[go: up one dir, main page]

CN109978543A - A kind of method, apparatus, electronic equipment and the storage medium of contract signature - Google Patents

A kind of method, apparatus, electronic equipment and the storage medium of contract signature Download PDF

Info

Publication number
CN109978543A
CN109978543A CN201910266735.1A CN201910266735A CN109978543A CN 109978543 A CN109978543 A CN 109978543A CN 201910266735 A CN201910266735 A CN 201910266735A CN 109978543 A CN109978543 A CN 109978543A
Authority
CN
China
Prior art keywords
contract
text
signature
signatory
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910266735.1A
Other languages
Chinese (zh)
Other versions
CN109978543B (en
Inventor
胡卫刚
胡慧潘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hundsun Technologies Inc
Original Assignee
Zhejiang Whale Net Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Whale Net Science And Technology Co Ltd filed Critical Zhejiang Whale Net Science And Technology Co Ltd
Priority to CN201910266735.1A priority Critical patent/CN109978543B/en
Publication of CN109978543A publication Critical patent/CN109978543A/en
Application granted granted Critical
Publication of CN109978543B publication Critical patent/CN109978543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

This application provides a kind of methods of contract signature, this method comprises: determining the first contract essential information and being pre-processed to the first contract text and the first contract essential information that, to obtain the second contract text and the second contract essential information, pretreatment includes that encryption and storage are handled;Second contract essential information is stored to block chain and stores the second contract text to outside block chain by contract initiator, includes storage address of second contract text outside block chain in the second contract essential information;Contract signatory obtains the second contract essential information from block chain and obtains the second contract text according to the second contract essential information;Contract signatory carries out contract signature after obtaining the first contract text according to the second contract text.It is not required to rely on electronic third-party contract platform during electronic contract being made to sign using this method, ensure that equality signature and the personal secrets of each signatory.Present invention also provides device, electronic equipment and the storage mediums of a kind of signature of contract.

