic signature function may be carried in the first field of the first session description protocol message.
  • the first field may be a field in a header (also referred to as a header field) in the first session description protocol message.
  • the first field is a contact field or a supported field in a session description protocol message.
  • the contact field is used to indicate (or state) the capabilities that the service system expects to support, or the capabilities that the service system actually supports.
  • the supported field is used to indicate (or state) the actual capabilities of the service system.
  • the first field may be a field in the body of the first session description protocol message.
  • the first field is field a in row M.
  • Row M is used to indicate (or declare) the service type supported by the service system
  • field a is used to indicate (or declare) information corresponding to the service type supported by the service system.
  • the service system has the capability to transmit electronic signatures under the video service type.
  • the M line in the first session description protocol message may indicate that the service system supports the video service type, and the a field may indicate that the service system has the capability to transmit electronic signatures.
  • the identifier of the electronic signature function can be carried in an existing field of the first session description protocol message, without adding a new field to the first session description protocol message, thereby reducing the change to the format of the first session description protocol message.
  • the first field can also be a newly added field of the first session description protocol message, which is not specifically limited in the embodiment of the present application.
  • the second request message also includes first media resource information.
  • the first media resource information indicates a first resource for the service system to transmit video.
  • the first resource includes, for example, an Internet protocol (IP address, video port number, audio port number, audio encoding resource, audio decoding resource, video encoding resource, and video decoding resource) of the service system.
  • IP address IP address
  • video port number audio port number
  • audio encoding resource audio decoding resource
  • video decoding resource video decoding resource
  • video decoding resource video decoding resource
  • the first resource also includes a license.
  • the license is used to limit the service system's ability to transmit electronic signatures.
  • the first resource may be pre-configured in the service system through a protocol, or it may be allocated by the service system itself.
  • the first terminal device obtains a feedback message according to the first electronic signature.
  • the feedback message may indicate the first electronic signature.
  • the first terminal device may parse the second request message and determine that the service system requests to obtain the electronic signature of the user, so the first terminal device may obtain the first electronic signature of the user.
  • the first terminal device displays a signature box.
  • the signature box may also be referred to as a signature input box or an input box.
  • the user may enter a first electronic signature in the signature box. Accordingly, the first terminal device obtains the first electronic signature.
  • the first electronic signature may be in various forms, such as an image, text, or video.
  • the first terminal device may directly use the trajectory entered by the user in the signature box as the first signature.
  • the signature box may display a first prompt message, where the first prompt message is used to prompt the user to enter a signature.
  • Figure 5 is a schematic diagram of the interface changes of the first terminal device during the process of the user inputting a signature provided in an embodiment of the present application.
  • the first terminal device can display a signature box 500, and the signature box 500 includes a first prompt message 501.
  • the first prompt message 501 is specifically as shown in Figure 5, "You are handling business. If you confirm to handle the business, please write your name in the signature box.”
  • the user can handwrite the first electronic signature in the signature box 500, so that the first terminal device can obtain the first electronic signature 502.
  • the first electronic signature 502 is, for example, "Zhang San" as shown in b of Figure 5.
  • the first terminal device may also use a camera to capture a video of the user inputting an electronic signature (i.e., a signature video).
  • the signature video and the first electronic signature are used to generate a feedback message.
  • the first terminal device encodes the first electronic signature and the signature video based on the second resource to obtain a feedback message.
  • the first terminal device can obtain permission to turn on the camera, and turn on the camera after obtaining permission to turn on the camera.
  • the first terminal device may display a second prompt message.
  • the second prompt message is used to request the user to enable camera permission.
  • the first terminal device determines that the permission to enable the camera has been obtained according to the second operation of the user.
  • the second operation indicates consent to enable the camera. If the user performs a third operation, the first terminal device does not enable the camera.
  • the third operation indicates refusal to enable the camera.
  • Figure 6 is a schematic diagram of the interface of a first terminal device provided in an embodiment of the present application.
  • the first terminal device includes a camera 604.
  • the first terminal device displays a second prompt message 601, specifically "You are handling business and need to turn on the camera. Please agree to turn on the camera" in Figure 6.
  • the second terminal device also displays a control 602 for refusing to turn on the camera and a control 603 for agreeing to turn on the camera. If the user clicks the control 603 for agreeing to turn on the camera, it is equivalent to performing the second operation, and the first terminal device can determine to turn on the camera 604. If the user clicks the control 602 for refusing to turn on the camera, it is equivalent to performing the third operation, and the first terminal device can determine not to turn on the camera 604.
  • the first terminal device may generate feedback information according to the first electronic signature.
  • the first terminal device may encode the first electronic signature according to a preset encoding method to obtain the feedback message.
  • the first terminal device may generate a feedback message based on the first electronic signature and the signature video.
  • the first terminal device may also encode the first electronic signature and the signature video according to a preset encoding method to obtain the feedback message.
  • the first terminal device may send the second media resource information to the service system.
  • the second media resource information is used to indicate the second resource for the first terminal device to transmit the video, and the second resource may be used to send the feedback message.
  • the content of the second resource may refer to the content of the first resource mentioned above. In this way, the resource negotiation process between the first terminal device and the service system is completed.
  • the first terminal device sends a feedback message to the service system.
  • the service system receives the feedback message from the first terminal device.
  • the first terminal device may directly send a feedback message to the service system, or may send a feedback message to the service system through an IMS.
  • the first terminal device may determine that the license is valid, and then send a feedback message to the service system.
  • the validity of the license may be understood as the service system having the ability to legally transmit the electronic signature.
  • the first terminal device may send a feedback message to the service system through the second resource.
  • the service system may receive the feedback message through the first resource.
  • the service system may decode the feedback message based on the second resource.
  • the service system may The feedback message is decoded according to the video decoding resource indicated by the second resource to successfully obtain the first electronic signature. In this way, it is ensured that the service system can successfully decode the feedback message to obtain the first electronic signature.
  • the first terminal device may also establish a secure transmission channel with the service system based on the second resource, and the first terminal device may send a feedback message to the service system through the secure transmission channel, thereby ensuring the security of the feedback message.
  • S405 The service system determines the verification result of the first electronic signature.
  • the service system may send the first electronic signature to the business system and receive the verification result from the business system, which is equivalent to the service system determining the verification result.
  • the verification result indicates that the first electronic signature is verified successfully or that the first electronic signature is not verified successfully.
  • Verification success may indicate that the first electronic signature is verified legally.
  • Verification failure may also be referred to as verification failure, and verification failure may indicate that the first electronic signature is not verified legally.
  • the service system may also send the signed video to the service system.
  • Method 1 The business system determines the verification result based on whether the first electronic signature is a handwritten signature.
  • the business system may determine that the verification result is that the first electronic signature has passed the verification. If the business system determines that the first electronic signature is not a handwritten signature, the business system may determine that the verification result is that the first electronic signature has failed the verification.
  • the business system may extract the handwriting features of the first electronic signature and compare the handwriting features with the target features.
  • the target features indicate the features of the handwriting input by the device. If the similarity between the handwriting features and the target features is greater than or equal to the first threshold, it means that the first electronic signature is closer to the handwriting input by the device, so the business system may determine that the verification result is that the first electronic signature has passed the verification. If the similarity between the handwriting features and the target features is less than the first threshold, it means that the first electronic signature is a handwritten signature, so the business system may determine that the verification result is that the first electronic signature has passed the verification.
  • the target features and the first threshold may be pre-stored in the business system.
  • the first threshold is, for example, 0.8.
  • Method 2 The business system determines the verification result of the first electronic signature based on whether the name indicated by the first electronic signature is the user's name.
  • the business system determines that the verification result is that the first electronic signature verification fails. If the name indicated by the first electronic signature is the name of the user, the business system determines that the verification result is that the first electronic signature verification passes.
  • the user's name may be pre-configured in the business system.
  • Method three The business system combines the above methods one and two to determine the verification result of the first electronic signature.
  • the business system may determine that the verification result is that the first electronic signature has passed the verification. If the first electronic signature is not a handwritten signature, and/or the name indicated by the first electronic signature is not the name of the user, the business system determines that the verification result is that the first electronic signature has failed the verification.
  • Method 4 The business system determines the verification result of the first electronic signature based on whether the handwriting of the first electronic signature matches the handwriting of the user.
  • the handwriting of the user refers to the real handwriting of the user, and the handwriting of the user can be pre-configured in the business system.
  • the business system determines the verification result as the first electronic signature verification passed. If the handwriting of the first electronic signature does not match the handwriting of the user, the business system determines the verification result as the first electronic signature verification failed.
  • the business system may extract the handwriting features of the first electronic signature. If the similarity between the handwriting features of the first electronic signature and the user's handwriting features is greater than or equal to a second threshold, it indicates that the handwriting of the first electronic signature matches the user's handwriting. If the similarity between the handwriting features of the first electronic signature and the user's handwriting features is less than the second threshold, it indicates that the handwriting of the first electronic signature does not match the user's handwriting.
  • the user's handwriting features and the second threshold may be pre-stored in the business system. The second threshold is, for example, 0.8.
  • the above-mentioned methods 1 to 4 are examples of how the business system determines the verification result. In fact, there are many other ways for the business system to determine the verification result of the first electronic signature, and the embodiments of the present application do not specifically limit this.
  • the first terminal device may determine that the user can be identified from the signature video. If the first terminal device identifies the user from the signature video, it means that the signature video is the signature of the user, thus further ensuring the credibility of the first electronic signature. If the first terminal device determines that the user is not identified from the signature video, the first terminal device may determine that the first electronic signature verification fails.
  • the business system may encrypt the first electronic signature and the timestamp of the first electronic signature to obtain the first encrypted information.
  • the business system may also store the first encrypted information in the blockchain system.
  • the timestamp of the first electronic signature is, for example, the time when the business system receives the first electronic signature.
  • the first encrypted information is, for example, the hash calculation result of the first electronic signature and the timestamp of the first electronic signature.
  • the first encrypted information may be obtained by performing a hash calculation on the first electronic signature, the timestamp of the first electronic signature, and the signature video.
  • the first terminal device can write the first encrypted information into the blockchain system, and use blockchain technology to ensure that the first electronic signature is not tampered with, ensure the integrity of the chain of evidence, and ensure the security and reliability of the first electronic signature process.
  • the service system can directly verify the first electronic signature to obtain a verification result.
  • the service system verifies the first electronic signature and obtains the verification result in a manner that can refer to the content of the verification result determined by the business system in the foregoing text, and this embodiment of the application does not specifically limit this.
  • the service system may write the first encrypted information into the blockchain system.
  • the content of the first encrypted information may refer to the above text.
  • S406 The service system sends the verification result to the second terminal device.
  • the second terminal device receives the verification result from the service system.
  • the service system may send the verification result to the second terminal device, so that the customer service corresponding to the second terminal device can continue to handle the business for the user according to the verification result of the first electronic signature.
  • the service system can directly request an electronic signature from the user's first terminal device, and determine the verification result of the user's first electronic signature without the intervention of customer service, which can reduce the operation and workload of customer service, and can also avoid customer service tampering with the electronic signature, thereby improving the credibility of verifying the electronic signature.
  • the first terminal device sends a feedback message to the service system through the session initiation protocol, so that the feedback message is not easy to be tampered with or leaked, which is conducive to improving the credibility of the electronic signature.
  • the service system can request the first electronic signature from the first terminal device through the identifier of the first session corresponding to the call.
  • the service system can send the second request message through the first session description protocol message, without the need to use a proprietary message to send the second request message. In this way, the modification of the first session description protocol message can be reduced, which is conducive to reducing the implementation cost of electronic signature verification.
  • the service system includes a signaling server and a media server.
  • the following is an example of the interaction between the signaling server and the media server in conjunction with a flowchart of an electronic signature verification method shown in FIG7.
  • the flowchart includes the following steps.
  • the first terminal device sends a third request message to the media server.
  • the media server receives the third request message from the first terminal device.
  • the third request message is used to access the media server.
  • the third request message may also be referred to as This is the first invite message.
  • the user dials the customer service access code, and accordingly, the first terminal device can send a third request message to the media server through the session initiation protocol.
  • the customer service access code can be used to indicate the customer service telephone number.
  • the third request message can be carried in the second session description protocol message.
  • the third request message may include third media resource information.
  • the third media resource information is used to indicate a third resource.
  • the third resource is used for the first terminal device to communicate with the media server, and the third resource may be specifically used for a call between the first terminal device and the second terminal device, and the call may include a VOLTE call.
  • the third resource includes, for example, one or more of the IP address, audio port number, audio encoding resource, and audio decoding resource of the first terminal device.
  • S701 includes S701a, S701b and S701c.
  • S701a is: the first terminal device sends a third request message to the IMS.
  • the IMS receives the third request message from the first terminal device.
  • S701b is: the IMS sends a third request message to the signaling server.
  • the signaling server receives the third request message from the IMS.
  • S701c is: the signaling server sends a third request message to the media server.
  • the media server receives the third request message from the signaling server.