Description

A kind of method, apparatus, electronic equipment and the storage medium of contract signature
Technical field
A kind of signed this application involves field of information security technology more particularly to contract method, apparatus, electronic equipment and Storage medium.
Background technique
With the development of electronic technology, the transmission that electronic contract has by it is convenient, saves the features such as efficient is able to extensively General application, the signature of the electronic contract of the prior art and the contract circulation between each signatory are mainly in third-party electronics It is realized on the device of contract platform, the content of electronic contract and each signatory are for signing digital certificate and the signature of electronic contract Private key used in electronic contract is also stored on third-party electronic contract platform, with the back of third-party electronic contract platform Book is not tampered and secret protection to each signatory's contract of guarantee content.
Therefore in the prior art, third-party electronic contract platform is the device of centralization, is stored in third-party electricity There is treaty contents to be tampered, treaty content is leaked, signatory's privacy is leaked for electronic contract on sub- contract platform Risk, this causes third-party electronic contract platform not can guarantee the signature right of signatory's equality, so that each signatory may not Third-party electronic contract platform is trusted completely.
Therefore, how to guarantee equality and personal secrets of each signatory during signing electronic contract, be at present urgently It solves the problems, such as.
Summary of the invention
In order to solve above-mentioned technical problem of the existing technology, this application provides a kind of methods of contract signature, dress It sets, electronic equipment and storage medium, so that electronic contract needs not rely on third-party electronic contract platform during signing, It ensure that equality signature and the personal secrets of each signatory.
The method of contract signature provided by the present application is predefined applied to the signature of electronic contract in contract signatory After first contract text, which comprises
It determines the first contract essential information and first contract text and the first contract essential information is carried out pre- Processing is to obtain the second contract text and the second contract essential information;The pretreatment includes that encryption and storage are handled;
The second contract essential information is stored to block chain and stores second contract text by contract initiator To outside block chain, in the second contract essential information comprising storage of second contract text outside the block chain Location;
The contract signatory obtains the second contract essential information from the block chain and closes according to described second Second contract text is obtained with essential information;
The contract signatory carries out contract signature after obtaining first contract text according to second contract text.
Optionally, the encryption includes:
The contract initiator obtains the Hash digest of first contract text and carries out to first contract text Encryption is to generate second contract text;
It determines the storage address of second contract text outside the block chain and the storage address is carried out Encryption is to generate encrypted storage address;
The contract initiator generates the contract key of the contract signatory.
Optionally, the storage, which is handled, includes:
The Hash digest of first contract text, the encrypted storage address and the contract key storage are existed In the first contract essential information.
Optionally, it is described to first contract text carry out encryption include:
The symmetric key that the contract initiator is generated at random by symmetric encipherment algorithm is to first contract text Default security part is encrypted.
Optionally, the default security part includes at least following one such:
Contract title, signatory's main information and contract commencement date and deadline.
Optionally, it is described to the storage address carry out encryption include:
The storage address is encrypted with the symmetric key.
Optionally, the contract initiator generates the contract key of the contract signatory and includes:
The contract initiator obtains the encrypted public key of all contract signatories;
The contract initiator encrypts the symmetric key with the encrypted public key and generates the contract signature The contract key of side.
Optionally, the encryption further include:
The first contract essential information is encrypted with the symmetric key to generate second contract and believe substantially Breath.
Optionally, the contract signatory includes: according to second contract text acquisition, first contract text
The contract signatory decrypts the contract key using encryption key to obtain the symmetric key;
The contract signatory is using encrypted storage address described in the symmetric key decryption to obtain described second The storage address of contract text;
Second contract text is obtained according to the storage address and is decrypted using the symmetric key to obtain First contract text.
Optionally, the carry out contract, which is signed, includes:
The contract signatory verifies the label of the content of first contract text and the contract signatory of signed contract Name;
The contract signatory is signed with the Hash digest of the signature private key to first contract text;
The contract signatory sends contract signature by any block chain node trusty on the block chain and asks It asks, it will be in the storage to block chain of the signature of the Hash digest.
Optionally, include: when the contract initiator stores the second contract essential information to block chain
The contract initiator passes through any block chain node trusty on the block chain for second contract Essential information is stored to the block chain.
Optionally, the contract signatory obtains the second contract essential information from the block chain and includes:
The contract signatory obtains second contract from any block chain node trusty on the block chain Essential information.
Optionally, if multiple contract signatories carry out contract signature parallel, the method also includes:
When the signature of first contract signatory operates successfully, control is carrying out remaining contract signature of contract signature The signature operation failure of side, to re-start signature.
The embodiment of the present application also provides a kind of device of contract signature, described device is applied to the signature of electronic contract, Described device includes: pretreatment unit, storage unit, acquiring unit and signature unit;
The pretreatment unit, for determining the first contract essential information and to first contract text and described first Contract essential information is pre-processed to obtain the second contract text and the second contract essential information;The pretreatment includes encryption Processing is handled with storage;
The storage unit, for contract initiator will the second contract essential information store to block chain and will described in Outside the storage to block chain of second contract text, comprising second contract text in the area in the second contract essential information Storage address outside block chain;
The acquiring unit obtains the second contract essential information for the contract signatory from the block chain And second contract text is obtained according to the second contract essential information;
The signature unit obtains the first contract text according to second contract text for the contract signatory Contract signature is carried out after this.
Optionally, the pretreatment unit includes: the first subelement, the second subelement and third subelement;
First subelement obtains the Hash digest of first contract text for the contract initiator and to institute The first contract text is stated to be encrypted to generate second contract text;
Second subelement, for determining the storage address of second contract text outside the block chain simultaneously The storage address is encrypted to generate encrypted storage address;
The third subelement generates the contract key of the contract signatory for the contract initiator.
Optionally, the pretreatment unit further include: the 4th subelement;
4th subelement, for by the Hash digest of first contract text, the encrypted storage address With the contract key storage in the first contract essential information.
Optionally, first subelement is specifically used for what the contract initiator was generated at random by symmetric encipherment algorithm Symmetric key encrypts the default security part of first contract text.