  • the first terminal device may send the third request message to the I-CSCF in the specific IMS.
  • the IMS may send the third request message to the service system in a transparent transmission manner.
  • the media server sends an 18* message to the first terminal device.
  • the 18* message indicates that the media server is in a ringing state.
  • S702 includes S702a, S702b and S702c.
  • S702a is: the media server sends an 18* message to the signaling server.
  • the signaling server receives the 18* message from the media server.
  • S702b is: the signaling server sends an 18* message to the IMS.
  • the IMS receives the 18* message from the signaling server.
  • S702c is: the IMS sends an 18* message to the first terminal device.
  • the first terminal device receives the 18* message from the IMS.
  • the IMS may send an 18* message to the first terminal device in a transparent transmission manner.
  • the 18* message further includes fourth media resource information, and the fourth media resource information indicates a fourth resource.
  • the fourth resource is used for the media server to communicate with the first terminal device, for example, the fourth resource can be specifically used for the media server to talk with the first terminal device.
  • the content of the fourth resource can refer to the content of the third resource in the above text.
  • the fourth media resource information can be carried in the third session description protocol message.
  • the media server sends a first response message to the first terminal device.
  • the first terminal device receives the first response message from the media server.
  • the first response message indicates that the media server determines to establish communication with the first terminal device.
  • S703 includes S703a, S703b and S703c.
  • S703a is: the media server sends a first response message to the signaling server.
  • the signaling server receives the first response message from the media server.
  • S703b is: the signaling server sends a first response message to the IMS.
  • the signaling server receives the first response message from the IMS.
  • S703c is: the IMS sends a first response message to the first terminal device.
  • the first terminal device receives the first response message from the IMS.
  • the media server sends an audio stream to the first terminal device.
  • the audio stream is, for example, an IVR.
  • the audio stream can be used as a self-service audio stream to assist user operations.
  • the audio stream can be pre-stored in a media server.
  • S704 includes S704a, S704b and S704c.
  • S704a is: the media server sends an audio stream to the signaling server.
  • the signaling server receives the audio stream from the media server.
  • S704b is: the signaling server sends an audio stream to the IMS.
  • the signaling server receives the audio stream from the IMS.
  • S704c is: the IMS The audio stream is sent to the first terminal device.
  • the first terminal device receives the audio stream from the IMS.
  • the media server sends a fourth request message to the second terminal device.
  • the second terminal device receives the fourth request message from the media server.
  • the fourth request message requests the second terminal device to establish a call with the first terminal device.
  • the first terminal device may send a media stream to the media server.
  • the first terminal device may send a media stream to the media server via RTP.
  • the media stream is used to indicate that the user requests to transfer to manual.
  • the media server After the media server receives the media stream from the first terminal device, it determines that the user requests to transfer to manual. Therefore, the media server can assign a customer service to the user and send a fourth request message to the terminal device corresponding to the customer service (taking the second terminal device as an example in the embodiment of the present application).
  • the fourth request message may also be referred to as a second invitation message.
  • the fourth request message further includes fifth media resource information.
  • the fifth media resource information indicates a fifth resource.
  • the fifth resource is used for communication between the media server and the second terminal device, for example, the fifth resource is specifically used for a call between the media server and the second terminal device.
  • the second terminal device sends a second response message to the media server.
  • the media server receives the second response message from the second terminal device.
  • the second response message is used to request to establish communication with the first terminal device.
  • the media server sends a fifth request message to the first terminal device.
  • the first terminal device receives the fifth request message from the media server.
  • the fifth request message indicates a request for re-negotiation with the first terminal device.
  • S707 includes S707a, S707b and S707c.
  • S707a is: the media server sends a fifth request message to the signaling server.
  • the signaling server receives the fifth request message from the media server.
  • S707b is: the signaling server sends a fifth request message to the IMS.
  • the IMS receives the fifth request message from the signaling server.
  • S707c is: the IMS sends a fifth request message to the first terminal device.
  • the first terminal device receives the fifth request message from the IMS.
  • the fifth request message includes sixth media resource information.
  • the sixth media resource information indicates a sixth resource.
  • the sixth resource is used to establish communication with the first terminal device, for example, to establish a call with the first terminal device.
  • the sixth resource is the same as or different from the fourth resource in the foregoing text.
  • the first terminal device sends a third response message to the media server.
  • the media server receives the third response message from the first terminal device.
  • S708 includes S708a, S708b and S708c.
  • S708a is: the first terminal device sends a third response message to the IMS.
  • the IMS receives the third response message from the first terminal device.
  • S708b is: the IMS sends a third response message to the signaling server.
  • the signaling server receives the third response message from the IMS.
  • S708c is: the signaling server sends a third response message to the media server.
  • the media server receives the third response message from the signaling server.
  • the third response message includes seventh media resource information.
  • the seventh media resource information indicates a seventh resource.
  • the seventh resource is used to establish communication with the second terminal device, for example, to establish a call with the second terminal device.
  • the seventh resource may be the same as or different from the third resource.
  • the media server sends a re-negotiation request to the second terminal device.
  • the second terminal device receives the re-negotiation request from the media server.
  • the re-negotiation request is used to renegotiate resources with the second terminal device.
  • the re-negotiation request may include the seventh media resource information of the first terminal device.
  • the re-negotiation request may include sixth media resource information of the media server.
  • S701 - S709 are optional steps, which are indicated by dotted lines in FIG. 7 .
  • S710 The second terminal device sends a first request message to the media server.
  • the media server receives the first request message from the second terminal device.
  • the meaning of the first request message can be found in the above text.
  • the first request message includes eighth media resource information of the second terminal device.
  • the eighth media resource information indicates an eighth resource.
  • the eighth resource is used to establish communication with the first terminal device, and can be specifically used to establish a call with the first terminal device.
  • the media server sends a second request message to the first terminal device.
  • the first terminal device receives the second request message from the media server.
  • the meaning of the second request message can be found in the above text.
  • the first terminal device obtains a feedback message according to the first electronic signature.
  • the meaning of the first electronic signature, the meaning of the feedback message, the way in which the terminal device obtains the first electronic signature, and the way in which the terminal device obtains the feedback message can be referred to the previous text.
  • the first terminal device sends a feedback message to the media server.
  • the media server receives the feedback message from the first terminal device.
  • the meaning of the feedback message can be found in the above text.
  • S713 includes S713a and S713b.
  • S713a is: the first terminal device sends a feedback message to the IMS.
  • the IMS receives the feedback message from the first terminal device.
  • S713b is: the IMS sends a feedback message to the media server.
  • the media server receives the feedback message from the IMS.
  • S714 The media server sends the first electronic signature to the business system.
  • the business system receives the first electronic signature from the media server.
  • the business system verifies the first electronic signature and obtains a verification result.
  • the business system may encrypt the first electronic signature and the timestamp of the first electronic signature to obtain the first encrypted information.
  • the business system may also store the first encrypted information in the blockchain system.
  • the timestamp of the first electronic signature is, for example, the time when the business system receives the first electronic signature.
  • the first encrypted information is, for example, a hash calculation result of the first electronic signature and the timestamp of the first electronic signature.
  • the first encrypted information may be a hash calculation result of the first electronic signature, the timestamp of the first electronic signature, and the signed video.
  • S716 The business system sends the verification result to the media server.
  • the media server receives the verification result from the business system.
  • the media server sends a verification result to the second terminal device.
  • the second terminal device receives the verification result from the media server.
  • the media server may switch the call with the first terminal device to an automatic audio/video call phase and continue with the next business process processing.
  • S717 is an optional step, which is indicated by a dotted line in FIG. 7 .
  • the first terminal device can send a feedback message to the media server based on the session channel established with the second terminal device. This can be done without relying on the application in the first terminal device or establishing a separate media channel for transmitting the electronic signature.
  • the process of verifying the electronic signature can be implemented during a call.
  • the first terminal device can transmit the feedback message via the session initiation protocol to ensure the security and reliability of the feedback message.
  • the first terminal device can directly communicate with the media server when a call is established between the first terminal device and the second terminal device. The media server directly initiates a signature invitation to the first terminal device, so that the user can seamlessly complete the signature process during a call, thereby improving the user experience.
  • the present application embodiment provides a communication device.
  • FIG8 is a schematic diagram of the structure of a communication device provided in the present application embodiment.
  • the communication device 800 includes a processing module 801 and a transceiver module 802 .
  • the communication device 800 may be used to implement the functions of a service system, such as the functions of the service system in FIG. 4 or FIG. 7 .
  • the communication device 800 is used to implement the function of the service system in Figure 4. Accordingly, the transceiver module 802 can be used to execute steps S402 and S404, and the processing module 801 can be used to execute step S405.
  • the communication device 800 is used to implement the function of the service system in Figure 7. Accordingly, the transceiver module 802 can be used to execute steps S710, S711 and S713a, and the processing module 801 can be used to execute step S715.
  • the communication apparatus 800 may be used to implement the function of a first terminal device, such as the function of the first terminal device in FIG. 4 or FIG. 7 .
  • the communication device 800 is used to implement the function of the first terminal device in Figure 4. Accordingly, the transceiver module 802 can be used to execute steps S402 and S404, and the processing module 801 can be used to execute step S403.
  • the communication device 800 is used to implement the function of the first terminal device in Figure 7. Accordingly, the transceiver module 802 can be used to execute steps S711 and S713a, and the processing module 801 can be used to execute step S712.
  • the communication apparatus 800 may be used to implement the function of a second terminal device, such as the function of the second terminal device in FIG. 4 or FIG. 7 .
  • the communication device 800 is used to implement the function of the second terminal device in Figure 4. Accordingly, the transceiver module 802 can be used to perform steps S401 and S406 under the control of the processing module 801.
  • the communication device 800 is used to implement the function of the second terminal device in Figure 7. Accordingly, the transceiver module 802 may execute step S710 under the control of the processing module 801.
  • the communication device 800 may be used to implement the functions of a business system, such as the functions of the business system in FIG. 4 or 7 .
  • the communication device 800 is used to implement the functions of the business system in Figure 7. Accordingly, the transceiver module 802 can be used to execute steps S714 and S716, and the processing module 801 can be used to execute step S715.
  • the present application provides a communication device.
  • FIG9 is a schematic diagram of the structure of a communication device provided in the present application.
  • the communication device 900 includes a processor 901 and a communication interface 902.
  • the processor 901 and the communication interface 902 are coupled to each other. It is understood that the communication interface 902 may be a transceiver or an input/output interface.
  • the processor 901 and the communication interface 902 may be used to implement any of the electronic signature verification methods described above, such as any of the electronic signature verification methods described in FIG4 or FIG7 .
  • the processor 901 may be a central processing unit (CPU), other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA), other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.
  • CPU central processing unit
  • DSP digital signal processors
  • ASIC application-specific integrated circuits
  • FPGA field programmable gate arrays
  • a general-purpose processor may be a microprocessor or any conventional processor.
  • the communication device 900 may further include a memory 903 for storing instructions executed by the processor 901 or storing input data required by the processor 901 to execute instructions or storing data generated after the processor 901 executes instructions.
  • the memory 903 is indicated as an optional module by a dotted box.
  • the present invention provides a communication system, which includes a first terminal device, a second terminal device and a server.
  • the communication system can be used to implement any of the electronic signature verification methods described above.
  • the functions of the first terminal device, the second terminal device and the service system can refer to the contents discussed above.
  • the communication system also includes any of the blockchain systems discussed above.
  • the embodiment of the present application provides a communication system, which includes a first terminal device, a second terminal device, a business system and a service system.
  • the communication system can be used to implement any of the electronic signature verification methods described above.
  • the functions of the first terminal device, the second terminal device, the business system and the service system can all refer to the contents discussed above.
  • the communication system also includes any of the blockchain systems discussed above.
  • the embodiment of the present application provides a chip system, which includes: a processor and an interface.
  • the processor is used to call and run instructions from the interface, and when the processor executes the instructions, any of the electronic signature verification methods described above is implemented, such as the electronic signature verification method described in any of FIG. 4 or FIG. 7.
  • An embodiment of the present application provides a computer-readable storage medium, which is used to store computer programs or instructions.
  • the computer-readable storage medium When executed, it implements any of the electronic signature verification methods described above, such as any of the electronic signature verification methods described in Figure 4 or Figure 7.
  • An embodiment of the present application provides a computer program product including instructions, which, when executed on a computer, implements any of the electronic signature verification methods described above, such as the electronic signature verification method described in any of FIG. 4 or FIG. 7 .
  • the method steps in the embodiments of the present application can be implemented by hardware, or by a processor executing software instructions.
  • the software instructions can be composed of corresponding software modules, and the software modules can be stored in a random access memory, a flash memory, a read-only memory, a programmable read-only memory, an erasable programmable read-only memory, an electrically erasable programmable read-only memory, a register, a hard disk, a mobile hard disk, a CD-ROM, or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor so that the processor can read information from the storage medium and write information to the storage medium.
  • the storage medium can also be a component of the processor.
  • the processor and the storage medium can be located in an ASIC.
  • the ASIC can be located in a base station or a terminal.
  • the processor and the storage medium can also be present in a base station or a terminal as discrete components.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, a network device, a user device or other programmable device.
  • the computer program or instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program or instruction may be transmitted from one website site, computer, server or data center to another website site, computer, server or data center by wired or wireless means.
  • the computer-readable storage medium may be any available medium that a computer can access or a data storage device such as a server, data center, etc. that integrates one or more available media.
  • the available medium may be a magnetic medium, for example, a floppy disk, a hard disk, a tape; it may also be an optical medium, for example, a digital video disc; it may also be a semiconductor medium, for example, a solid-state hard disk.
  • the computer-readable storage medium may be a volatile or nonvolatile storage medium, or may include both volatile and nonvolatile types of storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种电子签名验证方法及装置,涉及通信技术领域。所述方法包括:接收第一请求消息,所述第一请求消息用于请求电子签名;向第一终端设备发送第二请求消息,所述第二请求消息用于请求第一终端设备对应的电子签名;接收来自所述第一终端设备的反馈消息,所述反馈消息指示第一电子签名;确定所述第一电子签名的验证结果。如此,无需客服介入验证电子签名过程,提高电子签名验证的可信度。

Description

一种电子签名验证方法及装置
相关申请的交叉引用
本申请要求在2022年11月23日提交中国专利局、申请号为202211470727.7、申请名称为“一种电子签名验证方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种电子签名验证方法及装置。
背景技术
随着高清语音(voice over long term evolution,VOLTE)的普及,逐渐出现了通过高清语音办理在线业务。高清语音可称为高清通话或长期演进语音承载。办理在线业务中验证用户的电子签名是个难点。
目前,验证用户的电子签名的方式为:用户的终端设备向客服的终端设备发送电子签名,客服人工验证该电子签名。但这种方式中,客服需手动处理,客服可能会篡改电子签名,导致电子签名的验证结果的可信度不高。
发明内容
本申请实施例提供一种电子签名验证方法及装置,用于提高电子签名的验证结果的可信度。
第一方面,本申请实施例提供一种电子签名验证方法。该方法可由服务***执行,或者可以由具有服务***的功能的设备执行,服务***例如可通过一个或多个计算设备实现,计算设备例如服务器。为了便于描述,下文以服务***执行该电子签名验证方法为例进行说明。所述方法包括:所述服务***接收第一请求消息,所述第一请求消息用于请求第一终端设备对应的电子签名;向所述第一终端设备发送第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名;接收来自所述第一终端设备反馈消息,所述反馈消息指示第一电子签名;确定所述第一电子签名的验证结果。可选的,所述验证结果可指示所述第一电子签名验证通过,或者验证结果指示所述第一电子签名验证不通过。
本申请实施例中,服务***可直接邀请用户进行电子签名,从用户对应的终端设备(如第一终端设备)获取所述用户的电子签名(如第一电子签名),并确定所述第一电子签名的验证结果。如此,无需客服介入,减少客服的操作和工作量,也可避免客服篡改签名等情况,提高电子签名的验证结果的可信度。
在一种可能的实施方式中,所述第一请求消息指示所述第一终端设备。
在上述实施方式中,服务***可基于第一请求消息,确定第一终端设备,以便于服务***与第一终端设备通信。
在一种可能的实施方式中,所述第一请求消息是从第二终端设备接收的,其中,所述第一请求消息包括第一会话的标识,所述第一会话指示所述第一终端设备与所述第二终端 设备建立的通话通道;向所述第一终端设备发送第二请求消息,包括:基于所述通话通道,向所述第一终端设备发送所述第二请求消息。
在上述实施方式中,第二终端设备可在与第一终端设备建立通话的过程中,触发服务***获取用户的电子签名,无需用户触发服务***,有利于减少用户操作。并且,服务***可直接基于第二终端设备与第一终端设备建立的通话通道,与第一终端设备交互,以获取电子签名,对于用户而言,相当于是在一次通话过程中完成了输入电子签名的过程,有利于减少用户的操作,提升用户体验。并且,采用通话通道传输指示电子签名的反馈消息,在一定程度上可以保证反馈消息的传输安全性。
在一种可能的实施方式中,所述第二请求消息包括电子签名能力的标识,所述电子签名能力的标识指示所述服务***具有传输电子签名的能力。可选的,电子签名能力的标识用于请求获取所述用户的电子签名。
在上述实施方式中,第二请求消息可指示服务***的电子签名能力的标识,使得第一终端设备可确定服务***的能力,从而保证服务***后续可顺利获得第一电子签名。
在一种可能的实施方式中,所述第二请求消息携带在会话描述协议消息中,所述电子签名功能的标识承载在所述会话描述协议消息的第一字段中。可选的,所述第一字段为所述会话描述协议消息的头部中的字段,或者为所述会话描述协议消息的正文中的字段。
在上述实施方式中,第二请求消息可携带在会话描述协议消息中,而无需通过专有的消息发送第二请求消息,减少第一终端设备与服务***之间的交互。并且,服务***可复用会话描述协议消息中的第一字段承载电子签名功能的标识,无需在会话描述协议消息新增字段,减少对会话描述协议消息的更改。
在一种可能的实施方式中,所述第二请求消息包括所述服务***的第一媒体资源信息,所述第一媒体资源信息指示所述服务***用于传输视频的第一资源;所述方法还包括:接收来自所述第一终端设备的第二媒体资源信息,所述第二媒体资源信息指示所述第一终端设备用于传输视频的第二资源;接收来自所述第一终端设备反馈消息,包括:通过所述第一资源接收所述反馈消息;根据所述第二资源,解码所述反馈消息,获得所述第一电子签名,所述第一电子签名的形式为图像或视频。
在上述实施方式中,服务***和第一终端设备之间可协商传输视频的资源,如此,第一终端设备可传输包括图像或视频形式的第一电子签名,丰富电子签名的内容。并且,服务***和第一终端设备协商资源,使得服务***可以顺利解码获得第一电子签名。
在一种可能的实施方式中,所述反馈消息还包括签名视频,所述签名视频指示输入所述第一电子签名的过程。
在上述实施方式中,第一终端设备还可以向服务***发送用户输入第一电子签名过程中的视频,丰富反馈消息的内容。并且,服务***还可验证签名视频的真实性,进一步保证了验证的可信度。
在一种可能的实施方式中,所述方法还包括:向所述第二终端设备发送所述验证结果。
在上述实施方式中,在第二终端设备触发服务***获取电子签名的情况下,服务***在确定第一电子签名的验证结果之后,可向服务***发送第一电子签名的验证结果,使得第二终端设备对应的客服,可根据验证结果为用户办理业务。
在一种可能的实施方式中,确定所述第一电子签名的验证结果,包括:向业务***发送所述第一电子签名,以及接收来自所述业务***的所述验证结果。
在上述实施方式中,服务***可从业务***接收验证结果,使得服务***确定验证结果的方式简单且直接。
在一种可能的实施方式中,所述方法还包括:对所述第一电子签名、以及所述第一电子签名的时间戳进行加密处理,获得第一加密信息;将所述第一加密信息存储到区块链***中。
在上述实施方式中,可对电子签名以及时间戳等进行加密保存,以保证第一电子签名的不可篡改性。
第二方面,本申请实施例提供一种电子签名验证方法。该方法可由第一终端设备执行,或者可以由具有第一终端设备的功能的芯片***执行。为便于描述,下文以第一终端设备执行该电子签名验证方法为例进行介绍。所述方法包括:接收来自服务***的第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名;接收用户输入的第一电子签名;向所述服务***发送反馈消息,所述反馈消息指示所述第一电子签名。
在一种可能的实施方式中,接收来自服务***的第二请求消息,包括:基于会话通道,接收来自服务***的所述第二请求消息,所述会话通道为所述第一终端设备与第二终端设备建立的通话通道。
在一种可能的实施方式中,所述第二请求消息包括电子签名功能的标识,所述电子签名功能的标识指示所述服务***具有传输电子签名的能力。
在一种可能的实施方式中,所述第二请求消息携带在会话描述协议消息中,所述电子签名功能的标识承载在所述会话描述协议消息的第一字段中。可选的,所述第一字段为所述会话描述协议消息的头部中的字段,或者为所述会话描述协议消息的正文中的字段。
在一种可能的实施方式中,所述方法还包括:显示签名框,所述签名框指示所述用户进行签名;通过所述签名框,获取所述用户输入的所述第一电子签名。
在上述实施方式中,第一终端设备可显示签名框,便于用户输入第一电子签名,也便于第一终端设备获取用户输入的第一电子签名。
在一种可能的实施方式中,所述方法还包括:向所述服务***发送所述第一终端设备的第二媒体资源信息,所述第二媒体资源信息指示所述第一终端设备用于传输视频的第二资源;基于所述第二资源,对所述第一电子签名进行编码,获得所述反馈消息,所述第一电子签名的形式为图像或视频,其中,所述反馈消息是通过所述第二资源向所述服务***发送的。
在一种可能的实施方式中,所述方法还包括:获取开启所述第一终端设备的摄像头的权限;开启所述摄像头,并通过所述摄像头采集签名视频,其中,所述签名视频指示所述用户输入所述第一电子签名的过程,所述反馈消息还指示所述签名视频。
在上述实施方式中,第一终端设备还可获取开启摄像头的权限,通过摄像头采集用户输入电子签名过程中的签名视频,保证获取签名视频的过程是合法的。
第三方面,本申请实施例提供一种电子签名验证方法,所述方法可由第二终端设备执行,或者可以由具有第二终端设备的功能的芯片***执行。为便于描述,下文以第二终端设备执行该电子签名验证方法为例进行介绍。所述方法包括:向服务***发送第一请求消息,所述第一请求消息用于请求第一终端设备对应的电子签名;接收来自所述服务***的验证结果。
在一种可能的实施方式中,所述第一请求消息指示所述第一终端设备。
在一种可能的实施方式中,所述第一请求消息包括第一会话的标识,所述第一会话指示所述第一终端设备与所述第二终端设备建立的通话通道,所述第一会话的标识用于确定所述第一终端设备。
第四方面,本申请实施例提供一种电子签名验证方法,所述方法可由业务***执行,或者可以由具有业务***的功能的芯片***执行。业务***可通过一个或多个计算设备实现,计算设备例如为服务器。所述方法包括:接收来自服务***的第一电子签名;对所述第一电子签名进行验证,获得验证结果。
在一种可能的实施方式中,所述方法还包括:对所述第一电子签名、以及所述第一电子签名的时间戳进行加密处理,获得第一加密信息,以及将所述第一加密信息存储到区块链***中。
第五方面,本申请实施例提供一种通信装置,该通信装置可以为上述第一方面中的服务***,或者为配置在服务***中的电子设备(例如,芯片***)。该通信装置包括用于执行上述第一方面或任一可能的实施方式的相应的手段(means)或模块。例如,该通信装置包括处理模块(有时也称为处理单元)和收发模块(有时也称为收发单元)。
例如,所述收发模块,用于接收第一请求消息,所述第一请求消息用于请求所述通信装置对应的电子签名,向所述第一终端设备发送第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名,以及接收来自所述第一终端设备反馈消息,所述反馈消息指示第一电子签名;所述处理模块,用于确定所述第一电子签名的验证结果。
在一种可能的实施方式中,该通信装置包括存储模块(有时也称为存储单元),该处理模块能够与存储模块耦合,并执行存储模块中的程序或指令,使能该通信装置执行上述第五方面中的服务***的功能。
第六方面,本申请实施例提供一种通信装置,该通信装置可以为上述第二方面中的第一终端设备,或者为配置在第一终端设备中的电子设备(例如,芯片***)。该通信装置包括用于执行上述第二方面或任一可能的实施方式的相应的手段(means)或模块。例如,该通信装置包括处理模块(有时也称为处理单元)和收发模块(有时也称为收发单元)。
例如,所述收发模块,用于在处理模块的控制下,接收来自服务***的第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名,接收用户输入的第一电子签名,以及向所述服务***发送反馈消息,所述反馈消息指示第一电子签名。
在一种可能的实施方式中,该通信装置包括存储模块(有时也称为存储单元),该处理模块能够与存储模块耦合,并执行存储模块中的程序或指令,使能该通信装置执行上述第五方面中的第一终端设备的功能。
第七方面,本申请实施例提供一种通信装置,该通信装置可以为上述第三方面中的第二终端设备,或者为配置在第二终端设备中的电子设备(例如,芯片***)。该通信装置包括用于执行上述第三方面或任一可能的实施方式的相应的手段(means)或模块。例如,该通信装置包括处理模块(有时也称为处理单元)和收发模块(有时也称为收发单元)。
例如,所述收发模块,用于在处理模块的控制下,向服务***发送第一请求消息,所述第一请求消息用于第一终端设备对应的电子签名;所述收发模块,还用于在所述处理模块的控制下,接收来自所述服务***的验证结果。
在一种可能的实施方式中,该通信装置包括存储模块(有时也称为存储单元),该处理模块能够与存储模块耦合,并执行存储模块中的程序或指令,使能该通信装置执行上述 第五方面中的第二终端设备的功能。
第八方面,本申请实施例提供一种通信装置,该通信装置可以为上述第四方面中的业务***,或者为配置在业务***中的电子设备(例如,芯片***)。该通信装置包括用于执行上述第四方面或任一可能的实施方式的相应的手段(means)或模块。例如,该通信装置包括处理模块(有时也称为处理单元)和收发模块(有时也称为收发单元)。
例如,所述收发模块,用于接收来自服务***的第一电子签名;所述处理模块,用于对所述第一电子签名进行验证,获得验证结果;所述收发模块,还用于向所述服务***发送所述验证结果。
在一种可能的实施方式中,该通信装置包括存储模块(有时也称为存储单元),该处理模块能够与存储模块耦合,并执行存储模块中的程序或指令,使能该通信装置执行上述第五方面中的服务***的功能。
第九方面,本申请实施例提供一种通信***,所述通信***包括第五方面至第七方面中所述的通信装置。
第十方面,本申请实施例提供一种通信***,所述通信***包括第五方面至第八方面中所述的通信装置。
第十一方面,本申请实施例提供一种通信装置,包括:处理器和存储器;所述存储器用于存储一个或多个计算机程序,所述一个或多个计算机程序包括计算机执行指令,当所述通信装置运行时,所述处理器执行所述存储器存储的所述一个或多个计算机程序,以使得所述通信装置执行如第一方面至第四方面中任一项所述的方法。
可选的,该通信装置还包括其他部件,例如,天线,输入输出模块,接口等等。这些部件可以是硬件,软件,或者软件和硬件的结合。
第十二方面,本申请实施例提供一种芯片***,该芯片***包括:处理器和接口。其中,该处理器用于从该接口调用并运行指令,当该处理器执行该指令时,实现上述第一方面至第四方面中任一项所述的方法。
第十三方面,提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序或指令,当其被运行时,实现上述第一方面至第四方面中任一项所述的方法。
第十四方面,提供一种包含指令的计算机程序产品,当其在计算机上运行时,实现上述第一方面至第四方面中任一项所述的方法。
关于第二方面至第十四方面的有益效果,可参照第一方面论述的有益效果,此处不再列举。
附图说明
图1A为本申请实施例适用的一种场景的示意图;
图1B为本申请实施例适用的另一种场景的示意图;
图2A为本申请实施例适用的再一种场景的示意图;
图2B为本申请实施例适用的又一种场景的示意图;
图3为本申请实施例适用的又一种场景的示意图;
图4为本申请实施例提供的一种电子签名验证方法的流程示意图;
图5为本申请实施例提供的一种输入电子签名过程中第一终端设备的界面变化示意图;
图6为本申请实施例提供的一种第一终端设备的界面示意图;