Optionally, the default security part includes at least following one such:
Contract title, signatory's main information and contract commencement date and deadline.
Optionally, second subelement, which encrypt to the storage address, includes:
The storage address is encrypted with the symmetric key.
Optionally, the third subelement includes: to obtain subelement and generation subelement;
The acquisition subelement obtains the encrypted public key of all contract signatories for the contract initiator;
The generation subelement encrypts the symmetric key with the encrypted public key for the contract initiator And generate the contract key of the contract signatory.
Optionally, the pretreatment unit further include: the 5th subelement;
5th subelement, for being encrypted the first contract essential information to generate with the symmetric key The second contract essential information.
Optionally, the signature unit includes: that the first decryption subelement, the second decryption subelement and third decryption are single Member;
The first decryption subelement, decrypts the contract key using encryption key for the contract signatory to obtain Obtain the symmetric key;
The second decryption subelement uses encrypted described in the symmetric key decryption for the contract signatory Storage address is to obtain the storage address of second contract text;
The third decrypts subelement, for according to storage address acquisition second contract text and use Symmetric key is decrypted to obtain first contract text.
Optionally, the signature unit further include: verification subelement, signature subelement and storing sub-units;
The verification subelement verifies the content of first contract text for the contract signatory and signed closes The signature of same contract signatory;
The signature subelement, for the contract signatory with signature private key to the Kazakhstan of first contract text Uncommon abstract is signed;
The storing sub-units pass through any block chain trusty on the block chain for the contract signatory Node sends contract signature request, will be in the storage to block chain of the signature of the Hash digest.
Optionally, the storage unit passes through any trusted on the block chain specifically for the contract initiator Block chain node the second contract essential information is stored to the block chain.
Optionally, the acquiring unit is specifically used for the contract signatory from any trusty on the block chain Block chain node obtains the second contract essential information.
Optionally, if multiple contract signatories carry out contract signature, described device parallel further include: control unit;
Described control unit, for when the signature of first contract signatory operates successfully, control to carry out contract The signature operation failure of remaining contract signatory of signature is to re-start signature.
The embodiment of the present application also provides a kind of electronic equipment, the electronic equipment is for running program, wherein the journey The method of contract signature described in any of the above embodiments is executed when sort run.
The embodiment of the present application also provides a kind of storage mediums, are stored thereon with program, and described program is held by electronic equipment The method of contract signature described in any of the above embodiments is realized when row.
Herein described method has at least the following advantages:
This application provides a kind of methods of contract signature, and applied to the signature of electronic contract, in contract, signatory is preparatory After determining the first contract text, the first contract essential information and basic to first contract text and first contract is determined Information is pre-processed to obtain the second contract text and the second contract essential information, and the pretreatment includes encryption and deposit Storage processing;The second contract essential information is stored to block chain and arrives the second contract text storage by contract initiator It include storage address of second contract text outside the block chain in the second contract essential information outside block chain, It the characteristics of using block chain decentralization, avoids relying in third-party electronic contract platform, while having using block chain The characteristic of altered data is prevented, fair signature condition can be provided for each signatory of contract, furthermore by second contract Outside text storage to block chain, avoid that repeatedly second contract text is encrypted and stored on the block chain Operation, reduce the space for occupying the block chain, promote the performance of the block chain;The contract signatory is from the block The second contract essential information is obtained on chain and second contract text is obtained according to the second contract essential information;Institute It states after contract signatory obtains first contract text according to second contract text and carries out contract signature.
Using method provided by the present application, so that electronic contract needs not rely on third-party electronics and closes during signing Same platform ensure that each signatory the problems such as effectively preventing using third-party electronic contract platform bring privacy leakage Equality signature and personal secrets.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, without creative efforts, It can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is a kind of flow chart of the method for contract signature that the embodiment of the present application one provides;
Fig. 2 is the flow chart of the method for another contract signature that the embodiment of the present application two provides;
Fig. 3 is a kind of schematic diagram of the device for contract signature that the embodiment of the present application three provides.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
Embodiment one:
The embodiment of the present application one provides a kind of method of contract signature, illustrates with reference to the accompanying drawing.
Referring to Fig. 1, which is a kind of flow chart of the method for contract signature that the embodiment of the present application one provides.
The embodiment of the present application the described method comprises the following steps:
S101: determine the first contract essential information and to first contract text and the first contract essential information into Row pretreatment is to obtain the second contract text and the second contract essential information;The pretreatment includes at encryption and storage Reason.
Each contract signatory predefines the first contract text by the mode on line or under line, and the application is to described The quantity of contract signatory is not especially limited, and first contract text is original contract, includes in the contract text The information such as main information, contract commencement date and deadline and the specific contract terms of each signatory of contract title, contract.
The first contract essential information is determined according to first contract text, and the first contract essential information is pair The refinement and statistics of first contract text can tentatively judge described first by the first contract essential information Whether contract text is predetermined contract text, and the first contract essential information includes contract title, contract start-stop day The information such as phase, the main information of each signatory of contract, contract terms number and classification.
It is described pretreatment refer to first contract text and the first contract essential information progress encryption with Storage processing is that first contract text and the first contract essential information pass through safety assurance by the pretreatment. Wherein the encryption, which refers to, adds first contract text and the first contract essential information by cryptographic means Close treatment process, the application are not specifically limited cryptographic means;The storage processing refers to the storage encryption process The treatment process of the data of middle generation.
S102: contract initiator stores the second contract essential information to block chain and by second contract text It stores outside block chain, includes storage of second contract text outside the block chain in the second contract essential information Address.
The contract initiator is also possible to the member in the contract signatory, and the application is to the contract initiator's Quantity is not especially limited.