图7为本申请实施例提供的又一种电子签名验证方法的流程示意图;
图8为本申请实施例提供的一种通信装置的结构示意图;
图9为本申请实施例提供的另一种通信装置的结构示意图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。
以下,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
1、终端设备,是一种具有无线收发功能的设备,可以是固定设备,移动设备、手持设备、穿戴设备、车载设备,或内置于上述设备中的无线装置(例如,通信模块或芯片***等)。所述终端设备用于连接人,物,机器等,可广泛用于各种场景,例如包括但不限于以下场景:蜂窝通信、设备到设备通信(device-to-device,D2D)、车到一切(vehicle to everything,V2X)、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)、物联网(internet of things,IoT)、虚拟现实(virtual reality,VR)、增强现实(augmented reality,AR)、工业控制(industrial control)、无人驾驶(self driving)、远程医疗(remote medical)、智能电网(smart grid)、智能家具、智能办公、智能穿戴、智能交通,智慧城市(smart city)、无人机、机器人等场景的终端设备。所述终端设备有时可称为用户设备(user equipment,UE)、终端、接入站、UE站、远方站、无线通信设备、或用户装置等。
2、网络设备,例如包括接入网设备(或,称为接入网网元),和/或核心网设备(或,称为核心网网元)。
接入网设备,为具有无线收发功能的设备,用于与所述终端设备进行通信。所述接入网设备包括但不限于上述通信***中的基站(BTS,Node B,eNodeB/eNB,或gNodeB/gNB)、收发点(t(R)ANsmission reception point,TRP),3GPP后续演进的基站,无线保真(wireless fidelity,WiFi)***中的接入节点,无线中继节点,无线回传节点等。所述基站可以是:宏基站,微基站,微微基站,小站,中继站等。多个基站可以支持上述提及的同一种接入技术的网络,也可以支持上述提及的不同接入技术的网络。基站可以包含一个或多个共站或非共站的传输接收点。网络设备还可以是云无线接入网络(cloud radio access network,C(R)AN)场景下的无线控制器、集中单元(centralized unit,CU),又可以称为汇聚单元,和/或分布单元(distributed unit,DU)。网络设备还可以是服务器,可穿戴设备,或车载设备等。例如,车到一切(vehicle to everything,V2X)技术中的网络设备可以为路侧单元(road side unit,RSU)。以下对接入网设备以为基站为例进行说明。所述通信***中的多个网络设备可以为同一类型的基站,也可以为不同类型的基站。基站可以与终端设备进行通信,也可以通过中继站与终端设备进行通信。终端设备可以与不同接入技术中的多个基站进行通信。
所述核心网设备用于实现移动管理,数据处理,会话管理,策略和计费等功能中的至少一项。不同接入技术的***中实现核心网功能的设备名称可以不同,本申请实施例并不对此进行限定。以5G***为例,所述核心网设备包括:接入和移动管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、PCF或用户面功能(user plane function,UPF)等。
3、电子签名,数据电文中以电子形式所含、所附用于识别签名人身份并表明签名人认可其中内容的数据。电子签名例如签名图像。
4、计算设备,是指具有处理能力的设备。计算设备例如为服务器或终端设备。
5、应用,提供某种服务的软件模块,可运行在终端设备中,应用的形式例如为预装在终端设备的应用(application,APP)程序、小程序或网页等。
本申请实施例中,对于名词的数目,除非特别说明,表示“单数名词或复数名词”,即"一个或多个”。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。例如,A/B,表示:A或B。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),表示:a,b,c,a和b,a和c,b和c,或a和b和c,其中a,b,c可以是单个,也可以是多个。
请参照图1A,为本申请实施例适用的一种场景的示意图。或者,图1A也可理解为一种通信***(也可以称为电子签名验证***)的架构示意图。如图1A所示,该场景包括第一终端设备和服务***。第一终端设备的实现方式可参照前文。服务***可通过一个或多个计算设备实现。
第一终端设备可与用户对应,换言之,用户可对第一终端设备进行操作。可选的,第一终端设备可运行有第一应用,第一应用例如为服务类应用或社交类应用。
第一终端设备可与服务***通信。示例性的,第一终端设备可向服务***发送反馈消息。反馈消息指示第一电子签名。相应的,服务***可接收来自第一终端设备的反馈消息。服务***可验证第一电子签名。其中,反馈消息的内容、以及验证第一电子签名的具体过程将在下文论述。
在一种可能的实施方式中,图1A所示的场景还包括区块链***。区块链***可与服务***进行通信。
示例性的,区块链***可包括多个区块链节点。区块链节点生成一个区块后,广播该区块,其他区块链节点收到该区块后对区块进行区块验证,验证通过后更新本地的区块链。服务***可对第一电子签名进行加密处理,并将加密处理的结果写入区块链***。
请参照图1B,为本申请实施例适用的另一种场景的示意图。或者,图1B也可理解为一种通信***(也可以称为电子签名验证***)的架构示意图。如图1B所示,该场景包括第一终端设备、服务***和业务***。与图1A不同的,图1B还包括业务***。业务***可通过一个或多个计算设备实现。其中,第一终端设备的内容可参照前文图1A论述的内容。
第一终端设备可与服务***通信。示例性的,第一终端设备可向服务***发送反馈消息。反馈消息指示第一电子签名。相应的,服务***可接收来自第一终端设备的反馈消息。服务***可确定第一电子签名的验证结果。其中,反馈消息的内容、以及确定第一电子签名的验证结果的具体过程将在下文论述。
服务***可与业务***通信。示例性的,服务***可将第一电子签名发送给业务***,业务***可对第一电子签名进行验证。
在一种可能的实施方式中,图1B所示的场景还包括区块链***。区块链***可与业 务***进行通信。
示例性的,区块链***可包括多个区块链节点。区块链节点生成一个区块后,广播该区块,其他区块链节点收到该区块后对区块进行区块验证,验证通过后更新本地的区块链。业务***可对第一电子签名进行加密处理,并将加密处理的结果写入区块链***。
在图1B中以第一终端设备的数量为1进行示例,实际不限制第一终端设备的数量。
请参照图2A,为本申请实施例适用的再一种场景的示意图。或者,图2A也可理解为一种通信***的架构示意图。如图2A所示,该场景包括第一终端设备、服务***和第二终端设备。与图1A不同的,图2A还包括第二终端设备。第一终端设备、服务***和业务***的实现方式可参照图1A的内容。
示例性的,第二终端设备可与客服(或座席)对应,换言之,客服可对第二终端设备进行操作。可选的,第二终端设备可运行有第二应用。第二应用可为服务***对应的应用,换言之,服务***可为第二应用提供后台支持。第二应用例如为服务类应用。
第二终端设备可与第一终端设备通信,例如,第二终端设备可与第一终端设备建立通话。第二终端设备也可与服务***相互通信。示例性的,第二终端设备向服务***发送请求消息。相应的,服务***可接收来自第一终端设备的请求消息,并处理该请求消息。
由于图2A中的服务***可为客服对应的第二终端设备提供服务,或者为第二终端设备中的第二应用提供服务,因此图2A中的服务***也可称为客服***或客服平台。
请参照图2B,为本申请实施例适用的又一种场景的示意图。或者,图2B也可理解为一种通信***的架构示意图。如图2B所示,该场景包括第一终端设备、服务***、业务***和第二终端设备。图2B中的服务***也可称为客服***或客服平台。与图2A不同的,图2B还包括业务***。业务***的实现方式可参照图1B的内容。
示例性的,第二终端设备可与客服(或座席)对应,换言之,客服可对第二终端设备进行操作。可选的,第二终端设备可运行有第二应用。第二应用可为业务***对应的应用,换言之,业务***可为第二应用提供后台支持。第二应用例如为服务类应用。
第二终端设备可与第一终端设备通信,例如,第二终端设备可与第一终端设备建立通话。第二终端设备也可通过服务***与业务***相互通信。
请参照图3,为本申请实施例适用的又一种场景的示意图。或者,图3也可理解为一种通信***的架构示意图。或者,图3也可理解为图2B中的通信***包括的各个设备的部署示意图。如图3所示,该场景包括第一终端设备、接入网设备、网际协议多媒体子***(internet protocol multimedia subsystem,IMS)(也可称为IMS域)、服务***、业务***和第二终端设备。第一终端设备、接入网设备和第二终端设备的实现方式可参照前文。
在一种可能的实施方式中,第一终端设备也可运行有第一应用,第一应用的内容可参照前文。第二终端设备也可运行有第二应用,第二应用的内容可参照前文。
在一种可能的实施方式中,IMS可包括分组核心网(evolved packet core,EPC)、第五代核心网(5th generation core,5GC)和IMS核心(core)网。
示例性的,EPC或5GC可通过接入网设备(如第一接入网设备或第二接入网设备)与第一终端设备通信。EPC可与IMS核心网通信。第一接入网设备例如可为4G基站,第二接入网设备例如可为5G基站。IMS核心网可与服务***进行通信,IMS核心网也可与EPC通信。
可选的,EPC包括服务/数据分组网关(serving/packet data network gateway,S/PDN-GW 或S/P-GW)。S/P-GW为EPC中的核心设备。S/P-GW用于实现网关逻辑实体提供的功能,网关逻辑实体包括服务网关和PDN。服务网关面向无线接入网中的设备,进行业务面数据的传输。无线接入网中的设备包括第一接入网设备和第二接入网设备。PDN面向其它数据网络,实现与多个公共数据网的访问交互,PDN例如可以是演进的分组***(evolved packet system,EPS)中的锚点。
可选的,5GC包括各种网元,例如用户面功能(user plane function,UPF)和接入和移动性管理功能(access and mobility management function,AMF)等。
示例性的,UPF负责用户面功能,分组路由转发,策略实施,流量报告,以及服务质量(quality of service,QoS)处理。AMF负责接入和移动性管理功能,执行注册、连接、可达性、移动性管理、以及为第一终端设备和会话管理功能(session management function,SMF)提供会话管理消息传输通道,为用户接入时提供认证、鉴权功能,终端和无线的核心网控制面接入点。
可选的,IMS核心网包括呼叫会话控制功能(interrogating-call session control function,I-CSCF)、服务呼叫会话控制功能(serving-call session control function,S-CSCF)、会话边界控制器(session border controller,SBC)和代理-呼叫会话控制功能(proxy-call session control functions,P-CSCF)等。其中,I-CSCF和S-CSCF可简写表示为I/S-CSCF。
I-CSCF为IMS网络的统一初步入口点,负责用户注册的S-CSCF的指配和查询。S-CSCF为IMS核心网的中心节点,主要用于用户的注册、鉴权控制、会话路由、业务触发控制、以及维持会话状态信息等。SBC用于提供安全接入和媒体处理。P-CSCF为用户接入IMS核心网的入口节点,主要负责信令和消息的代理。
可选的,服务***包括信令服务器和媒体服务器。
示例性的,媒体服务器用于负责音视频媒体处理和播放,会场的申请和释放,音视频的编解码,桌面共享和电子签名处理等。信令服务器用于负责信令的协商和处理,控制客服的入会和退会。
其中,信令服务器可通过会话发起协议(session initiation protocol,SIP)与S-CSCF通信。媒体服务器可通过实时传输协议(real-time transport protocol,RTP)与SBC通信。
目前,用户可的第一终端设备与客服的第二终端设备可建立视频通话。第二终端设备通过视频通话获取用户输入的电子签名,并对获取的电子签名进行验证,从而完成电子签名验证过程。第二终端设备还可将电子签名的验证结果发送给业务***。第一终端设备例如为图3中的第一终端设备,第二终端设备例如为图3中的第二终端设备,业务***例如为图3中的业务***。
由此可见,目前这种验证电子签名的方式依赖于客服的人工操作,客服可能会篡改电子签名,这会降低电子签名的验证结果的可信度。
为此,本申请实施例提供一种电子签名验证方法。在该方法中,服务***可被第一请求消息触发,从而向第一终端设备请求电子签名(如第一电子签名),服务***从第一终端设备获取第一电子签名之后,还可确定第一电子签名的验证结果。如此,电子签名验证过程无需客服介入,从而提高验证电子签名的可信度。并且,还可减少客服的操作,有利于提升客服的体验。
下面结合附图,对本申请实施例中的电子签名验证方法进行介绍。
在本申请的各个实施例对应的附图中,凡是用虚线表示的步骤,均为可选的步骤。本 申请的各个实施例所述的第一终端设备例如为图1A、图1B、图2A、图2B或图3中任一所示的第一终端设备,第二终端设备例如为图2A、图2B或图3所示的第二终端设备,服务***例如为图1A、图1B、图2A、图2B或图3中任一所示的服务***,业务***例如为图1A、图1B、图2A、图2B或图3中任一所示的业务***,以及IMS例如为图3所示的IMS。另外,本申请的各个实施例所述的媒体服务器例如为图3所示的媒体服务器,以及信令服务器例如为图3的信令服务器。
请参照图4,为本申请实施例提供的一种电子签名验证方法的流程示意图。该流程示意图包括如下步骤。
S401、第二终端设备向服务***发送第一请求消息。相应的,服务***接收来自第二终端设备的第一请求消息。
例如,客服协助用户办理业务。但根据业务的办理规则,需用户在线完成电子签名才能结束,因此客服可通过第二终端设备向服务***发送第一请求消息,以通过服务***获取用户的第一电子签名。其中,第二终端设备可通过IMS向服务***发送第一请求消息。或者,第二终端设备直接向服务***发送第一请求消息。
第一请求消息可用于请求用户的第一电子签名,第一请求消息可指示与用户对应的第一终端设备。可选的,第一请求消息包括第一会话的标识。第一会话的标识指示第一终端设备。第一会话指示第二终端设备与第一终端设备建立的通话通道。
示例性的,在第二终端设备向服务***发送第一请求消息之前,第二终端设备可通过服务***与第一终端设备建立通话通道。通话通道可为交互式用户会话的通道。交互式用户会话可用于实现多媒体元素的交互。多媒体元素例如视频、图像和音频等一种或多种。交互式用户会话的通信可包括视频通话、交互式语音(interactive voice recognition,IVR)、音频通话、即时通信、在线游戏或虚拟现实等。服务***可确定该通话对应的第一会话的标识,并将第一会话的标识发送给第一终端设备和第二终端设备。第二终端设备可将第一会话的标识携带在第一请求消息中,并将第一请求消息发送给服务***。服务***在接收第一请求消息之后,可根据第一请求消息中的第一会话的标识,确定第一终端设备。
或者,第一请求消息包括第一终端设备的标识,第一终端设备的标识指示第一终端设备。第一终端设备的标识,例如为第一终端设备的媒体介入控制(media access control,MAC)地址。
在另一种可能的实施方式中,第一终端设备可根据用户的第一操作,生成第一请求消息,向服务***发送第一请求消息。相应的,服务***接收来自第一终端设备的第一请求消息。第一操作指示进行电子签名验证。
在第一终端设备运行有第一应用的情况下,用户可在第一应用中进行第一操作。第一终端设备响应该第一操作,生成第一请求消息。
在这种可能的实施方式中,由于服务***从第一终端设备接收第一请求消息,因此第二终端设备无需执行S401的步骤,即S401的步骤为可选的步骤,在图4中以虚线示意。
S402、服务***向第一终端设备发送第二请求消息。相应的,第一终端设备接收来自服务***的第二请求消息。第二请求消息可用于请求获取用户的电子签名。
在一种可能的实施方式中,在服务***向第一终端设备发送第二请求消息之前,服务***可基于第一会话指示的通话通道,与第一终端设备通信。这种情况下,服务***可通过会话发起协议(session initiation protocol,SIP)向第一终端设备发送第二请求消息。其 中,服务***可通过IMS向第一终端设备发送第二请求消息。或者,服务***直接向第一终端设备发送第二请求消息。
作为一个示例,第二请求消息可被携带在第一会话描述协议(session description protocol,SDP)消息中。第一会话描述协议消息可称为会话描述协议消息。如此,相当于服务***采用了会话描述协议来描述(或封装,或编码)第二请求消息。
在一种可能的实施方式中,第二请求消息指示(或包括)电子签名功能的标识。电子签名功能的标识也可以称为电子签名域的标识。电子签名功能的标识指示服务***具有传输电子签名的能力。可选的,电子签名功能的标识可指示请求获取第一终端设备的电子签名。
在第二请求消息被携带在第一会话描述协议消息的情况下,电子签名功能的标识可被承载在第一会话描述协议消息的第一字段中。
例如,第一字段可以是第一会话描述协议消息中的头部(也可称为头域)中的字段。
示例性的,第一字段为会话描述协议消息中的联系(contact)字段或支持(supported)字段。联系字段用于指示(或申明)服务***期望支持的能力,或者服务***实际支持的能力。支持字段用于指示(或申明)服务***实际的能力。
或者,第一字段可以是第一会话描述协议消息的正文中的字段。例如,第一字段为M行中的a字段。M行用于指示(或申明)服务***支持的业务类型,a字段用于指示(或申明)服务***支持的业务类型对应的信息。
例如,服务***在视频业务类型下,具有传输电子签名的能力。相应的,第一会话描述协议消息中的M行可指示服务***支持视频业务类型,a字段可指示服务***具有传输电子签名的能力。
在上述实施方式中,电子签名功能的标识可被承载在第一会话描述协议消息已有的字段中,而不必新增第一会话描述协议消息的字段,减少对第一会话描述协议消息的格式的更改。当然,在另一种可能的实施方式中,第一字段也可以是第一会话描述协议消息的新增的字段中,本申请实施例对此不做具体限定。
在一种可能的实施方式中,第二请求消息还包括第一媒体资源信息。第一媒体资源信息指示服务***传输视频的第一资源。第一资源例如包括服务***的网际协议(internet protocol,IP地址、视频端口号、音频端口号、音频编码资源、音频解码资源、视频编码资源和视频解码资源中的一种或多种。可选的,第一资源还包括许可(license)。许可用于限制服务***的传输电子签名的能力。第一资源可以是通过协议被预配置在服务***中的,或者也可以是服务***自行分配的。
S403、第一终端设备根据第一电子签名,获得反馈消息。反馈消息可指示第一电子签名。
第一终端设备在接收第二请求消息之后,可解析第二请求消息,确定服务***请求获取用户的电子签名,因此第一终端设备可获取用户的第一电子签名。
示例性的,第一终端设备显示签名框。签名框也可称为签名输入框或输入框等。用户可在签名框内输入第一电子签名。相应的,第一终端设备获得第一电子签名。该第一电子签名的形式可以有多种,例如图像、文字或视频等。例如,第一终端设备可直接将用户在签名框内输入的轨迹作为第一签名。
可选的,签名框可显示第一提示消息,第一提示消息用于提示用户输入签名。
请参照图5,为本申请实施例提供的一种在用户输入签名的过程中第一终端设备的界面变化示意图。如图5中a所示,第一终端设备可显示签名框500,该签名框500包括第一提示消息501。第一提示消息501具体如图5中“您正在办理业务,如果确认办理业务,请在该签名框内手写您的姓名”。用户可在签名框500内手写第一电子签名,从而第一终端设备可获得该第一电子签名502,第一电子签名502例如为图5中b所示的“张三”。
在一种可能的实施方式中,第一终端设备还可通过摄像头,拍摄用户在输入电子签名的过程的视频(即签名视频)。签名视频和第一电子签名用于生成反馈消息。例如,第一终端设备基于第二资源,对第一电子签名和签名视频进行编码,从而获得反馈消息。
为了保证用户的隐私,在本申请实施例中,第一终端设备可获取开启摄像头的权限,并在获取开启摄像头的权限之后,开启摄像头。
示例性的,第一终端设备可显示第二提示消息。第二提示消息用于请求用户开启摄像头权限,第一终端设备根据用户的第二操作,确定已获取开启摄像头的权限。第二操作指示同意开启摄像头。如果用户进行第三操作,则第一终端设备不开启摄像头。第三操作指示拒绝开启摄像头。
请参照图6,为本申请实施例提供的一种第一终端设备的界面示意图。如图6所示,第一终端设备包括摄像头604。第一终端设备显示第二提示消息601,具体如图6中的“您正在办理业务,需开启摄像头,请同意开启摄像头”。第二终端设备还显示有拒绝开启摄像头的控件602和同意开启摄像头的控件603。如果用户点击同意开启摄像头的控件603,相当于进行了第二操作,则第一终端设备可确定开启摄像头604。如果用户点击拒绝开启摄像头的控件602,相当于进行了第三操作,第一终端设备可确定不开启摄像头604。
在第一终端设备获得第一电子签名之后,第一终端设备可根据第一电子签名,生成反馈信息。示例性的,第一终端设备可按照预设编码方式,对第一电子签名进行编码,获得反馈消息。
或者,在第一终端设备获得第一电子签名和签名视频之后,第一终端设备可根据第一电子签名和签名视频,生成反馈消息。第一终端设备也可按照预设编码方式,对第一电子签名和签名视频进行编码,获得反馈消息。
在第二请求消息还包括第一媒体资源信息的情况下,在一种可能的实施方式中,第一终端设备可向服务***发送第二媒体资源信息。第二媒体资源信息用于指示第一终端设备传输视频的第二资源,第二资源可用于发送反馈消息,第二资源的内容可参照前文第一资源的内容。如此,相当于完成了第一终端设备与服务***之间的资源协商过程。
S404、第一终端设备向服务***发送反馈消息。相应的,服务***接收来自第一终端设备的反馈消息。
示例性的,第一终端设备可直接向服务***发送反馈消息,或者可通过IMS向服务***发送反馈消息。
在一种可能的实施方式中,在第一资源包括许可的情况下,第一终端设备可确定许可有效,进而向服务***发送反馈消息。许可有效可理解为服务***具有合法的传输电子签名的能力。
在一种可能的实施方式中,如果第一电子签名的形式为视频或图像,那么第一终端设备可通过第二资源向服务***发送反馈消息。相应的,服务***可通过第一资源接收反馈消息。进一步地,服务***可根据第二资源,对反馈消息进行解码。例如,服务***可根 据第二资源指示的视频解码资源,对反馈消息进行解码,以成功获得第一电子签名。如此,保证服务***可顺利解码反馈消息,以获得第一电子签名。
可选的,第一终端设备还可基于第二资源,与服务***建立安全传输通道,第一终端设备可通过安全传输通道,向服务***发送反馈消息。如此,可保证反馈消息的安全性。
S405、服务***确定第一电子签名的验证结果。
在一种可能的实施方式中,服务***可向业务***发送第一电子签名,从业务***接收验证结果,也就相当于服务***确定了验证结果。验证结果指示第一电子签名验证通过或第一电子签名验证不通过。验证通过可表示第一电子签名验证合法。验证不通过也可以称为验证失败,验证不通过可表示第一电子签名验证不合法。
可选的,如果反馈消息还包括签名视频,那么服务***也可将签名视频也发送给服务***。
其中,业务***确定验证结果的方式有多种,下面举例介绍。
方式一、根据第一电子签名是否为手写的签名,业务***确定验证结果。
如果第一电子签名为手写的签名,业务***可确定验证结果为第一电子签名验证通过。业务***确定第一电子签名不是手写的签名,则确定验证结果为第一电子签名验证不通过。
例如,业务***可提取第一电子签名的字迹特征,并将字迹特征与目标特征进行比对。目标特征指示设备输入的字迹的特征。如果字迹特征与目标特征的相似度大于或等于第一阈值,表示第一电子签名更接近设备输入的字迹,因此业务***可确定验证结果为第一电子签名验证通过。如果字迹特征与目标特征的相似度小于第一阈值,表示第一电子签名属于手写的签名,因此业务***可确定验证结果为第一电子签名验证通过。其中,目标特征和第一阈值可被预存在业务***中。第一阈值例如为0.8。
方式二,业务***根据第一电子签名指示的姓名是否为用户的姓名,确定第一电子签名的验证结果。
如果第一电子签名指示的姓名不是用户的姓名,业务***确定验证结果为第一电子签名验证不通过。如果第一电子签名指示的姓名为用户的姓名,业务***确定验证结果为第一电子签名验证通过。所述用户的姓名可以是被预配置在业务***中的。
方式三,业务***结合上述方式一和方式二,确定第一电子签名的验证结果。
如果第一电子签名为手写的签名,且第一电子签名指示的姓名是用户的姓名,则业务***可确定验证结果为第一电子签名验证通过。如果第一电子签名不是手写的签名,和/或第一电子签名指示的姓名不是用户的姓名,业务***确定验证结果为第一电子签名验证不通过。
方式四,业务***根据第一电子签名的字迹与用户字迹是否匹配,确定第一电子签名的验证结果。用户字迹是指用户的真实字迹,用户字迹可被预配置在业务***中。
示例性的,如果第一电子签名的字迹与用户字迹匹配,则业务***确定验证结果为第一电子签名验证通过。如果第一电子签名的字迹与用户字迹不匹配,则业务***确定验证结果为第一电子签名验证不通过。
例如,业务***可提取第一电子签名的字迹特征,如果第一电子签名的字迹特征与用户字迹特征的相似度大于或等于第二阈值,则表示第一电子签名的字迹与用户字迹匹配。如果第一电子签名的字迹特征与用户字迹特征的相似度小于第二阈值,则表示第一电子签名的字迹与用户字迹不匹配。其中,用户字迹特征和第二阈值可被预存在业务***中。第 二阈值例如为0.8。
上述方式一至方式四是对业务***确定验证结果的方式进行示例介绍,实际上业务***确定第一电子签名的验证结果的方式还有多种,本申请实施例对此不做具体限定。
在一种可能的实施方式中,在反馈消息还包括签名视频的情况下,第一终端设备可确定从签名视频中能够识别所述用户。如果第一终端设备从签名视频中识别所述用户,表示签名视频为所述用户的签名,如此,进一步保证第一电子签名的可信度。如果第一终端设备确定从签名视频中没有识别到所述用户,那么第一终端设备可确定第一电子签名验证不通过。
可选的,业务***在确定第一电子签名的验证结果之后,可对第一电子签名、以及所述第一电子签名的时间戳进行加密处理,获得第一加密信息。业务***还可将第一加密信息存储到区块链***中。其中,第一电子签名的时间戳例如为业务***接收第一电子签名的时间。第一加密信息例如为第一电子签名和第一电子签名的时间戳的哈希计算结果。
可选的,在反馈消息还包括签名视频的情况下,第一加密信息可以是对第一电子签名、第一电子签名的时间戳和签名视频进行哈希计算获得的。
在该实施方式中,第一终端设备可将第一加密信息写入区块链***,通过区块链技术确保第一电子签名不被篡改,确保证据链的完整,保证第一电子签名过程的安全可信。
在另一种可能的实施方式中,服务***可直接对第一电子签名进行验证,获得验证结果。服务***对第一电子签名进行验证,获得验证结果的方式可以参照前文业务***确定验证结果的内容,本申请实施例对此不做具体限定。
这种情况下,可选的,服务***可将第一加密信息写入区块链***。第一加密信息的内容可参照前文。
S406、服务***向第二终端设备发送验证结果。相应的,第二终端设备接收来自服务***的验证结果。
在服务***从第二终端设备接收第一请求消息的情况下,服务***可向第二终端设备发送验证结果。以便第二终端设备对应的客服可根据第一电子签名的验证结果,为用户继续办理业务。
在本申请实施例中,服务***可直接向用户的第一终端设备请求电子签名,并且确定用户的第一电子签名的验证结果,无需客服介入,可减少客服的操作和工作量,也可避免客服篡改电子签名,从而可提高验证电子签名的可信度。并且,第一终端设备通过会话发起协议向服务***发送反馈消息,使得反馈消息不容易被篡改或泄露,有利于提高电子签名的可信度。并且,第一终端设备在与第二终端设备建立通话之后,服务***可通过该通话对应的第一会话的标识,向第一终端设备请求第一电子签名,对于用户而言,相当于是在一次通话过程中完成电子签名过程。并且,服务***可通过第一会话描述协议消息发送第二请求消息,无需采用专有消息发送第二请求消息,如此,可减少对第一会话描述协议消息的修改,有利于降低电子签名验证的实现成本。
在一种可能的实施方式中,上述服务***包括信令服务器和媒体服务器。下面结合图7所示的一种电子签名验证方法的流程示意图,对信令服务器和媒体服务器之间的交互进行示例介绍。该流程示意图包括如下步骤。