The block chain is a kind of database of decentralization, it includes one and is referred to as the list of block, and has The record of sustainable growth and marshalling, each block includes a timestamp and one and previous block links, Therefore use block chain that can make data that can not distort, i.e., data are once recorded, and the data in corresponding block will It is irreversible.
It, can the characteristics of using block chain decentralization by the second contract essential information storage on the block chain To avoid depending on third-party electronic contract platform, while the characteristic for preventing altered data that has using block chain, energy Fair signature condition is enough provided for each signatory of contract.
In one possible implementation, the contract initiator passes through any area trusty on the block chain Block chain node stores the second contract essential information to the block chain.
Second contract text and the second contract essential information can be stored entirely on block chain, but be considered It will affect the performance of the block chain when data store content is larger, i.e., store the second contract essential information to described Block chain, and by second contract text storage to outside block chain, avoiding being repeated as many times on the block chain to described the The operation that two contract texts are encrypted and stored reduces the space for occupying the block chain, promotes the performance of the block chain.
Meanwhile in order to obtain second contract text, the second contract base by the second contract essential information The storage address comprising second contract text outside the block chain is also needed in this information.
S103: the contract signatory obtains the second contract essential information from the block chain and according to described Two contract essential informations obtain second contract text.
Each contract signatory is obtained after the second contract essential information from the block chain to described second Contract essential information is decrypted to obtain storage address of second contract text outside the block chain, finally according to institute It states storage address and obtains second contract text.
In one possible implementation, the contract signatory is from any block trusty on the block chain Chain node obtains the second contract essential information.
S104: the contract signatory carries out contract after obtaining first contract text according to second contract text Signature.
Each contract signatory is decrypted second contract text to obtain first contract text simultaneously The signature of carry out contract.
For the different contract signatories, since contract signature cannot be completed instantaneously, and sign a contract Time-consuming is different, therefore will appear the case where signing a contract parallel, causes contract signatory can not be quasi- when signing a contract The information for really viewing signed side may bring the unequal problem of signature, in the process can in order to solve actual signature The above problem that can occur, the method also includes:
Determine that the signature success of first contract signatory, the signature of remaining contract signatory unsuccessfully need to sign again.
Since data go out the block time to can all correspond to one in real landing to block chain initiating storage, if one goes out block It is signed, can be guaranteed by block chain bottom in many ways in time, only first signer can in the same block time out Success, other signers, which can will sign, to fail, and needs to re-start signature process.
It should be noted that the descriptions such as " first " in the embodiment of the present application, " second " are intended merely to facilitate explanation, It is not the restriction for herein described method.
The method of contract signature provided by the embodiments of the present application, after contract signatory predefines the first contract text, The first contract essential information is determined first and first contract text and the first contract essential information are pre-processed To obtain the second contract text and the second contract essential information, the pretreatment includes that encryption and storage are handled;Then it closes The second contract essential information is stored to block chain with initiator and stores second contract text to outside block chain, Include storage address of second contract text outside the block chain in the second contract essential information, utilizes block chain The characteristics of decentralization, avoids relying in third-party electronic contract platform, while distorting number using preventing of having of block chain According to characteristic, fair signature condition can be provided for each signatory of contract, furthermore arrive the second contract text storage Outside block chain, it is able to ascend the performance of the block chain;The contract signatory obtains described second from the block chain and closes Second contract text is obtained with essential information and according to the second contract essential information;The last contract signs root First contract text is obtained according to second contract text to carry out contract signature.
Using method provided by the embodiments of the present application, so that being needed not rely on during electronic contract signature third-party Electronic contract platform the problems such as effectively preventing using third-party electronic contract platform bring privacy leakage, ensure that each The equality of signatory is signed and personal secrets.
Embodiment two:
The embodiment of the present application two provides the method for another contract signature, illustrates with reference to the accompanying drawing.
Referring to fig. 2, which is the flow chart of the method for another contract signature that the embodiment of the present application two provides.
The application is not specifically limited the number of node trusty in block chain, it is to be appreciated that in Fig. 2 only with There are three be illustrated not constitute for the application's for (node 1, node 2 and node 3) for block chain node trusty It limits.
The embodiment of the present application is mainly used for illustrating the realization process of entire contract signature, the described method comprises the following steps:
S201: each contract signatory predefines the first contract text and first by the mode on line or under line and closes Same essential information.
S202: the contract initiator obtains the Hash digest of first contract text and to first contract text It is encrypted to generate second contract text.
The hash algorithm refers to the algorithm that the input of random length is mapped as to the output of shorter regular length, wherein The output valve of shorter regular length is known as Hash digest.For a Duan Mingwen even only changing a letter of the paragraph, with The Hash digest generated afterwards will all generate variation, in other words, to find the identical two different inputs of Hash digest, calculate On be impossible, it is possible to pass through the integrality of Hash digest inspection data.Hash algorithm is a kind of one-way cipher simultaneously System, i.e., it is an irreversible mapping from plaintext to ciphertext, only ciphering process, typical to breathe out without decrypting process Uncommon algorithm includes MD2, MD4, MD5 and SHA-1 etc..
First contract text is handled to obtain the Hash digest using hash algorithm, further, institute It states that first contract text encrypt and includes:
The symmetric key that the contract initiator is generated at random by symmetric encipherment algorithm is to first contract text Default security part is encrypted.
When being encrypted using the symmetric encipherment algorithm, first contract text and the symmetric key are passed through After Encryption Algorithm processing, so that it is become complicated encrypted cipher text and send, after receiving ciphertext, if wanting to interpret original text, needs It to use the algorithm for inversion for encrypting used symmetric key and identical algorithms that ciphertext is decrypted, can just make its recovery.
Further, only need to carry out the content of first contract text encryption of selectivity sometimes, it is described default Secret portions include at least following one such:
Contract title, signatory's main information and contract commencement date and deadline.
S203: the storage address of second contract text outside the block chain is determined and to the storage address It is encrypted to generate encrypted storage address.
In order to solve to need second contract text because storage content is larger to block chain bring performance issue It is stored in outside block chain, the address of the chain external storage needs each contract signatory that can access, while depositing in order to ensure described Store up the safety of address, it is also necessary to encrypt to the storage address, further, the symmetric key can be used to institute Storage address is stated to be encrypted.
Can also be using other Encryption Algorithm it should be noted that being encrypted to the storage address, the application is to this It is not specifically limited.
S204: the contract initiator generates the contract key of the contract signatory.
The encryption technology of digital envelope is also used in the encryption process of the embodiment of the present application, is described as follows:
The contract initiator described in above-mentioned steps uses symmetric key to encrypt the default security and the storage The contents such as address, after then encrypting this symmetric key with the encrypted public key of the contract signatory, by encrypted information Each contract signatory is sent jointly to encrypted symmetric key, each contract signatory is first beaten with corresponding encryption key Digital envelope is opened, to obtain symmetric key, the information of encryption is then unlocked using symmetric key.
Therefore the contract key that the contract initiator generates the contract signatory specifically includes:
S204a: the contract initiator obtains the encrypted public key of all contract signatories.
S204b: the contract initiator encrypts the symmetric key with the encrypted public key and generates the conjunction With the contract key of signatory.
S205: by the Hash digest of first contract text, the encrypted storage address and the contract key Be stored in the first contract essential information and with the symmetric key to the first contract essential information encrypted with Generate the second contract essential information
S206: the second contract essential information is stored any block chain trusty to block chain by contract initiator Node simultaneously will be outside second contract text storage to block chain.
Second contract essential information described in Fig. 2 has been stored on the node 1 of block chain.
Further, in one possible implementation, the contract initiator can be by any on block chain Block chain node trusty stores the second contract essential information onto block chain.
S207: the contract signatory obtains described second from any block chain node trusty on the block chain Contract essential information.
Such as the contract signatory described in Fig. 2 can obtain second contract by the node 2 on the block chain Essential information.
S208: the contract signatory decrypts the contract key using encryption key to obtain the symmetric key.
Decryption of the encryption key to the digital envelope is utilized described in S204.
S209: the contract signatory is obtained described using encrypted storage address described in the symmetric key decryption The storage address of second contract text.
S210: according to the storage address obtain second contract text and using the symmetric key be decrypted with Obtain first contract text.
S211: the contract signatory verifies the content of first contract text and the contract signatory of signed contract Signature.
S212: the contract signatory is signed with the Hash digest of the signature private key to first contract text Name.
Further, complete signature after each contract signatory by the symmetric key to the contract text after signature with And the Hash digest after signature is encrypted handles with storage again.
S213: the contract signatory sends contract label by any block chain node trusty on the block chain Administration's request, will be in the storage to block chain of the signature of the Hash digest.
Further, the contract signatory can will to the signature of the Hash digest store to any of block chain can On the node of trust, to complete the signature of a sub-congruence, such as the contract signatory described in Fig. 2 can be by described to the Kazakhstan In the signature storage to node 3 on block chain of uncommon abstract.
It is understood that the realization process of above-mentioned steps herein described method merely for convenience of description, not structure In pairs in the restriction of herein described method, other different implementations can be obtained by being appropriately modified to above-mentioned steps Mode, such as the sequence of S204 and the sequence of S203 are exchanged.
The method signed using contract provided by the embodiments of the present application, each contract signatory can be by block chain Any node trusty carrys out the signature process that equality participates in electronic contract, while by the Hash digest of contract, each contract label Management side is all recorded on block chain any signature operation of contract, and also ensure contract can not distort and sign process Trackability is encrypted finally for the private data of contract by Digital Envelope Technology, ensure that only contract related side Contract encryption information could be decrypted, possible privacy leakage is asked when effectively preventing using electronic third-party contract platform Topic.
Embodiment three:
The method of the contract signature provided based on the above embodiment, the embodiment of the present application three additionally provide a kind of contract signature Device, illustrate with reference to the accompanying drawing.
Referring to Fig. 3, which is a kind of structure chart of the device for contract signature that the embodiment of the present application three provides.
The embodiment of the present application described device includes: pretreatment unit 301, storage unit 302, acquiring unit 303 and signature Unit 304.
The pretreatment unit 301, for determining the first contract essential information and to first contract text and described First contract essential information is pre-processed to obtain the second contract text and the second contract essential information;The pretreatment includes Encryption and storage are handled.
Further, the pretreatment unit 301 includes: the first subelement 301a, the second subelement 301b, third son list First 301c, the 4th subelement 301d and the 5th subelement 301e.
The first subelement 301a obtains the Hash digest of first contract text simultaneously for the contract initiator First contract text is encrypted to generate second contract text.
Further, it is random by symmetric encipherment algorithm to be specifically used for the contract initiator by the first subelement 301a The symmetric key of generation encrypts the default security part of first contract text.
Further, the default security part includes at least following one such:
Contract title, signatory's main information and contract commencement date and deadline.
The second subelement 301b, for determining the storage of second contract text outside the block chain Location simultaneously encrypts the storage address to generate encrypted storage address.
Further, the second subelement 301b, which encrypt to the storage address, includes:
The storage address is encrypted with the symmetric key.
The third subelement 301c generates the contract key of the contract signatory for the contract initiator.
Further, the third subelement 301c includes: to obtain subelement 301ca and generation subelement 301cb.
The acquisition subelement 301ca, the encryption for obtaining all contract signatories for the contract initiator are public Key;
The generation subelement 301cb, for the contract initiator with the encrypted public key to the symmetric key into Row encrypts and generates the contract key of the contract signatory.
The 4th subelement 301d, for by the Hash digest of first contract text, the encrypted storage Address and the contract key storage are in the first contract essential information.
The 5th subelement 301e, for the symmetric key to the first contract essential information encrypted with Generate the second contract essential information.
The second contract essential information is stored to block chain and is incited somebody to action for contract initiator by the storage unit 302 Outside the second contract text storage to block chain, comprising second contract text in institute in the second contract essential information State the storage address outside block chain.
Further, the storage unit 302 passes through any on the block chain specifically for the contract initiator Block chain node trusty stores the second contract essential information to the block chain.
It is basic to obtain second contract for the contract signatory from the block chain for the acquiring unit 303 Information simultaneously obtains second contract text according to the second contract essential information.
Further, the acquiring unit is specifically used for the contract signatory from any trusted on the block chain Block chain node obtain the second contract essential information.
The signature unit 304 obtains described first according to second contract text for the contract signatory and closes With progress contract signature after text.