S701、第一终端设备向媒体服务器发送第三请求消息。相应的,媒体服务器接收来自第一终端设备的第三请求消息。第三请求消息用于接入媒体服务器。第三请求消息也可称 为第一邀请(invite)消息。
例如,用户拨打客服接入码,相应的,第一终端设备可通过会话发起协议向媒体服务器发送第三请求消息。客服接入码可用于指示客服的电话号码。第三请求消息可被携带在第二会话描述协议消息中。
可选的,第三请求消息可包括第三媒体资源信息。第三媒体资源信息用于指示第三资源。第三资源用于第一终端设备与媒体服务器通信,第三资源可具体用于第一终端设备与第二终端设备通话,通话可包括VOLTE通话。第三资源例如包括第一终端设备的IP地址、音频端口号、音频编码资源和音频解码资源一种或多种。
作为一个示例,S701包括S701a、S701b和S701c。S701a为:第一终端设备向IMS发送第三请求消息。相应的,IMS接收来自第一终端设备的第三请求消息。S701b为:IMS向信令服务器发送第三请求消息。相应的,信令服务器接收来自IMS的第三请求消息。S701c为:信令服务器向媒体服务器发送第三请求消息。相应的,媒体服务器接收来自信令服务器的第三请求消息。
作为一个示例,在S701a中,第一终端设备可向具体IMS中的I-CSCF发送第三请求消息。另外,在S701b中,IMS可采用透传的方式向服务***发送第三请求消息。
S702、媒体服务器向第一终端设备发送18*消息。18*消息指示媒体服务器处于振铃状态。
作为一个示例,S702包括S702a、S702b和S702c。其中,S702a为:媒体服务器向信令服务器发送18*消息。相应的,信令服务器接收来自媒体服务器的18*消息。S702b为:信令服务器向IMS发送18*消息。相应的,IMS接收来自信令服务器的18*消息。S702c为:IMS向第一终端设备发送18*消息。相应的,第一终端设备接收来自IMS的18*消息。
在S702c中,IMS可采用透传的方式向第一终端设备发送18*消息。
可选的,18*消息还包括第四媒体资源信息,第四媒体资源信息指示第四资源。第四资源用于媒体服务器与第一终端设备通信,例如第四资源可具体用于媒体服务器与第一终端设备通话。第四资源的内容可参照前文第三资源的内容。作为一个示例,第四媒体资源信息可被承载在第三会话描述协议消息中。
S703、媒体服务器向第一终端设备发送第一应答消息。相应的,第一终端设备接收来自媒体服务器的第一应答消息。示例性的,第一应答消息表示媒体服务器确定与第一终端设备建立通信。
作为一个示例,S703包括S703a、S703b和S703c。其中,S703a为:媒体服务器向信令服务器发送第一应答消息。相应的,信令服务器接收来自媒体服务器的第一应答消息。S703b为:信令服务器向IMS发送第一应答消息。相应的,信令服务器接收来自IMS的第一应答消息。S703c为:IMS向第一终端设备发送第一应答消息。相应的,第一终端设备接收来自IMS的第一应答消息。
S704、媒体服务器向第一终端设备发送音频流。
音频流例如为IVR。音频流可用于为自助音频流,用于辅助用户操作。其中,音频流可被预存在媒体服务器中。
作为一个示例,S704包括S704a、S704b和S704c。其中,S704a为:媒体服务器向信令服务器发送音频流。相应的,信令服务器接收来自媒体服务器的音频流。S704b为:信令服务器向IMS发送音频流。相应的,信令服务器接收来自IMS的音频流。S704c为:IMS 向第一终端设备发送音频流。相应的,第一终端设备接收来自IMS的音频流。
S705、媒体服务器向第二终端设备发送第四请求消息。相应的,第二终端设备接收来自媒体服务器的第四请求消息。示例性的,第四请求消息请求第二终端设备与第一终端设备建立通话。
例如,当用户按键或语音转人工时,第一终端设备可向媒体服务器发送媒体流,例如,第一终端设备可通过RTP向媒体服务器发送媒体流。媒体流用于指示用户请求转人工。媒体服务器接收来自第一终端设备的媒体流之后,也就确定用户请求转人工,因此媒体服务器可为用户分配一个客服,并向该客服对应的终端设备(在本申请实施例中以第二终端设备为例)发送第四请求消息。第四请求消息也可称为第二邀请消息。
可选的,第四请求消息还包括第五媒体资源信息。第五媒体资源信息指示第五资源。第五资源用于媒体服务器与第二终端设备通信,例如,第五资源具体用于媒体服务器与第二终端设备通话。
S706、第二终端设备向媒体服务器发送第二应答消息。相应的,媒体服务器接收来自第二终端设备的第二应答消息。第二应答消息用于请求与第一终端设备建立通信。
S707、媒体服务器向第一终端设备发送第五请求消息。相应的,第一终端设备接收来自媒体服务器的第五请求消息。第五请求消息指示请求与第一终端设备重协商。
作为一个示例,S707包括S707a、S707b和S707c。S707a为:媒体服务器向信令服务器发送第五请求消息。相应的,信令服务器接收来自媒体服务器的第五请求消息。S707b为:信令服务器向IMS发送第五请求消息。相应的,IMS接收来自信令服务器的第五请求消息。S707c为:IMS向第一终端设备发送第五请求消息。相应的,第一终端设备接收来自IMS的第五请求消息。
可选的,第五请求消息包括第六媒体资源信息。第六媒体资源信息指示第六资源。第六资源用于与第一终端设备建立通信,例如用于与第一终端设备建立通话。第六资源与前文中的第四资源相同,或者不同。
S708、第一终端设备向媒体服务器发送第三应答消息。相应的,媒体服务器接收来自第一终端设备的第三应答消息。
作为一个示例,S708包括S708a、S708b和S708c。S708a为:第一终端设备向IMS发送第三应答消息。相应的,IMS接收来自第一终端设备的第三应答消息。S708b为:IMS向信令服务器发送第三应答消息。相应的,信令服务器接收来自IMS的第三应答消息。S708c为:信令服务器向媒体服务器发送第三应答消息。相应的,媒体服务器接收来自信令服务器的第三应答消息。
可选的,第三应答消息包括第七媒体资源信息。第七媒体资源信息指示第七资源。第七资源用于与第二终端设备建立通信,例如用于与第二终端设备建立通话。第七资源可与第三资源相同或不同。
S709、媒体服务器向第二终端设备发送重协商请求。相应的,第二终端设备接收来自媒体服务器的重协商请求。重协商请求用于与第二终端设备重协商资源。
如果第一终端设备和第二终端设备处于直连模式,那么重协商请求可包括第一终端设备的第七媒体资源信息。
如果第一终端设备、第二终端设备和媒体服务器处于音频会议模式,那么重协商请求可包括媒体服务器的第六媒体资源信息。
作为一个示例,S701-S709为可选的步骤,在图7中以虚线示意。
S710、第二终端设备向媒体服务器发送第一请求消息。相应的,媒体服务器接收来自第二终端设备的第一请求消息。第一请求消息的含义可参照前文。
可选的,第一请求消息包括第二终端设备的第八媒体资源信息。第八媒体资源信息指示第八资源。第八资源用于与第一终端设备建立通信,具体可用于与第一终端设备建立通话。
S711、媒体服务器向第一终端设备发送第二请求消息。相应的,第一终端设备接收来自媒体服务器的第二请求消息。第二请求消息的含义可参照前文。
S712、第一终端设备根据第一电子签名,获得反馈消息。
第一电子签名的含义、反馈消息的含义、终端设备获取第一电子签名的方式、以及终端设备获得反馈消息的方式可参照前文。
S713、第一终端设备向媒体服务器发送反馈消息。相应的,媒体服务器接收来自第一终端设备的反馈消息。反馈消息的含义可参照前文。
作为一个示例,S713包括S713a和S713b。S713a为:第一终端设备向IMS发送反馈消息。相应的,IMS接收来自第一终端设备的反馈消息。S713b为:IMS向媒体服务器发送反馈消息。相应的,媒体服务器接收来自IMS的反馈消息。
S714、媒体服务器向业务***发送第一电子签名。相应的,业务***接收来自媒体服务器的第一电子签名。
S715、业务***对第一电子签名进行验证,获得验证结果。
验证结果的含义、以及业务***验证第一电子签名的方式可参照前文。
在一种可能的实施方式中,业务***可对第一电子签名、以及所述第一电子签名的时间戳进行加密处理,获得第一加密信息。业务***还可将第一加密信息存储到区块链***中。其中,第一电子签名的时间戳例如为业务***接收第一电子签名的时间。第一加密信息例如为第一电子签名和第一电子签名的时间戳的哈希计算结果。可选的,在反馈消息还包括签名视频的情况下,第一加密信息可为第一电子签名、第一电子签名的时间戳和签名视频的哈希计算结果。
S716、业务***向媒体服务器发送验证结果。相应的,媒体服务器接收来自业务***的验证结果。
S717、媒体服务器向第二终端设备发送验证结果。相应的,第二终端设备接收来自媒体服务器的验证结果。
可选的,在媒体服务器接收验证结果之后,媒体服务器可将与第一终端设备之间的通话切换到自动的音/视频通话阶段,继续下一步的业务流程处理。
作为一个示例,S717为可选的步骤,在图7中以虚线示意。
在本申请实施例中,第一终端设备可基于与第二终端设备建立的会话通道,向媒体服务器发送反馈消息,可以无需依赖第一终端设备中的应用,无需单独建立用于传输电子签名的媒体通道,可在通话的情况下实现验证电子签名的过程。并且,第一终端设备可通过会话发起协议传输反馈消息,以保证反馈消息的安全可信。并且,第一终端设备可在第一终端设备与第二终端设备建立通话的情况下,直接与媒体服务器通信,媒体服务器直接向第一终端设备发起签名邀约,使得用户可在一次通话过程中无缝完成签名过程,提升用户体验。
本申请实施例提供一种通信装置。例如,请参照图8,为本申请实施例提供的一种通信装置的结构示意图。
如图8所示,通信装置800包括处理模块801和收发模块802。
在第一个实施例中,通信装置800可用于实现服务***的功能,例如图4或图7中的服务***的功能。
例如,通信装置800用于实现图4中的服务***的功能。相应的,收发模块802可用于执行S402和S404的步骤,处理模块801可用于执行S405的步骤。
又例如,通信装置800用于实现图7中的服务***的功能。相应的,收发模块802可用于执行S710、S711和S713a的步骤,处理模块801可用于执行S715的步骤。
在第一个实施例中,通信装置800可用于实现第一终端设备的功能,例如图4或图7中的第一终端设备的功能。
例如,通信装置800用于实现图4中的第一终端设备的功能。相应的,收发模块802可用于执行S402和S404的步骤,处理模块801可用于执行S403的步骤。
又例如,通信装置800用于实现图7中的第一终端设备的功能。相应的,收发模块802可用于执行S711和S713a的步骤,处理模块801可用于执行S712的步骤。
在第三个实施例中,通信装置800可用于实现第二终端设备的功能,例如图4或图7中的第二终端设备的功能。
例如,通信装置800用于实现图4中的第二终端设备的功能。相应的,收发模块802可用于在处理模块801的控制下执行S401和S406的步骤。
又例如,通信装置800用于实现图7中的第二终端设备的功能。相应的,收发模块802可在处理模块801的控制下,执行S710的步骤。
在第四个实施例中,通信装置800可用于实现业务***的功能,例如图4或7中的业务***的功能。
又例如,通信装置800用于实现图7中的业务***的功能。相应的,收发模块802可用于执行S714和S716的步骤,处理模块801可用于执行S715的步骤。
本申请实施例提供一种通信装置。例如,请参照图9,为本申请实施例提供的一种通信装置的结构示意图。
如图9所示,通信装置900包括处理器901和通信接口902。处理器901和通信接口902之间相互耦合。可以理解的是,通信接口902可以为收发器或输入输出接口。其中,处理器901和通信接口902可用于实现前文任一的电子签名验证方法,例如图4或图7中任一所述的电子签名验证方法。
其中,处理器901可以是中央处理单元(central processing unit,CPU),还可以是其它通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。
可选的,通信装置900还可以包括存储器903,用于存储处理器901执行的指令或存储处理器901运行指令所需要的输入数据或存储处理器901运行指令后产生的数据。在图9中以虚线框表示存储器903为可选的模块。
本申请实施例提供一种通信***,该通信***包括第一终端设备、第二终端设备和服 务***。该通信***可用于实现前文任一所述的电子签名验证方法。其中,第一终端设备、第二终端设备和服务***的功能均可参照前文论述的内容。可选的,该通信***还包括前文论述的任一的区块链***。
本申请实施例提供一种通信***,该通信***包括第一终端设备、第二终端设备、业务***和服务***。该通信***可用于实现前文任一所述的电子签名验证方法。其中,第一终端设备、第二终端设备、业务***和服务***的功能均可参照前文论述的内容。可选的,该通信***还包括前文论述的任一的区块链***。
本申请实施例提供一种芯片***,该芯片***包括:处理器和接口。其中,该处理器用于从该接口调用并运行指令,当该处理器执行该指令时,实现前文任一的电子签名验证方法,例如图4或图7中任一所述的电子签名验证方法。
本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序或指令,当其被运行时,实现前文任一所述的电子签名验证方法,例如图4或图7中任一所述的电子签名验证方法。
本申请实施例提供一种包含指令的计算机程序产品,当其在计算机上运行时,实现前文任一的电子签名验证方法,例如图4或图7中任一所述的电子签名验证方法。
本申请的实施例中的方法步骤可以通过硬件的方式来实现,也可以由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器、闪存、只读存储器、可编程只读存储器、可擦除可编程只读存储器、电可擦除可编程只读存储器、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于基站或终端中。当然,处理器和存储介质也可以作为分立组件存在于基站或终端中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其它可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘;还可以是半导体介质,例如,固态硬盘。该计算机可读存储介质可以是易失性或非易失性存储介质,或可包括易失性和非易失性两种类型的存储介质。
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分, 并不用来限制本申请的实施例的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。