Further, single 304 yuan of the signature include: the first decryption subelement 304a, the second decryption subelement 304b, the Three decryption subelement 304c, verification subelement 304d, signature subelement 304e and storing sub-units 304f.
The first decryption subelement 304a, decrypts the contract key using encryption key for the contract signatory To obtain the symmetric key.
The second decryption subelement 304b is encrypted for the contract signatory using described in the symmetric key decryption Storage address afterwards is to obtain the storage address of second contract text.
The third decrypts subelement 304c, for obtaining second contract text according to the storage address and using The symmetric key is decrypted to obtain first contract text.
The verification subelement 304d verifies the content of first contract text for the contract signatory and has signed The signature of the contract signatory of administration's contract.
The signature subelement 304e, for the contract signatory with signature private key to the institute of first contract text Hash digest is stated to sign.
The storing sub-units 304f passes through any area trusty on the block chain for the contract signatory Block chain node sends contract signature request, will be in the storage to block chain of the signature of the Hash digest.
Further, if multiple contract signatories carry out contract signature, described device parallel further include: control unit 305.
Described control unit 305, for when the signature of first contract signatory operates successfully, control to be closed With the signature operation failure of remaining contract signatory of signature to re-start signature.
It is understood that the descriptions such as " first ", " second " in the embodiment of the present application are intended merely to facilitate explanation, It is not the restriction for herein described device.
The device of contract signature provided by the embodiments of the present application, after contract signatory predefines the first contract text, It is by pretreatment unit the first contract essential information determining first and basic to first contract text and first contract Information is pre-processed to obtain the second contract text and the second contract essential information, and the pretreatment includes encryption and deposit Storage processing;Then the second contract essential information is stored to block chain and by second contract text by storage unit It stores outside block chain, includes storage of second contract text outside the block chain in the second contract essential information Address the characteristics of using block chain decentralization, avoids relying in third-party electronic contract platform, while having using block chain Some prevents the characteristic of altered data, fair signature condition can be provided for each signatory of contract, furthermore by described second Outside contract text storage to block chain, it is able to ascend the performance of the block chain;Then pass through acquiring unit from the block chain It is upper to obtain the second contract essential information and second contract text is obtained according to the second contract essential information;Finally First contract text is obtained to carry out contract signature according to second contract text by signature unit.
The device signed using contract provided by the embodiments of the present application, each contract signatory can be by block chain Any node trusty carrys out the signature process that equality participates in electronic contract, while by the Hash digest of contract, each contract label Management side is all recorded on block chain any signature operation of contract, and also ensure contract can not distort and sign process Trackability is encrypted finally for the private data of contract by Digital Envelope Technology, ensure that only contract related side Contract encryption information could be decrypted, possible privacy leakage is asked when effectively preventing using electronic third-party contract platform Topic.
The device of the contract signature includes processor and memory, above-mentioned pretreatment unit, storage unit, acquiring unit It is stored in memory as program unit with unit etc. is signed, above procedure stored in memory is executed by processor Unit realizes corresponding function.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be set one Or more, by adjusting kernel parameter come realize automatized script encapsulate.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include that at least one is deposited Store up chip.
The embodiment of the present application also provides a kind of storage mediums, can store program thereon, and described program is set by electronics The method of the contract signature is realized when standby execution.
Correspondingly, the embodiment of the present application also provides a kind of computer program product, when being executed on data processing equipment When, it is adapted for carrying out the program of initialization there are as below methods step:
It determines the first contract essential information and first contract text and the first contract essential information is carried out pre- Processing is to obtain the second contract text and the second contract essential information;The pretreatment includes that encryption and storage are handled;
The second contract essential information is stored to block chain and stores second contract text by contract initiator To outside block chain, in the second contract essential information comprising storage of second contract text outside the block chain Location;
The contract signatory obtains the second contract essential information from the block chain and closes according to described second Second contract text is obtained with essential information;
The contract signatory carries out contract signature after obtaining first contract text according to second contract text.
Further, the embodiment of the present application also provides a kind of electronic equipment, which includes processor, memory And the program that can be run on a memory and on a processor is stored, processor performs the steps of when executing program
It determines the first contract essential information and first contract text and the first contract essential information is carried out pre- Processing is to obtain the second contract text and the second contract essential information;The pretreatment includes that encryption and storage are handled;
The second contract essential information is stored to block chain and stores second contract text by contract initiator To outside block chain, in the second contract essential information comprising storage of second contract text outside the block chain Location;
The contract signatory obtains the second contract essential information from the block chain and closes according to described second Second contract text is obtained with essential information;
The contract signatory carries out contract signature after obtaining first contract text according to second contract text.
Electronic equipment in the application can be server, PC, PAD, mobile phone etc..
It is understood that described program can be computer program product described above.
It should be appreciated that in this application, " at least one (item) " refers to one or more, and " multiple " refer to two or two More than a."and/or" indicates may exist three kinds of relationships, for example, " A and/or B " for describing the incidence relation of affiliated partner It can indicate: only exist A, only exist B and exist simultaneously tri- kinds of situations of A and B, wherein A, B can be odd number or plural number.Word Symbol "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or"." at least one of following (a) " or its similar expression, refers to Any combination in these, any combination including individual event (a) or complex item (a).At least one of for example, in a, b or c (a) can indicate: a, b, c, " a and b ", " a and c ", " b and c ", or " a and b and c ", and wherein a, b, c can be individually, can also To be multiple.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.The apparatus embodiments described above are merely exemplary, wherein described be used as separate part description Unit and module may or may not be physically separated.Furthermore it is also possible to select it according to the actual needs In some or all of unit and module achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying In the case where creative work, it can understand and implement.
The above is only the specific embodiment of the application, it is noted that for the ordinary skill people of the art For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered It is considered as the protection scope of the application.

Claims (10)

1. a kind of method of contract signature, which is characterized in that the method is applied to the signature of electronic contract, in contract signatory After predefining the first contract text, which comprises
It determines the first contract essential information and first contract text and the first contract essential information is pre-processed To obtain the second contract text and the second contract essential information;The pretreatment includes that encryption and storage are handled;
The second contract essential information is stored to block chain and stores second contract text to area by contract initiator It include storage address of second contract text outside the block chain in the second contract essential information outside block chain;
The contract signatory obtains the second contract essential information from the block chain and according to the second contract base Second contract text described in this acquisition of information;
The contract signatory carries out contract signature after obtaining first contract text according to second contract text.
2. the method for contract according to claim 1 signature, which is characterized in that the encryption includes:
The contract initiator obtains the Hash digest of first contract text and encrypts to first contract text To generate second contract text;
It determines the storage address of second contract text outside the block chain and the storage address is encrypted To generate encrypted storage address;
The contract initiator generates the contract key of the contract signatory.
3. the method for contract signature according to claim 2, which is characterized in that the storage, which is handled, includes:
By the Hash digest of first contract text, the encrypted storage address and the contract key storage described In first contract essential information.
4. the method for contract signature according to claim 3, which is characterized in that described to be carried out to first contract text Encryption includes:
The contract initiator presets first contract text by the symmetric key that symmetric encipherment algorithm generates at random Secret portions are encrypted.
5. the method for contract according to claim 4 signature, which is characterized in that the default security part include at least with Under it is one such:
Contract title, signatory's main information and contract commencement date and deadline.
6. the method for contract signature according to claim 4, which is characterized in that described to be encrypted to the storage address Include:
The storage address is encrypted with the symmetric key.
7. the method for contract signature according to claim 6, which is characterized in that the contract initiator generates the contract The contract key of signatory includes:
The contract initiator obtains the encrypted public key of all contract signatories;
The contract initiator encrypts the symmetric key with the encrypted public key and generates the contract signatory's The contract key.
8. the method for contract signature according to claim 7, which is characterized in that the encryption further include:
The first contract essential information is encrypted with the symmetric key to generate the second contract essential information.
9. the method for contract signature according to claim 8, which is characterized in that the contract signatory is according to described second Contract text obtains first contract text
The contract signatory decrypts the contract key using encryption key to obtain the symmetric key;
The contract signatory obtains second contract using encrypted storage address described in the symmetric key decryption The storage address of text;
Second contract text is obtained according to the storage address and is decrypted using the symmetric key with described in obtaining First contract text.
10. the method for contract signature according to claim 2, which is characterized in that the carry out contract, which is signed, includes:
The contract signatory verifies the signature of the content of first contract text and the contract signatory of signed contract;
The contract signatory is signed with the Hash digest of the signature private key to first contract text;
The contract signatory sends contract signature request by any block chain node trusty on the block chain, will To in the signature storage to block chain of the Hash digest.
CN201910266735.1A 2019-04-03 2019-04-03 Contract signing method and device, electronic equipment and storage medium Active CN109978543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910266735.1A CN109978543B (en) 2019-04-03 2019-04-03 Contract signing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910266735.1A CN109978543B (en) 2019-04-03 2019-04-03 Contract signing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109978543A true CN109978543A (en) 2019-07-05
CN109978543B CN109978543B (en) 2022-03-22