Claims (30)

  1. 一种电子签名验证方法,其特征在于,应用于服务***,所述方法包括:
    接收第一请求消息,所述第一请求消息用于请求第一终端设备对应的电子签名;
    向所述第一终端设备发送第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名;
    接收来自所述第一终端设备反馈消息,所述反馈消息指示第一电子签名;
    确定所述第一电子签名的验证结果。
  2. 根据权利要求1所述的方法,其特征在于,所述第一请求消息指示所述第一终端设备。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一请求消息是从第二终端设备接收的,其中,所述第一请求消息包括第一会话的标识,所述第一会话指示所述第一终端设备与所述第二终端设备建立的通话通道;
    向所述第一终端设备发送第二请求消息,包括:
    基于所述通话通道,向所述第一终端设备发送所述第二请求消息。
  4. 根据权利要求3所述的方法,其特征在于,所述第二请求消息包括电子签名功能的标识,所述电子签名功能的标识指示所述服务***具有传输电子签名的能力。
  5. 根据权利要求4所述的方法,其特征在于,所述第二请求消息携带在会话描述协议消息中,所述电子签名功能的标识承载在所述会话描述协议消息的第一字段中。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述第二请求消息包括所述服务***的第一媒体资源信息,所述第一媒体资源信息指示所述服务***用于传输视频的第一资源;所述方法还包括:
    接收来自所述第一终端设备的第二媒体资源信息,所述第二媒体资源信息指示所述第一终端设备用于传输视频的第二资源;
    接收来自所述第一终端设备反馈消息,包括:
    通过所述第一资源接收所述反馈消息;
    根据所述第二资源,解码所述反馈消息,获得所述第一电子签名,所述第一电子签名的形式为图像或视频。
  7. 根据权利要求6所述的方法,其特征在于,所述反馈消息还指示签名视频,所述签名视频指示输入所述第一电子签名的过程。
  8. 根据权利要求3-5任一项所述的方法,其特征在于,所述方法还包括:
    向所述第二终端设备发送所述验证结果。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,确定所述第一电子签名的验证结果,包括:
    向业务***发送所述第一电子签名;
    接收来自所述业务***的所述验证结果。
  10. 一种电子签名验证方法,其特征在于,应用于第一终端设备,所述方法包括:
    接收来自服务***的第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名;
    接收用户输入的第一电子签名;
    向所述服务***发送反馈消息,所述反馈消息指示所述第一电子签名。
  11. 根据权利要求10所述的方法,其特征在于,接收来自服务***的第二请求消息,包括:
    基于会话通道,接收来自服务***的所述第二请求消息,所述会话通道为所述第一终端设备与第二终端设备建立的通话通道。
  12. 根据权利要求10或11所述的方法,其特征在于,所述第二请求消息包括电子签名功能的标识,所述电子签名功能的标识指示所述服务***具有传输电子签名的能力。
  13. 根据权利要求10-12任一项所述的方法,其特征在于,所述第二请求消息携带在会话描述协议消息中,所述电子签名功能的标识承载在所述会话描述协议消息的第一字段中。
  14. 根据权利要求10-13任一项所述的方法,其特征在于,接收用户输入的第一电子签名,包括:
    显示签名框,所述签名框指示所述用户进行签名;
    通过所述签名框,获取所述用户输入的所述第一电子签名。
  15. 根据权利要求11-14任一项所述的方法,其特征在于,所述方法还包括:
    向所述服务***发送所述第一终端设备的第二媒体资源信息,所述第二媒体资源信息指示所述第一终端设备用于传输视频的第二资源;
    基于所述第二资源,对所述第一电子签名进行编码,获得所述反馈消息,所述第一电子签名的形式为图像或视频,其中,所述反馈消息是通过所述第二资源向所述服务***发送的。
  16. 根据权利要求11-15任一项所述的方法,其特征在于,所述方法还包括:
    获取开启所述第一终端设备的摄像头的权限;
    开启所述摄像头,并通过所述摄像头采集签名视频,其中,所述签名视频指示所述用户输入所述第一电子签名的过程,所述反馈消息还指示所述签名视频。
  17. 一种电子签名验证方法,其特征在于,应用于第二终端设备,所述方法包括:
    向服务***发送第一请求消息,所述第一请求消息用于请求第一终端设备对应的电子签名;
    接收来自所述服务***的验证结果。
  18. 根据权利要求17所述的方法,其特征在于,所述第一请求消息指示所述第一终端设备。
  19. 根据权利要求17或18所述的方法,其特征在于,所述第一请求消息包括第一会话的标识,所述第一会话指示所述第一终端设备与所述第二终端设备建立的通话通道,所述第一会话的标识用于确定所述第一终端设备。
  20. 一种电子签名验证方法,其特征在于,应用于业务***,所述方法包括:
    接收来自服务***的第一电子签名;
    对所述第一电子签名进行验证,获得验证结果;
    向所述服务***发送所述验证结果。
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    对所述第一电子签名、以及所述第一电子签名的时间戳进行加密处理,获得第一加密信息;
    将所述第一加密信息存储到区块链***中。
  22. 一种通信装置,其特征在于,包括:
    收发模块,用于接收第一请求消息,所述第一请求消息用于请求第一终端设备对应的电子签名,向所述第一终端设备发送第二请求消息,所述第二请求消息用于请求获取所述第一终端设备对应的电子签名,以及接收来自所述第一终端设备反馈消息,所述反馈消息指示第一电子签名;
    处理模块,用于确定所述第一电子签名的验证结果。
  23. 一种通信装置,其特征在于,包括:
    收发模块,用于在处理模块的控制下,接收来自服务***的第二请求消息,所述第二请求消息用于请求获取所述通信装置对应的电子签名,接收用户输入的第一电子签名,以及向所述服务***发送反馈消息,所述反馈消息携带所述第一电子签名。
  24. 一种通信装置,其特征在于,包括:
    收发模块,用于在处理模块的控制下,向服务***发送第一请求消息,所述第一请求消息用于第一终端设备对应的电子签名;
    所述收发模块,还用于在所述处理模块的控制下,接收来自所述服务***的验证结果。
  25. 一种通信装置,其特征在于,包括:
    收发模块,用于接收来自服务***的第一电子签名;
    处理模块,用于对所述第一电子签名进行验证,获得验证结果;
    所述收发模块,还用于向所述服务***发送所述验证结果。
  26. 一种通信***,其特征在于,包括如权利要求22所述的通信装置、如权利要求23所述的通信装置。
  27. 根据权利要求26所述的***,其特征在于,所述***还包括:
    如权利要求24所述的通信装置,和/或如权利要求25所述的通信装置。
  28. 一种通信装置,其特征在于,包括:处理器和通信接口,所述通信接口用于接收来自所述通信装置之外的其它装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它装置,所述处理器通过逻辑电路执行代码指令实现如权利要求1-21任一项所述的方法。
  29. 一种包含指令的计算机程序产品,其特征在于,当所述指令被计算设备集群运行时,使得所述计算设备集群执行如权利要求1-21任一项所述的方法。
  30. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序或指令,当所述计算机程序或指令被通信装置执行时,实现如权利要求1-21任一项所述的方法。
PCT/CN2023/090977 2022-11-23 2023-04-26 一种电子签名验证方法及装置 WO2024108900A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211470727.7A CN118074927A (zh) 2022-11-23 2022-11-23 一种电子签名验证方法及装置
CN202211470727.7 2022-11-23

Publications (1)

Publication Number Publication Date
WO2024108900A1 true WO2024108900A1 (zh) 2024-05-30

Family

ID=91110118

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/090977 WO2024108900A1 (zh) 2022-11-23 2023-04-26 一种电子签名验证方法及装置

Country Status (2)

Country Link
CN (1) CN118074927A (zh)
WO (1) WO2024108900A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701606A (zh) * 2013-12-25 2014-04-02 中国工商银行股份有限公司 一种基于银行安全证书的企业信息处理方法及***
CN107240023A (zh) * 2016-03-29 2017-10-10 平安科技(深圳)有限公司 客户身份确认方法、装置和***
CN109409058A (zh) * 2018-09-25 2019-03-01 中国平安人寿保险股份有限公司 基于电子签名的身份认证方法、装置和计算机设备
CN109815734A (zh) * 2019-01-18 2019-05-28 郑静 移动电子签名安全实现方法及相关产品
CN114139120A (zh) * 2021-10-26 2022-03-04 中国建设银行股份有限公司 身份验证方法、装置、设备、存储介质及程序产品

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701606A (zh) * 2013-12-25 2014-04-02 中国工商银行股份有限公司 一种基于银行安全证书的企业信息处理方法及***
CN107240023A (zh) * 2016-03-29 2017-10-10 平安科技(深圳)有限公司 客户身份确认方法、装置和***
CN109409058A (zh) * 2018-09-25 2019-03-01 中国平安人寿保险股份有限公司 基于电子签名的身份认证方法、装置和计算机设备
CN109815734A (zh) * 2019-01-18 2019-05-28 郑静 移动电子签名安全实现方法及相关产品
CN114139120A (zh) * 2021-10-26 2022-03-04 中国建设银行股份有限公司 身份验证方法、装置、设备、存储介质及程序产品

Also Published As

Publication number Publication date
CN118074927A (zh) 2024-05-24

Similar Documents

Publication Publication Date Title
WO2023071915A1 (zh) 业务设置方法和装置、存储介质及电子设备
US6788676B2 (en) User equipment device enabled for SIP signalling to provide multimedia services with QoS
EP4184821A1 (en) Ims data channel-based communication method and device
WO2012068922A1 (zh) Ims多媒体通信方法和***、终端及ims核心网
KR20070073343A (ko) 이동통신 ims시스템에서 아이들모드 단말기의 세션 설정프로토콜 데이터를 전송하는 방법 및 장치
US10638524B2 (en) Method and system for providing mission critical service (MCX) in wireless communication network
WO2012038445A1 (en) Systems and methods for peer-to-peer ims
US9800626B2 (en) Selecting refresh periods in an IP network
WO2024088233A1 (zh) 异常网络服务恢复方法、装置、电子设备和服务器
WO2022067700A1 (zh) 通信方法、装置及***
US20120017003A1 (en) Method, apparatus, and system for processing streaming media service
WO2006062682A2 (en) Method and apparatus for providing services and services usage information for a wireless subscriber unit
WO2020029954A1 (zh) 业务请求、协商、响应方法、装置及网络设备、***
WO2024108900A1 (zh) 一种电子签名验证方法及装置
CN107750449A (zh) 用于管理反向信道音频会话的技术
US11089561B2 (en) Signal plane protection within a communications network
WO2022166742A1 (zh) 网络注册方法、装置和用户设备
WO2015192288A1 (zh) 一种通信连接的建立方法、终端和***
EP1998517B1 (en) METHOD AND aPPARATUS FOR CHANGING STATUS OF PACKET SWITCHED DOMAIN
CN116074806A (zh) 信息传输方法及装置
CN112165416A (zh) 一种组网和通信的方法和装置
WO2024060894A1 (zh) 一种通信方法及装置
US12028707B2 (en) Apparatus, system, method, and computer-readable medium for performing a message service and identity service in a 5G network
WO2023050799A1 (zh) 一种注册方法、终端设备、核心网设备及存储介质
WO2024000115A1 (zh) Ims会话方法、装置、通信设备及存储介质