Family

ID=67082857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910266735.1A Active CN109978543B (en) 2019-04-03 2019-04-03 Contract signing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109978543B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737715A (en) * 2020-06-22 2020-10-02 上海黔易数据科技有限公司 A method and system for online signing of a decentralized electronic contract
CN112084521A (en) * 2020-09-27 2020-12-15 中国建设银行股份有限公司 Unstructured data processing method, device and system for block chain
CN113378196A (en) * 2021-06-21 2021-09-10 中山大学 Multi-party contract signing method based on block chain
CN113722749A (en) * 2020-05-26 2021-11-30 北京北信源软件股份有限公司 Data processing method and device for block chain BAAS service based on encryption algorithm

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407430A (en) * 2016-09-27 2017-02-15 北京天德科技有限公司 Complex and intelligent contract state synchronization method based on phase buckets
US20170178127A1 (en) * 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
CN107016543A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 The method of commerce and system of model adaptation in e-commerce platform
CN107403303A (en) * 2017-06-16 2017-11-28 兴业数字金融服务(上海)股份有限公司 A kind of signature method for the electronic contract system that card is deposited based on block chain
CN108537046A (en) * 2017-03-06 2018-09-14 才信网络科技(上海)有限公司 A kind of online contract signature system and method based on block chain technology
CN108898389A (en) * 2018-06-26 2018-11-27 阿里巴巴集团控股有限公司 Blockchain-based content verification method, device, and electronic equipment
CN108960825A (en) * 2018-06-26 2018-12-07 阿里巴巴集团控股有限公司 Electric endorsement method and device, electronic equipment based on block chain
CN109417465A (en) * 2016-02-23 2019-03-01 区块链控股有限公司 Registration and automatic management method of intelligent contracts executed by block chains
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN109558276A (en) * 2018-11-30 2019-04-02 弗洛格(武汉)信息科技有限公司 Block chain standby system, backup method and block chain verification method, verifying system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170178127A1 (en) * 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
CN109417465A (en) * 2016-02-23 2019-03-01 区块链控股有限公司 Registration and automatic management method of intelligent contracts executed by block chains
CN106407430A (en) * 2016-09-27 2017-02-15 北京天德科技有限公司 Complex and intelligent contract state synchronization method based on phase buckets
CN108537046A (en) * 2017-03-06 2018-09-14 才信网络科技(上海)有限公司 A kind of online contract signature system and method based on block chain technology
CN107016543A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 The method of commerce and system of model adaptation in e-commerce platform
CN107403303A (en) * 2017-06-16 2017-11-28 兴业数字金融服务(上海)股份有限公司 A kind of signature method for the electronic contract system that card is deposited based on block chain
CN108898389A (en) * 2018-06-26 2018-11-27 阿里巴巴集团控股有限公司 Blockchain-based content verification method, device, and electronic equipment
CN108960825A (en) * 2018-06-26 2018-12-07 阿里巴巴集团控股有限公司 Electric endorsement method and device, electronic equipment based on block chain
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN109558276A (en) * 2018-11-30 2019-04-02 弗洛格(武汉)信息科技有限公司 Block chain standby system, backup method and block chain verification method, verifying system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113722749A (en) * 2020-05-26 2021-11-30 北京北信源软件股份有限公司 Data processing method and device for block chain BAAS service based on encryption algorithm
CN111737715A (en) * 2020-06-22 2020-10-02 上海黔易数据科技有限公司 A method and system for online signing of a decentralized electronic contract
CN112084521A (en) * 2020-09-27 2020-12-15 中国建设银行股份有限公司 Unstructured data processing method, device and system for block chain
CN112084521B (en) * 2020-09-27 2024-02-09 中国建设银行股份有限公司 Unstructured data processing method, device and system for block chain
CN113378196A (en) * 2021-06-21 2021-09-10 中山大学 Multi-party contract signing method based on block chain
CN113378196B (en) * 2021-06-21 2022-04-15 中山大学 Multi-party contract signing method based on block chain

Also Published As

Publication number Publication date
CN109978543B (en) 2022-03-22

Similar Documents

Publication Publication Date Title
CN110881063B (en) Storage method, device, equipment and medium of private data
US6678270B1 (en) Packet interception system including arrangement facilitating authentication of intercepted packets
JP4593533B2 (en) System and method for updating keys used for public key cryptography
CN112822255B (en) Block chain-based mail processing method, mail sending end, receiving end and equipment
CN110535641B (en) Key management method and apparatus, computer device, and storage medium
CN109978543A (en) A kind of method, apparatus, electronic equipment and the storage medium of contract signature
CN109151053A (en) Anti- quantum calculation cloud storage method and system based on public asymmetric key pond
CN109104271B (en) Digital signature method, device and system
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN113079002B (en) Data encryption method, data decryption method, key management method, medium, and device
CN104809407A (en) Method and system for encrypting, decrypting and verifying cloud storage front end data
CN109347625A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN110417544A (en) A kind of generation method of root key, device and medium
CN102752111A (en) Method and system for preventing electronic signature from being tampered of work form system
CN115550058B (en) Shared file transparent encryption method and system
CN111490874B (en) Distribution network safety protection method, system, device and storage medium
CN109347923A (en) Anti- quantum calculation cloud storage method and system based on unsymmetrical key pond
CN113672955B (en) Data processing method, system and device
CN110401535B (en) Digital certificate generation, secure communication and identity authentication method and device
CN111460463B (en) Electronic certificate preserving and notarizing method, device, equipment and storage medium
CN111756543A (en) Blockchain-based contract signing and verification system and its implementation method
CN109101790B (en) Generate method and device, endorsement method and the device of signature key
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network
CN115664852B (en) Data management method and system based on block chain technology
Nair Data security using a hybrid cryptographic approach in mobile cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200821

Address after: 11, building 310053, Hang Seng tower, 3588 Jiangnan Avenue, Hangzhou, Zhejiang, Binjiang District

Applicant after: HUNDSUN TECHNOLOGIES Inc.

Address before: 310053 323, room 3, Hengsheng building, 3588 Jiangnan Road, Binjiang District, Hangzhou, Zhejiang.

Applicant before: ZHEJIANG JINGTENG NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant