[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2021218166A1 - 合同文签方法、装置、设备及计算机可读存储介质 - Google Patents

合同文签方法、装置、设备及计算机可读存储介质 Download PDF

Info

Publication number
WO2021218166A1
WO2021218166A1 PCT/CN2020/135334 CN2020135334W WO2021218166A1 WO 2021218166 A1 WO2021218166 A1 WO 2021218166A1 CN 2020135334 W CN2020135334 W CN 2020135334W WO 2021218166 A1 WO2021218166 A1 WO 2021218166A1
Authority
WO
WIPO (PCT)
Prior art keywords
contract
file
signing
decrypted
signature
Prior art date
Application number
PCT/CN2020/135334
Other languages
English (en)
French (fr)
Inventor
石明川
周琨
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021218166A1 publication Critical patent/WO2021218166A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/106Display of layout of documents; Previewing

Definitions

  • This application relates to the field of data processing technology, and in particular to a method, device, equipment and computer-readable storage medium for signing a contract.
  • smart contracts are applicable to the integrated process of contract drafting, review, and printing by various companies. From contract drafting template to contract template filling, review process, reviewer solicitation, and solicitor's filling in opinions, functions can all be completed through smart contract; The amount of manual operation for each stage of contract management, drafting, review, and completion has been improved, and the processing efficiency of each stage has been improved. Therefore, smart contracts have been widely used.
  • the inventor realizes that although the current smart contract is widely used, there is also the problem of frequent conversions from downloading and signing to uploading the electronic version, and the number of conversions between the real version and the electronic version. Frequent downloading and uploading conversions affect the processing efficiency of contract documents . Moreover, external factors such as the inconvenience of printing by relevant personnel on business trips may further affect the processing efficiency; at the same time, downloading signatures are prone to forgery. Therefore, the current risk and processing efficiency issues in the current smart contract processing process are technical issues that need to be resolved urgently.
  • a method for signing a contract includes the following steps:
  • Decrypt the contract file generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the decrypted file After the decrypted file is verified, the decrypted file is signed, and after the signature process nodes corresponding to the contract file are all signed, the signing of the contract file is completed.
  • a contract signing device includes:
  • the determining module is used to obtain the contract document, and when a decryption request for the contract document is received, determine the operation authority type of the user account corresponding to the decryption request;
  • a generating module configured to decrypt the contract file, generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the signature module is used to sign the decrypted file after the decrypted file is verified, and complete the contract file after the signature process nodes corresponding to the contract file are signed Textbook.
  • a contract signing device comprising a memory, a processor, and a contract signing program stored on the memory and running on the processor, the contract signing program being processed by the The following steps are implemented when the device is executed:
  • Decrypt the contract file generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the decrypted file After the decrypted file is verified, the decrypted file is signed, and after the signature process nodes corresponding to the contract file are all signed, the signing of the contract file is completed.
  • Decrypt the contract file generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the decrypted file After the decrypted file is verified, the decrypted file is signed, and after the signature process nodes corresponding to the contract file are all signed, the signing of the contract file is completed.
  • This application avoids frequent downloading, uploading and conversion of contract documents, and ensures processing efficiency.
  • FIG. 1 is a schematic diagram of the structure of the contract signing device of the hardware operating environment involved in the solution of the embodiment of the application;
  • FIG. 2 is a schematic flowchart of the first embodiment of the method for signing a contract for applying for
  • Fig. 3 is a schematic diagram of functional modules of a preferred embodiment of a device for signing a contract of the application.
  • FIG. 1 is a schematic diagram of the structure of a contract signing device of a hardware operating environment involved in a solution of an embodiment of the present application.
  • the contract signing device in the embodiment of the present application may be a PC, or a portable terminal device such as a tablet computer and a portable computer.
  • the contract signing device may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high-speed RAM memory, or a stable memory (non-volatile memory), such as a magnetic disk memory.
  • the memory 1005 may also be a storage device independent of the aforementioned processor 1001.
  • the structure of the contract signing device shown in FIG. 1 does not constitute a limitation on the contract signing device, and may include more or less components than shown, or a combination of certain components, or different components.
  • the layout of the components does not constitute a limitation on the contract signing device, and may include more or less components than shown, or a combination of certain components, or different components. The layout of the components.
  • the memory 1005 which is a computer-readable storage medium, may include an operating system, a network communication module, a user interface module, and a detection program.
  • the network interface 1004 is mainly used to connect to the back-end server and communicate with the back-end server;
  • the user interface 1003 is mainly used to connect to the client (user side) to communicate with the client;
  • the processor 1001 can be used to call the detection program stored in the memory 1005 and perform the following operations:
  • Decrypt the contract file generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the decrypted file After the decrypted file is verified, the decrypted file is signed, and after the signature process nodes corresponding to the contract file are all signed, the signing of the contract file is completed.
  • step of decrypting the contract file to generate a decrypted file corresponding to the type of operation authority includes:
  • the operation authority type is an editing type, converting the decrypted contract document into a contract text that supports editing, and using the contract text that supports editing as a decrypted file;
  • the operation authority type is a signature type
  • the signing authority is not the full authority, it is determined whether the signing authority supports the signing of the contract document, and if it supports the signing of the contract document, the decrypted contract document is converted to support The signed contract text, and the signed contract text as the decrypted file.
  • the decrypted contract document is displayed in a preset format.
  • step of verifying the decrypted file includes:
  • the operation permission type is the edit type
  • extract the text information and the first signed information in the decrypted file display the text information, and after receiving the modified information sent based on the displayed text information
  • modify the text information according to the modification information
  • the operation permission type is a signature type
  • extract the second signed information in the decrypted file and search for the second reference information corresponding to the second signed information, according to the second reference
  • the signature verifies the second signed information.
  • step of signing the decrypted file after passing the verification of the decrypted file includes:
  • the decrypted file After the decrypted file is verified, the decrypted file is displayed, and when the electronic signature input based on the displayed decrypted file is obtained, it is determined whether the position of the electronic signature in the decrypted file is Signature position;
  • the location is the signature location, it is determined whether the signature font of the electronic signature is recognizable, and if it is recognizable, the electronic signature and the decrypted file are converted into a signature in a preset format Contract document to sign and seal the decrypted document.
  • step of signing the decrypted file after passing the verification of the decrypted file includes:
  • Image processing is performed on the splicing position of the signature picture in the decrypted file, and the decrypted file after the image processing is converted into a signed contract file in a preset format to sign the decrypted file .
  • the processor 1001 may be used to call the detection program stored in the memory 1005 and perform the following operations:
  • the encrypted signed contract document is transmitted as a new contract document to the signing process node that has not yet been signed, so that the signing process node that has not yet been signed can execute the step of obtaining the contract document until the contract file corresponds to the contract document. All nodes in the signing process are signed.
  • the step of determining the operation authority type of the user account corresponding to the decryption request includes:
  • the operation authority type corresponding to the user account is determined according to the preset correspondence table of account and operation authority.
  • the first embodiment of the present application provides a schematic flowchart of a method for signing a contract.
  • the method for signing a contract includes the following steps:
  • Step S10 Obtain the contract document, and when a decryption request for the contract document is received, determine the operation authority type of the user account corresponding to the decryption request;
  • the contract signing method in this embodiment is applied to a server, and is suitable for the server to sign contract documents.
  • the signature is an electronic signature. Like a digital certificate, it is used as a means of identity verification. It generally refers to everything that exists in electronic form, is attached to and logically related to electronic documents, and can be used to identify electronic document signatures. The identity of the individual, to ensure the integrity of the document, and to indicate that the signatory agrees to the content of the facts stated in the electronic document. Generally speaking, the identification of electronic signatures is from a technical point of view. Mainly refers to the security measures to identify the identity of the parties through specific technical solutions and ensure that the content of the transaction data is not tampered with.
  • Electronic signature is a form of electronic signature. It uses image processing technology to transform electronic signature operations into the same visual effect as paper document stamping operations. At the same time, electronic signature technology is used to ensure the authenticity and integrity of electronic information. The non-repudiation of the signer.
  • contract documents usually involve the signing of multiple links, and different types of contract documents involve different signing links.
  • different signing links there are bound to be differences in the signing links between labor contracts and procurement contracts.
  • the signing links of various contract documents are set as the signing process nodes in advance, and one signing link corresponds to one signing process node.
  • the relevant signing personnel in each signing link use computers, notebooks, smart phones and other terminals to log in to the user account, log in to the server through the user account, and implement the signing of the contract document.
  • the contract drafter enters the drafting contract document through the terminal display interface, and sets the type of the contract document and each signing process node that needs to be signed.
  • the terminal locally finds the encryption method corresponding to the contract document according to the preset comparison table of contract type and encryption method, and encrypts the contract document through the encryption method, where the encryption method can be symmetric encryption or asymmetric encryption.
  • the terminal converts the encrypted contract document into a preset format and transmits the code of the set characterization process node to the server together, so that the server can sign the contract document step by step according to the code, wherein the preset format is preferred It is a PDF (Portable Document Format, portable document format) file format.
  • the PDF file format has the feature of not being freely editable, combined with encrypted transmission to avoid malicious imitation or interception during the transmission of contract documents.
  • the server when the server receives the contract document, it determines the next signing process node according to the code carried by it, and outputs prompt information to the user account of the relevant person of the next signing process node to prompt the contract document to be processed in time.
  • the relevant personnel submit a decryption request based on their user account to request that the contract document be decrypted and displayed.
  • the server After receiving the decryption request, the server reads the account information corresponding to the decryption request, that is, the account information of the user account, so as to determine the type of operation authority of the user account through the account information, that is, the type of operations that can be performed by the relevant personnel.
  • the step of determining the operation permission type of the user account corresponding to the decryption request includes:
  • Step S11 Read the process node identifier carried by the user account, and determine whether the user account has the right to decrypt the contract document according to the process node identifier;
  • the operation of the relevant personnel on the contract document is based on the premise that the relevant personnel can decrypt the encrypted contract document; before determining the operation authority type of the user account through the account information, first determine whether the user account has the decryption authority.
  • the decryption authority is determined by the process node identifier in the account information, read the process node identifier carried in the account information as the process node identifier carried by the user account, and determine whether the process node identifier is a right identifier. If it is a right identifier, it means that the user account has the right to process transactions on the process node and has the right to decrypt. If it is not the authorized identifier, it is determined that the relevant person is not the processing person on the process node, and the user account does not have the authority to decrypt and view the contract document.
  • step S12 if there is a decryption authority for the contract document, the operation authority type corresponding to the user account is determined according to the preset correspondence table of account and operation authority.
  • the operation authority type of the user account Preliminarily set the operation authority of each account as a corresponding relationship table, and perform a traversal operation on the corresponding relationship table to determine the type of operation authority that the account information has in the corresponding relationship table; where the operation authority type includes editing authority, Partial signature authority and all signature authority, etc.
  • Step S20 decrypt the contract file, generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the contract document can be decrypted according to the type of operation authority.
  • the type of operation authority is different, and the type of file generated by decryption is different.
  • the essence of this process is to decrypt the contract document according to the encryption method corresponding to the contract document, and then convert the decrypted contract document according to the type of operation authority to obtain and operate The decrypted file corresponding to the permission type. After that, the decrypted file is verified.
  • the content of verification is whether the user account that uploads the contract file has the authority to draft and upload the contract file, and for other subsequent nodes
  • the signature process node is to verify whether the signature of the previous signature process node is a real signature.
  • step S30 after the decrypted file is verified, the decrypted file is signed, and after the signing process nodes corresponding to the contract file are all signed, the signing of the contract file is completed.
  • the decrypted document is verified, that is, if the current signing process node is the first node for processing the contract document, it is verified that the user account uploading the contract document has the authority to draft and upload the contract document;
  • the signature process node is not the first node for processing the contract document, and the signature of the previous signature process node is verified as a real signature.
  • the decrypted file is signed, and the signature of the current signing process node is added to the decrypted file, and it is judged whether all the signing process nodes corresponding to the contract file are signed. If both are signed, complete the signing process of the contract documents.
  • the signed decrypted file will be encrypted and transmitted to the next signature process node according to the set process sequence of the signature process node to continue to sign according to the above method.
  • Chapter, the signing process of the contract document is not completed until all nodes in the signing process are signed.
  • the operation authority type of the user account that sent the decryption request is determined first, and then the contract document is decrypted to generate the The decrypted file corresponding to the operation permission type, and verify the decrypted file; after the decrypted file is verified, the decrypted file will be signed, and the contract file will be completed after the signature process nodes that need to be signed for the contract file are signed The signature.
  • This application sets different types of operation permissions for different user accounts.
  • a decrypted file corresponding to the type of operation permissions is generated for verification, and the security of the contract documents is ensured from the aspects of password, operation permission type and verification, etc.
  • the node where the contract document needs to be signed is set as the signing process node for signing, avoiding frequent downloading and uploading conversion of contract documents, and ensuring processing efficiency.
  • each signature process node is decrypted one by one, a decrypted file corresponding to the operation permission type of each node is generated for verification, which is beneficial to the security of the entire processing process while ensuring processing efficiency.
  • the steps to decrypt files corresponding to the type include:
  • Step S21 decrypt the contract document, and convert the decrypted contract document according to the type of operation authority
  • the decrypted contract document is converted according to whether the operation authority type is the editing type or the signature type.
  • the edit type means that the user account of the current signing process node can edit the contract document and sign the contract document after editing
  • the signature type means that the user account of the current signing process node can only edit the contract document. Signed.
  • the type of operation authority is not only determined by the preset correspondence table of the operation authority of each account, but also can be distinguished by setting different authority identifiers in the user account. If the carried authority identifier is an edit identifier, the characterizing operation authority type is an edit type; if the carried authority identifier is a signature identifier, the characterizing operation authority type is a signature type.
  • Step S22 if the operation authority type is an editing type, convert the decrypted contract file into a contract text that supports editing, and use the contract text that supports editing as a decrypted file;
  • the decrypted contract text is converted into a contract text that supports editing. Recognize the decrypted text in the contract document in the preset format, and add the recognized text to the document that supports editing, or the text box that supports editing, to obtain the contract text that supports editing.
  • the contract text that supports editing is used as the decrypted file corresponding to the type of operation authority obtained by decryption, so as to facilitate editing and signing.
  • Step S23 If the operation authority type is a signature type, it is determined whether the signature authority corresponding to the signature type is a complete authority, and if it is a complete authority, the decrypted contract document is converted to a signature support The text of the contract, and the text of the contract supporting the signature as the decrypted document;
  • the operation authority type is a signature type
  • the user account of the full authority signifies that the user account of the signing process node has the authority to implement all signatures, which corresponds to the operation authority type of full authority, and the other type of signature is partial authority, that is, the user account only has the authority to implement partial signatures.
  • the full authority and partial authority are determined by different authority sub-identifiers. If the authority sub-identifier determines that the signature authority corresponding to the signature type is the complete authority, the decrypted contract document is converted into a contract text that supports signing. Among them, the text of the contract that supports signatures exists in the form of pictures. Use the signed contract text as the decrypted file corresponding to the type of operation authority obtained after decryption, so as to facilitate subsequent signing.
  • Step S24 if the signing authority is not the full authority, it is determined whether the signing authority supports signing the contract document, and if the signing authority supports the signing of the contract document, the decrypted contract document is determined Convert it into a signed contract text, and use the signed contract text as a decrypted file.
  • the signature authority corresponding to the signature type is not the complete authority, that is, the user account only has the authority to implement part of the signature
  • the contract documents are signed and sealed. If it is supported, the decrypted contract document will be converted into a signed contract text.
  • the signature-supported contract text also exists in the form of pictures, and the signature-supported contract text is also used as a decrypted file corresponding to the type of operation authority obtained by decryption, so as to facilitate subsequent signatures.
  • Step S25 If the signing authority does not support signing the contract document, display the decrypted contract document in a preset format.
  • the decrypted contract document will be displayed in a preset format, that is, in a PDF file format for the current signing process Relevant personnel of the node view.
  • the steps of verifying the decrypted file include:
  • Step S26 If the operation authority type is the edit type, extract the text information and the first signed information in the decrypted file, display the text information, and send the text information based on the display after receiving the text information.
  • modifying information modify the text information according to the modification information;
  • the verification of the decrypted file in this implementation is the verification of the authenticity of the signature performed by the non-first signature process node in the signature process node, that is, the verification of the previous signature process carried in the decrypted file Whether the signature added by the node is a real signature.
  • the operation permission type is the editing type
  • the text information and the first signed information in the decrypted file are extracted.
  • the text information is the text contained in the decrypted file
  • the first signed information is the signature added by the previous signature process node.
  • the extracted text information is displayed for the relevant user to modify the displayed text information based on the user account.
  • the modification information entered for the modification operation is sent to the server, and after receiving the modification information, the server modifies the text information according to it, and displays the modified text information. If the modified text information meets the needs of the relevant user, the relevant user can input an instruction to complete the modification for the displayed text information. After receiving the instruction to complete the modification, the server saves the modified text information as the text information in the new decrypted file.
  • Step S27 searching for a first reference signature corresponding to the first signed information, and verifying the first signed information according to the first reference signature;
  • the reference signature corresponding to the authenticity is set in advance for different signing process nodes, and after the first signed information is extracted from the decrypted file, the reference signature corresponding to the previous signing process node is searched for, As the first reference signature corresponding to the first signed information.
  • the first reference signature and the first signed information are compared to verify the first signed information, that is, to verify whether the first signed information is a real signature. If the comparison of the similarity between the first reference signature and the first signed information is greater than the preset threshold, the verification is determined to be passed and the subsequent signature operation is continued; if the first reference signature and the first signed information are compared If the similarity between chapter information is not greater than the preset threshold, it is determined that the verification has not passed, and the signature process is returned.
  • Step S28 If the operation authority type is a signature type, extract the second signed information in the decrypted file, and search for second reference information corresponding to the second signed information, according to the The second reference signature verifies the second signed information.
  • the operation permission type is the signature type
  • only the second signed information in the decrypted file is extracted, and the second signed information is the signature added by the previous signing process node.
  • search for the reference signature corresponding to the previous signature process node as the second reference signature corresponding to the second signed information.
  • the second reference signature and the second signed information are compared to verify the second signed information, that is, to verify whether the second signed information is a real signature.
  • the verification is determined to be passed, and the subsequent signature operation is continued; if the second reference signature and the second signed information are compared If the similarity between chapter information is not greater than the preset threshold, it is determined that the verification has not passed, and the signature process is returned.
  • This embodiment decrypts the contract file into different types of decrypted files according to different types of operation rights, avoids the risk of unauthorized access, and helps ensure the security of the contract file. At the same time, the decrypted files are verified to avoid forging the signature and ensure the authenticity of the signature; in addition, for the editing type of operation authority, a modification mechanism is set to make the contract document more accurate.
  • a third embodiment of the method for signing a contract of this application is proposed.
  • the steps of signing the decrypted file include:
  • Step S31 After the decrypted file is verified, the decrypted file is displayed, and when the electronic signature input based on the displayed decrypted file is obtained, it is determined that the electronic signature is in the decrypted file. Whether the location is a signature location;
  • the decrypted file is signed.
  • the relevant person signs the decrypted file with an electronic signature
  • the other is that the relevant person’s signature is stored in the form of a picture in advance, and the stored signature picture is used to pair the decrypted file.
  • Signed Specifically, for signing with an electronic signature, after the decrypted file is verified, the decrypted file is output to the terminal held by the relevant person for display, so that the relevant person can input the electronic signature based on the displayed decrypted file and transmit it to the server .
  • the server performs the acquisition operation after detecting the input electronic signature, and detects whether the position of the electronic signature in the decrypted file is the signature position; among them, the signature position is preset for the decrypted file for signing Effective location.
  • Step S32 if the location is the signature location, it is determined whether the signature font of the electronic signature is recognizable, and if it is recognizable, the electronic signature and the decrypted file are converted into a preset format To sign the contract document in order to sign the decrypted document.
  • the acquired signature font of the electronic signature is matched with the preset font to determine whether the signature font of the electronic signature is recognizable . If the similarity between the signature font and the preset font is greater than the preset similarity threshold, it is determined that the signature font matches the preset font, and the signature font of the electronic signature is recognizable. After that, the electronic signature and the decrypted file are converted together to generate a signed contract file in a preset format, and the decrypted file is signed at the current node of the signing process.
  • the steps of signing the decrypted file include:
  • Step S32 after the decrypted file is verified, read the signature picture corresponding to the user account, and stitch the signature picture and the decrypted file;
  • the electronic signature of the relevant person in each signing process node is generated in advance as a signature picture, and an association relationship is formed with the user account of each relevant person Store together.
  • the signature picture corresponding to the user account of the current signature process node is read, and the read signature picture is added to the decrypted file, and the decrypted file is spliced.
  • step S32 image processing is performed on the splicing position of the signature picture in the decrypted file, and the decrypted file after the image processing is converted into a signed contract file in a preset format, so as to perform image processing on the decrypted file Signed.
  • image processing is performed on the stitching position of the signature picture in the decrypted file.
  • Image processing includes but not limited to pixel processing, saturation processing, brightness processing, etc.
  • the integration effect between the signature image and the decrypted file is more obvious.
  • the spliced decrypted file containing the signature image is converted into a signed contract file in a preset format, so as to realize the signature of the decrypted file at the current signing process node.
  • the contract document corresponds to multiple signing process nodes. After the current signing process node completes the signing of the contract document, the contract document will continue to be signed according to the process sequence of the signing process node. Specifically, after the decrypted file is verified, the step of signing the decrypted file includes:
  • Step S33 Determine, according to the file type of the contract document, whether there is an unsigned signature process node after the current signing process node that signs the decrypted file;
  • the signature process node set by the file type of the contract document it is determined whether there is a signature process node that has not yet been signed after the current signature process node signs the decrypted file. That is, according to the process sequence of each signing process node, it is judged whether the contract document is signed at each signing process node.
  • Step S34 if there is a signature process node that has not yet been signed, search for the encryption rule of the signed contract file according to the file type, and encrypt the signed contract file according to the encryption rule;
  • step S35 the encrypted signed contract document is transmitted as a new contract document to the signing process node that has not yet been signed, so that the signed process node that has not yet signed the step of obtaining the contract file until the contract is signed
  • the signature process nodes corresponding to the file are all signed.
  • the encrypted signed contract document is transmitted as a new contract document to the signing process node that has not yet been signed, that is, the next process node to be signed.
  • the signature process node that has not yet signed the new contract document it obtains it, and sends a prompt message to the user account of the relevant person corresponding to the signature process node to prompt the sending of a decryption request to the contract document Decrypt.
  • the operation authority type of the user account is determined, the contract file is decrypted, and a decrypted file corresponding to the operation authority type is generated. After that, the decrypted file is verified, and after the verification is passed, the decrypted file is signed. This cycle continues until each signature process node corresponding to the contract document is signed, and the signature of the contract document is completed.
  • the decrypted file is signed by setting different signing methods, which is beneficial to the realization of the diversity of the signing methods.
  • each signing process node they are all encrypted and decrypted one by one, and a decrypted file corresponding to the operation authority type of each node is generated for verification and then signed, ensuring the security of the entire signing process.
  • this application also provides a contract signing device.
  • Fig. 3 is a schematic diagram of the functional modules of the first embodiment of the apparatus for signing the contract of the application.
  • the contract signing device includes:
  • the determining module 10 is used to obtain a contract document, and when a decryption request for the contract document is received, determine the operation authority type of the user account corresponding to the decryption request;
  • the generating module 20 is configured to decrypt the contract file, generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the signing module 30 is used to sign the decrypted file after the decrypted file is verified, and complete the contract file after the signing process nodes corresponding to the contract file are all signed The signature.
  • the determining module 10 when the contract document is acquired and the decryption request for the contract document is received, the determining module 10 first determines the operation authority type of the user account that sent the decryption request, and then the generating module 20 Decrypt the contract file, generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file; after the decrypted file is verified, the signature module 30 will sign the decrypted file, and the contract file needs to be signed After the signing process nodes are all signed, the signing of the contract documents is completed.
  • This application sets different types of operation permissions for different user accounts.
  • a decrypted file corresponding to the type of operation permissions is generated for verification, and the security of the contract documents is ensured from the aspects of password, operation permission type and verification, etc.
  • the node where the contract document needs to be signed is set as the signing process node for signing, avoiding frequent downloading and uploading conversion of contract documents, and ensuring processing efficiency.
  • each signature process node is decrypted one by one, a decrypted file corresponding to the operation permission type of each node is generated for verification, which is beneficial to the security of the entire processing process while ensuring processing efficiency.
  • the generating module 20 includes:
  • the decryption unit is configured to decrypt the contract document, and convert the decrypted contract document according to the type of operation authority;
  • the first conversion unit is configured to, if the operation authority type is an editing type, convert the decrypted contract file into a contract text that supports editing, and use the contract text that supports editing as a decrypted file;
  • the determining unit is configured to determine whether the signature authority corresponding to the signature type is a complete authority if the operation authority type is a signature type, and if it is a complete authority, convert the decrypted contract document into a support The signed contract text, and the signed contract text as the decrypted document;
  • the second conversion unit is configured to determine whether the signing authority supports the signing of the contract document if the signing authority is not the complete authority, and if the signing authority supports the signing of the contract document, then decrypt the The contract document is converted into a signed contract text, and the signed contract text is used as a decrypted file.
  • the display unit is configured to display the decrypted contract document in a preset format if the signing authority does not support signing the contract document.
  • the generating module 20 includes:
  • the first extracting unit is configured to extract the text information and the first signed information in the decrypted file if the operation authority type is the edit type, display the text information, and display all the information based on the display.
  • modify information sent by the text information modify the text information according to the modification information;
  • a searching unit configured to search for a first reference signature corresponding to the first signed information, and verify the first signed information according to the first reference signature;
  • the second extraction unit is configured to extract the second signed information in the decrypted file if the operation authority type is a signature type, and search for second reference information corresponding to the second signed information , Verifying the second signed information according to the second reference signature.
  • signature module 30 further includes:
  • the display unit is configured to display the decrypted file after the decrypted file is verified, and when the electronic signature input based on the displayed decrypted file is obtained, determine that the electronic signature is in the decrypted file Whether the position in is the signature position;
  • the signature unit is configured to determine whether the signature font of the electronic signature is recognizable if the location is a signature location, and if it is recognizable, convert the electronic signature and the decrypted file into A signed contract document in a preset format to sign the decrypted document.
  • signature module 30 further includes:
  • a splicing unit configured to read the signature picture corresponding to the user account after the decryption file is verified, and to splice the signature picture and the decrypted file;
  • the processing unit is configured to perform image processing on the splicing position of the signature picture in the decrypted file, and convert the decrypted file after the image processing into a signed contract file in a preset format, so as to Decrypt the file for signature.
  • the contract signing device further includes:
  • a judging module for judging whether there is an unsigned signature process node after the current signing process node that signs the decrypted file according to the file type of the contract document;
  • the encryption module is configured to, if there is a signature process node that has not yet been signed, find the encryption rule of the signed contract file according to the file type, and encrypt the signed contract file according to the encryption rule ;
  • the transmission module is used to transmit the encrypted signed contract document as a new contract file to the signing process node that has not yet been signed, so that the signing process node that has not yet signed the signing process node can execute the step of obtaining the contract file until the contract file is exchanged.
  • the signature process nodes corresponding to the contract documents are all signed.
  • the determining module 10 further includes:
  • a reading unit configured to read the process node identifier carried by the user account, and determine whether the user account has the right to decrypt the contract document according to the process node identifier;
  • the determining unit is configured to determine the type of operation authority corresponding to the user account according to a preset correspondence table of account and operation authority if it has the authority to decrypt the contract document.
  • the embodiment of the present application also proposes a computer-readable storage medium.
  • the computer-readable storage medium may be volatile or non-volatile.
  • a contract signing program is stored on the computer-readable storage medium, and the contract signing program is executed by the processor to implement the following steps:
  • Decrypt the contract file generate a decrypted file corresponding to the type of operation authority, and verify the decrypted file;
  • the decrypted file After the decrypted file is verified, the decrypted file is signed, and after the signature process nodes corresponding to the contract file are all signed, the signing of the contract file is completed.
  • the above-mentioned contract document information can also be stored in a node of a blockchain.
  • the blockchain referred to in this application is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the technical solution of this application essentially or the part that contributes to the prior art can be embodied in the form of a software product, and the computer software product is stored in a computer-readable storage medium as described above (such as The ROM/RAM, magnetic disk, optical disk) includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.
  • a terminal device which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种合同文签方法、装置、设备及计算机可读存储介质,所述方法包括:获取合同文件,并当接收到对合同文件的解密请求时,确定与解密请求对应的用户账号的操作权限类型(S10);对合同文件进行解密,生成与操作权限类型对应的解密文件,并对所述解密文件进行验证(S20);在对解密文件验证通过后,对解密文件进行签章,并在与合同文件对应的签章流程节点均进行签章后,完成合同文件的文签(S30)。通过将合同文件需要签章的节点设置为签章流程节点进行签章,并针对各个签章流程节点,均逐一解密,生成与各节点的操作权限类型对应的解密文件进行验证后签章,在确保处理效率的同时有利于整个处理流程的安全性。

Description

合同文签方法、装置、设备及计算机可读存储介质
本申请要求于2020年4月30日提交中国专利局、申请号为CN202010370030.7       ,发明名称为“合同文签方法、装置、设备及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及数据处理技术领域,尤其涉及一种合同文签方法、装置、设备及计算机可读存储介质。
背景技术
当前,智能合同适用于各个公司进行合同起草、审核、用印的一体化流程,从合同起草模板到合同模板填写,审核流程、审核人征求,征求人填写意见等功能皆可通过智能合同完成;减少了对合同管理、起草、审核、完成等各个阶段的人工操作量,提高了各个阶段的处理效率。因此,智能合同得到了广泛的应用。
技术问题
发明人意识到虽然当前智能合同的应用广泛,但也存在从下载签字到上传电子版,现实版与电子版之间转换次数较多的问题,频繁的下载和上传转换影响了合同文件的处理效率。并且,可能因相关人员出差不方便打印等外部因素而进一步影响处理效率;同时,下载签字容易存在伪造的问题。因此,当前智能合同处理流程中所存在的风险性和处理效率问题是亟待解决的技术问题。
技术解决方案
一种合同文签方法,所述合同文签方法包括以下步骤:
获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
一种合同文签装置,所述合同文签装置包括:
确定模块,用于获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
生成模块,用于对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
签章模块,用于在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
一种合同文签设备,所述合同文签设备包括存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的合同文签程序,所述合同文签程序被所述处理器执行时实现如下步骤:
获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
一种计算机可读存储介质,所述计算机可读存储介质上存储有合同文签程序,所述合同文签程序被处理器执行时实现如下步骤:
获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
本申请避免了合同文件的频繁下载和上传转换,确保了处理效率。
附图说明
图1为本申请实施例方案涉及的硬件运行环境的合同文签设备结构示意图;
图2为本申请合同文签方法第一实施例的流程示意图;
图3为本申请合同文签装置较佳实施例的功能模块示意图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
本发明的实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
如图1所示,图1是本申请实施例方案涉及的硬件运行环境的合同文签设备结构示意图。
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本申请的说明,其本身没有特定的意义。因此,“模块”、“部件”或“单元”可以混合地使用。
本申请实施例合同文签设备可以是PC,也可以是平板电脑、便携计算机等可移动式终端设备。
如图1所示,该合同文签设备可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
本领域技术人员可以理解,图1中示出的合同文签设备结构并不构成对合同文签设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图1所示,作为一种计算机可读存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及检测程序。
在图1所示的设备中,网络接口1004主要用于连接后台服务器,与后台服务器进行数据通信;用户接口1003主要用于连接客户端(用户端),与客户端进行数据通信;而处理器1001可以用于调用存储器1005中存储的检测程序,并执行以下操作:
获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
进一步地,所述对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件的步骤包括:
对所述合同文件进行解密,并根据所述操作权限类型,对解密的所述合同文件进行转换;
若所述操作权限类型为编辑类型,则将解密的所述合同文件转换为支持编辑的合同文本,并将支持编辑的合同文本作为解密文件;
若所述操作权限类型为签章类型,则判断与所述签章类型对应的签章权限是否为完整权限,若为完整权限,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件;
若所述签章权限非完整权限,则判断所述签章权限是否支持对所述合同文件进行签章,若支持对所述合同文件进行签章,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件。
若所述签章权限不支持对所述合同文件进行签章,则将解密的所述合同文件以预设格式展示。
进一步地,所述对所述解密文件进行验证的步骤包括:
若所述操作权限类型为编辑类型,则提取所述解密文件中的文本信息和第一已签章信息,将所述文本信息显示,并在接收到基于显示的所述文本信息发送的修改信息时,根据所述修改信息对所述文本信息进行修改;
查找与所述第一已签章信息对应的第一参考签章,并根据所述第一参考签章对所述第一已签章信息进行验证;
若所述操作权限类型为签章类型,则提取所述解密文件中的第二已签章信息,并查找与所述第二已签章信息对应的第二参考信息,根据所述第二参考签章对所述第二已签章信息进行验证。
进一步地,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
在对所述解密文件验证通过后,显示所述解密文件,并在获取到基于显示的所述解密文件输入的电子签章时,判断所述电子签章在所述解密文件中的位置是否为签章位置;
若所述位置为签章位置,则判断所述电子签章的签章字体是否具有识别性,若具有识别性,则将所述电子签章和所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
进一步地,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
在对所述解密文件验证通过后,读取与所述用户账号对应的签章图片,并将所述签章图片和所述解密文件进行拼接;
对所述签章图片在所述解密文件中的拼接位置进行图像处理,并将经图像处理后的所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
进一步地,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤之后,处理器1001可以用于调用存储器1005中存储的检测程序,并执行以下操作:
根据所述合同文件的文件类型,判断对所述解密文件进行签章的当前签章流程节点之后是否存在尚未签章的签章流程节点;
若存在尚未签章的签章流程节点,则根据所述文件类型,查找所述签章合同文件的加密规则,并根据所述加密规则,对所述签章合同文件进行加密;
将加密的所述签章合同文件作为新的合同文件传输到尚未签章的签章流程节点,以供尚未签章的签章流程节点执行获取合同文件的步骤,直到与所述合同文件对应的签章流程节点均进行签章。
进一步地,所述确定与所述解密请求对应的用户账号的操作权限类型的步骤包括:
读取所述用户账号携带的流程节点标识符,并根据所述流程节点标识符,确定所述用户账号是否具有对所述合同文件的解密权限;
若具有对所述合同文件的解密权限,则根据预设的账号与操作权限对应关系表,确定与所述用户账号对应的操作权限类型。
本申请合同文签设备的具体实施方式与下述合同文签方法各实施例基本相同,在此不再赘述。
为了更好的理解上述技术方案,下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
为了更好的理解上述技术方案,下面将结合说明书附图以及具体的实施方式对上述技术方案进行详细的说明。
参照图2,本申请第一实施例提供一种合同文签方法的流程示意图。该实施例中,所述合同文签方法包括以下步骤:
步骤S10,获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
本实施例中的合同文签方法应用于服务器,适用于服务器对合同文件进行文签。其中,文签即为电子签章,与数字证书一样,是用来做为身份验证的一种手段,泛指所有以电子形式存在,依附在电子文件并与其逻辑关联,可用以辨识电子文件签署者身份,保证文件的完整性,并表示签署者同意电子文件所陈述事实的内容。一般来说,对电子签章的认定,都是从技术角度而言的。主要是指通过特定的技术方案来鉴别当事人的身份及确保交易资料内容不被篡改的安全保障措施。电子签章是电子签名的一种表现形式,利用图像处理技术将电子签名操作转化为与纸质文件盖章操作相同的可视效果,同时利用电子签名技术保障电子信息的真实性和完整性以及签名人的不可否认性。
可理解地,合同文件通常涉及到多个环节的签章,且不同类型的合同文件所涉及的签章环节不同,如劳动合同与采购合同之间的签章环节必然存在差异。此外,即便对于同一类型的合同文件,也存在因合同文件内容的不同而具有不同签章环节的情形,如采购价格在100万的采购合同和采购价格在5000万的采购合同之间签章环节的差异性。本实施例预先将各类合同文件的签章环节设置为签章流程节点,一个签章环节对应一个签章流程节点。各个签章环节的相关签章人员使用电脑、笔记本、智能手机等终端进行用户账号登录,通过用户账户登录到服务器,实现对合同文件的签章。
进一步地,在签章流程节点的起始阶段,由合同起草人员通过终端显示界面输入起草合同文件,设定合同文件的类型以及各个需要签章的签章流程节点。终端本地依据预先设定的合同类型与加密方式的对照表,查找与该合同文件对应的加密方式,并通过该加密方式对合同文件进行加密,其中加密方式可以是对称加密也可以是非对称加密。终端将经加密的合同文件转换为预设格式和设定的表征签章流程节点的编码一并传输到服务器,以供服务器根据该编码对合同文件进行逐步签章处理,其中,预设格式优选为PDF(Portable Document Format,便携式文档格式)文件格式,PDF文件格式具有不可随意编辑的特征,结合加密传输来避免合同文件传输过程中被恶意仿制或者拦截。
更进一步地,服务器在接收到合同文件时,根据其携带的编码确定下一个签章流程节点,并向下一个签章流程节点相关人员的用户账号输出提示信息,以提示对合同文件及时处理。相关人员在查看到提示信息后基于其用户账号提交解密请求,以请求将合同文件进行解密展示。服务器在接收到该解密请求后,读取与该解密请求对应的账号信息,即用户账号的账号信息,以通过账号信息来确定用户账号的操作权限类型,即相关人员可进行的操作类型。具体地,确定与解密请求对应的用户账号的操作权限类型的步骤包括:
步骤S11,读取所述用户账号携带的流程节点标识符,并根据所述流程节点标识符,确定所述用户账号是否具有对所述合同文件的解密权限;
可理解地,相关人员对合同文件的操作,以相关人员可对加密的合同文件进行解密为前提;在通过账号信息来确定用户账号的操作权限类型之前,先确定用户账号是否具有解密权限。其中,解密权限通过账号信息中的流程节点标识符确定,读取账号信息中携带的流程节点标识符作为用户账户携带的流程节点标识符,并判断流程节点标识符是否为有权标识符。若为有权标识符,表征用户账号具有处理流程节点上事务的权限,则具有解密权限。若不是有权标识符,则判定相关人员非该流程节点上的处理人员,用户账号不具有对合同文件进行解密查看的权限。
步骤S12,若具有对所述合同文件的解密权限,则根据预设的账号与操作权限对应关系表,确定与所述用户账号对应的操作权限类型。
进一步地,若经确定用户账号具有解密权限,则继续确定用户账号的操作权限类型。预先将各账号所具有的操作权限设置为对应的关系表,对该对应关系表进行遍历操作,确定该账号信息在对应关系表中所具有的操作权限类型;其中,操作权限类型包括编辑权限,部分签章权限和全部签章权限等。
步骤S20,对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
更进一步地,在确定用户账号所具有的操作权限类型后,即可依据该操作权限类型对合同文件进行解密。操作权限类型不同,经解密生成的文件类型不同,该过程其实质为先依据与合同文件对应的加密方式对合同文件进行解密,再依据操作权限类型对经解密的合同文件进行转换,得到与操作权限类型对应的解密文件。此后对解密文件进行验证,其中,对于合同文件上传到服务器后的第一个签章流程节点,验证的内容为上传合同文件的用户账号是否具有权限对合同文件进行起草上传,而对于后续的其他签章流程节点,则验证上一签章流程节点的签章是否为真实签章。
步骤S30,在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
进一步地,在对解密文件验证通过后,即若当前的签章流程节点为合同文件进行处理的第一个节点,则验证上传合同文件的用户账户具有权限对合同文件进行起草上传;若当前的签章流程节点非合同文件进行处理的第一个节点,则验证上一个签章流程节点的签章为真实签章。此后对解密文件进行签章,向解密文件添加当前签章流程节点的签章,并判断与合同文件对应的所有签章流程节点是否均进行签章。若均进行签章,则完成合同文件的文签流程。若存在尚未进行签章的签章流程节点,则依据所设定的签章流程节点的流程顺序,将经签章的解密文件经加密后传输到下一签章流程节点继续依据上述方式进行签章,直到所有签章流程节点均进行签章,才完成合同文件的文签流程。
本实施例的合同文签方法,在获取到合同文件,并接收到对合同文件的解密请求时,先对发送解密请求的用户账号的操作权限类型进行确定,再对合同文件进行解密,生成与操作权限类型对应的解密文件,并验证解密文件;在解密文件验证通过后,则对解密文件进行签章,并在合同文件所需要签章的签章流程节点均进行签章后,完成合同文件的文签。本申请针对不同的用户账号设置不同的操作权限类型,通过对合同文件进行解密,生成与操作权限类型对应的解密文件进行验证,从密码、操作权限类型和验证等方面来确保合同文件的安全性,避免伪造风险;同时将合同文件需要签章的节点设置为签章流程节点进行签章,避免了合同文件的频繁下载和上传转换,确保了处理效率。并且,因针对各个签章流程节点,均逐一进行解密,生成与各节点的操作权限类型对应的解密文件进行验证,在确保处理效率的同时有利于整个处理流程的安全性。
进一步的,基于本申请合同文签方法第一实施例,提出本申请合同文签方法第二实施例,在第二实施例中,所述对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件的步骤包括:
步骤S21,对所述合同文件进行解密,并根据所述操作权限类型,对解密的所述合同文件进行转换;
更进一步地,本实施在依据与合同文件对应的加密方式对合同文件进行解密后,再依据操作权限类型是编辑类型还是签章类型,对经解密的合同文件进行转换。其中,编辑类型即为当前签章流程节点的用户账号可对合同文件进行编辑,并在编辑后对合同文件进行签章;签章类型即为当前签章流程节点的用户账号只可对合同文件进行签章。需要说明的是,本实施例操作权限类型除了通过预先设定的各账号所具有的操作权限的对应关系表确定外,还可通过在用户账号中设定不同的权限标识进行区分。若携带的权限标识为编辑标识,则表征操作权限类型为编辑类型;若携带的权限标识为签章标识,则表征操作权限类型为签章类型。
步骤S22,若所述操作权限类型为编辑类型,则将解密的所述合同文件转换为支持编辑的合同文本,并将支持编辑的合同文本作为解密文件;
进一步,若经对应关系表或者权限标识确定操作权限类型为编辑类型,则将解密的合同文本转换为支持编辑的合同文本。识别经解密的以预设格式存在的合同文件中的文字,并将识别的文字添加到支持编辑的文档,或者支持编辑的文本框中,得到支持编辑的合同文本。将该支持编辑的合同文本作为经解密得到的与操作权限类型对应的解密文件,以便于编辑和签章。
步骤S23,若所述操作权限类型为签章类型,则判断与所述签章类型对应的签章权限是否为完整权限,若为完整权限,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件;
更进一步地,若经对应关系表或者权限标识确定操作权限类型为签章类型,则继续判断与该签章权限类型对应的签章权限是否为完整权限。其中,完整权限表征签章流程节点的用户账号具有实施所有签章的权限,对应于完整权限的操作权限类型,另一种签章类型为部分权限,即用户账号只具有实施部分签章的权限。完整权限和部分权限之间通过不同的权限子标识确定,若经权限子标识确定与签章类型对应的签章权限为完整权限,则将解密的合同文件转换为支持签章的合同文本。其中,支持签章的合同文本以图片形式存在。将该支持签章的合同文本作为经解密得到的与操作权限类型对应的解密文件,以便于后续的签章。
步骤S24,若所述签章权限非完整权限,则判断所述签章权限是否支持对所述合同文件进行签章,若支持对所述合同文件进行签章,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件。
进一步地,若经权限子标识确定与签章类型对应的签章权限非完整权限,即用户账号仅拥有实施部分签章的权限,则判断该部分签章权限是否支持在当前签章流程节点对合同文件实施签章。若支持则将解密的合同文件转换为支持签章的合同文本。该支持签章的合同文本同样以图片形式存在,并同样将该支持签章的合同文本作为经解密得到的与操作权限类型对应的解密文件,以便于后续的签章。
步骤S25,若所述签章权限不支持对所述合同文件进行签章,则将解密的所述合同文件以预设格式展示。
更进一步地,若判定部分签章权限不支持在当前签章流程节点对合同文件实施签章,则将解密的合同文件以预设格式展示,即以PDF文件格式展示,以供当前签章流程节点的相关人员查看。
进一步地,对于操作权限类型为编辑类型和签章类型,在得到解密文件后,则对该解密文件进行验证。具体地,对解密文件进行验证的步骤包括:
步骤S26,若所述操作权限类型为编辑类型,则提取所述解密文件中的文本信息和第一已签章信息,将所述文本信息显示,并在接收到基于显示的所述文本信息发送的修改信息时,根据所述修改信息对所述文本信息进行修改;
更进一步地,本实施对解密文件的验证为针对签章流程节点中非第一个签章流程节点所进行的签章真实性的验证,即验证解密文件中所携带的由上一个签章流程节点添加的签章是否为真实签章。其中,对于操作权限类型为编辑类型的情形,提取解密文件中的文字信息和第一已签章信息。文字信息即为解密文件中所包含的文字,第一已签章信息即为上一签章流程节点添加的签章。对提取的文字信息进行显示,以供相关用户基于用户账号对该显示的文字信息进行修改操作。将进行修改操作所输入的修改信息发送到服务器,服务器在接受到该修改信息后,依据其对文本信息进行修改,并将修改后的文本信息显示。若修改后的文字信息满足相关用户需求,相关用户则可针对显示的文本信息输入完成修改的指令。服务器在接收到完成修改的指令后,对经修改的文本信息进行保存,作为新的解密文件中的文本信息。
步骤S27,查找与所述第一已签章信息对应的第一参考签章,并根据所述第一参考签章对所述第一已签章信息进行验证;
进一步地,预先针对不同的签章流程节点设置有对应表征真实的参考签章,在从解密文件中提取到第一已签章信息之后,则查找上一签章流程节点对应的参考签章,作为与第一已签章信息对应的第一参考签章。将第一参考签章和第一已签章信息进行对比,以对第一已签章信息进行验证,即验证第一已签章信息是否为真实签章。若经对比第一参考签章和第一已签章信息之间的相似度大于预设阈值,则判定验证通过,继续后续的签章操作;若经对比第一参考签章和第一已签章信息之间的相似度不大于预设阈值,则判定验证未通过,退回签章流程。
步骤S28,若所述操作权限类型为签章类型,则提取所述解密文件中的第二已签章信息,并查找与所述第二已签章信息对应的第二参考信息,根据所述第二参考签章对所述第二已签章信息进行验证。
更进一步地,对于操作权限类型为签章类型的情形,则仅提取解密文件中的第二已签章信息,该第二已签章信息即为上一签章流程节点添加的签章。同样地,查找上一签章流程节点对应的参考签章,作为与第二已签章信息对应的第二参考签章。将第二参考签章和第二已签章信息进行对比,以对第二已签章信息进行验证,即验证第二已签章信息是否为真实签章。若经对比第二参考签章和第二已签章信息之间的相似度大于预设阈值,则判定验证通过,继续后续的签章操作;若经对比第二参考签章和第二已签章信息之间的相似度不大于预设阈值,则判定验证未通过,退回签章流程。
本实施例依据不同的操作权限类型,将合同文件解密生成为不同类型的解密文件,避免了越权风险,有利于确保合同文件的安全性。同时对解密文件进行验证,避免了伪造签章,确保了签章的真实性;此外对于编辑类型的操作权限,设置修改机制,以使得合同文件更为准确。
进一步的,基于本申请合同文签方法第一实施例或第二实施例,提出本申请合同文签方法第三实施例,在第三实施例中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
步骤S31,在对所述解密文件验证通过后,显示所述解密文件,并在获取到基于显示的所述解密文件输入的电子签章时,判断所述电子签章在所述解密文件中的位置是否为签章位置;
本实施例在对解密文件验证通过后,则对解密文件进行签章。签章至少包括两种方式,其一由相关人员对解密文件以电子签名的方式进行签章,其二预先将相关人员的签章以图片的形式进行存储,由存储的签章图片对解密文件进行签章。具体地,对于以电子签名的方式进行签章,在解密文件通过验证后,将解密文件输出到相关人员所持有终端进行显示,以供相关人员基于显示的解密文件输入电子签章传输到服务器。服务器在侦测到该输入的电子签章后进行获取操作,并检测该电子签章在解密文件中的位置是否为签章位置;其中,签章位置为对解密文件预先设置的用于签章的有效位置。
步骤S32,若所述位置为签章位置,则判断所述电子签章的签章字体是否具有识别性,若具有识别性,则将所述电子签章和所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
进一步地,若经检测电子签章在解密文件中的位置为签章位置,则将获取的电子签章的签章字体与预设字体匹配,以判断电子签章的签章字体是否具有识别性。若签章字体与预设字体之间的相似度大于预设相似度阈值,则判定签章字体与预设字体匹配,电子签章的签章字体具有识别性。此后将电子签章和解密文件一并进行转换,生成预设格式的签章合同文件,实现对解密文件在当前签章流程节点的签章。
更进一步地,对于第二种签章方式,在对解密文件验证通过后,对解密文件进行签章的步骤包括:
步骤S32,在对所述解密文件验证通过后,读取与所述用户账号对应的签章图片,并将所述签章图片和所述解密文件进行拼接;
具体地,对于以存储的签章图片对解密文件进行签章的方式,预先将各个签章流程节点中相关人员的电子签章生成为签章图片,并和各个相关人员的用户账号形成关联关系一并存储。在解密文件通过验证后,对与当前签章流程节点的用户账号所对应的签章图片进行读取,并将读取的签章图片添加到解密文件中,和解密文件进行拼接。
步骤S32,对所述签章图片在所述解密文件中的拼接位置进行图像处理,并将经图像处理后的所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
进一步地,为了使签章图片和解密文件的拼接效果更为自然,对签章图片在解密文件中的拼接位置进行图像处理,图像处理包括但不限于像素处理、饱和度处理、亮度处理等使签章图像与解密文件之间的一体化效果更为明显的处理方式。在对拼接位置的图像处理完成后,将经拼接包含有签章图片的解密文件转换为预设格式的签章合同文件,实现对解密文件在当前签章流程节点的签章。
可理解地,合同文件对应多个签章流程节点,在当前签章流程节点对合同文件签章完成后,则依据签章流程节点的流程顺序,对合同文件继续签章。具体地,在对解密文件验证通过后,对解密文件进行签章的步骤之后包括:
步骤S33,根据所述合同文件的文件类型,判断对所述解密文件进行签章的当前签章流程节点之后是否存在尚未签章的签章流程节点;
更进一步地,根据合同文件的文件类型所设定的签章流程节点,判断在当前签章流程节点对解密文件进行签章之后,是否存在尚未进行签章的签章流程节点。即依据各个签章流程节点的流程顺序,判断合同文件是否在各个签章流程节点均进行签章。
步骤S34,若存在尚未签章的签章流程节点,则根据所述文件类型,查找所述签章合同文件的加密规则,并根据所述加密规则,对所述签章合同文件进行加密;
进一步地,若当前签章流程节点之后存在尚未签章的签章流程节点,即各个签章流程节点中存在尚未签章的流程节点;则依据各个签章流程节点的流程顺序,确定位于当前签章流程节点之后尚未签章的签章流程节点,作为下一个进行签章的流程节点。同时,调用预先设置的合同文件的文件类型与加密规则之间的对应关系,并将合同文件的文件类型和该对应关系对比,得到与文件类型对应的加密规则,作为签章合同文件的加密规则。此后,依据该加密规则对签章合同文件进行加密,以确保签章合同文件的安全。
步骤S35,将加密的所述签章合同文件作为新的合同文件传输到尚未签章的签章流程节点,以供尚未签章的签章流程节点执行获取合同文件的步骤,直到与所述合同文件对应的签章流程节点均进行签章。
更进一步地,将经加密的签章合同文件作为新的合同文件传输到尚未签章的签章流程节点,即下一个进行签章的流程节点。尚未签章的签章流程节点在侦测到该新的合同文件后,对其进行获取,并向与该签章流程节点对应相关人员的用户账号发送提示信息,以提示发送解密请求对合同文件进行解密。一旦接收到解密请求,则确定该用户账号的操作权限类型,并对合同文件进行解密,生成与操作权限类型对应的解密文件。此后对解密文件进行验证,并在验证通过后,对解密文件进行签章。如此循环,直到合同文件对应的各个签章流程节点均进行签章,完成合同文件的文签。
本实施例通过设置不同的签章方式对解密文件进行签章,有利于签章方式实现的多样性。同时在对各个签章流程节点进行签章过程中,均逐一加解密,并生成与各节点的操作权限类型对应的解密文件进行验证后签章,确保了整个签章流程的安全性。
进一步地,本申请还提供一种合同文签装置。
参照图3,图3为本申请合同文签装置第一实施例的功能模块示意图。所述合同文签装置包括:
确定模块10,用于获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
生成模块20,用于对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
签章模块30,用于在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
本实施例的合同文签装置,在获取到合同文件,并接收到对合同文件的解密请求时,先由确定模块10对发送解密请求的用户账号的操作权限类型进行确定,再由生成模块20对合同文件进行解密,生成与操作权限类型对应的解密文件,并验证解密文件;在解密文件验证通过后,则由签章模块30对解密文件进行签章,并在合同文件所需要签章的签章流程节点均进行签章后,完成合同文件的文签。本申请针对不同的用户账号设置不同的操作权限类型,通过对合同文件进行解密,生成与操作权限类型对应的解密文件进行验证,从密码、操作权限类型和验证等方面来确保合同文件的安全性,避免伪造风险;同时将合同文件需要签章的节点设置为签章流程节点进行签章,避免了合同文件的频繁下载和上传转换,确保了处理效率。并且,因针对各个签章流程节点,均逐一进行解密,生成与各节点的操作权限类型对应的解密文件进行验证,在确保处理效率的同时有利于整个处理流程的安全性。
进一步地,所述生成模块20包括:
解密单元,用于对所述合同文件进行解密,并根据所述操作权限类型,对解密的所述合同文件进行转换;
第一转换单元,用于若所述操作权限类型为编辑类型,则将解密的所述合同文件转换为支持编辑的合同文本,并将支持编辑的合同文本作为解密文件;
判断单元,用于若所述操作权限类型为签章类型,则判断与所述签章类型对应的签章权限是否为完整权限,若为完整权限,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件;
第二转换单元,用于若所述签章权限非完整权限,则判断所述签章权限是否支持对所述合同文件进行签章,若支持对所述合同文件进行签章,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件。
展示单元,用于若所述签章权限不支持对所述合同文件进行签章,则将解密的所述合同文件以预设格式展示。
进一步地,所述生成模块20包括:
第一提取单元,用于若所述操作权限类型为编辑类型,则提取所述解密文件中的文本信息和第一已签章信息,将所述文本信息显示,并在接收到基于显示的所述文本信息发送的修改信息时,根据所述修改信息对所述文本信息进行修改;
查找单元,用于查找与所述第一已签章信息对应的第一参考签章,并根据所述第一参考签章对所述第一已签章信息进行验证;
第二提取单元,用于若所述操作权限类型为签章类型,则提取所述解密文件中的第二已签章信息,并查找与所述第二已签章信息对应的第二参考信息,根据所述第二参考签章对所述第二已签章信息进行验证。
进一步地,所述签章模块30还包括:
显示单元,用于在对所述解密文件验证通过后,显示所述解密文件,并在获取到基于显示的所述解密文件输入的电子签章时,判断所述电子签章在所述解密文件中的位置是否为签章位置;
签章单元,用于若所述位置为签章位置,则判断所述电子签章的签章字体是否具有识别性,若具有识别性,则将所述电子签章和所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
进一步地,所述签章模块30还包括:
拼接单元,用于在对所述解密文件验证通过后,读取与所述用户账号对应的签章图片,并将所述签章图片和所述解密文件进行拼接;
处理单元,用于对所述签章图片在所述解密文件中的拼接位置进行图像处理,并将经图像处理后的所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
进一步地,所述合同文签装置还包括:
判断模块,用于根据所述合同文件的文件类型,判断对所述解密文件进行签章的当前签章流程节点之后是否存在尚未签章的签章流程节点;
加密模块,用于若存在尚未签章的签章流程节点,则根据所述文件类型,查找所述签章合同文件的加密规则,并根据所述加密规则,对所述签章合同文件进行加密;
传输模块,用于将加密的所述签章合同文件作为新的合同文件传输到尚未签章的签章流程节点,以供尚未签章的签章流程节点执行获取合同文件的步骤,直到与所述合同文件对应的签章流程节点均进行签章。
进一步地,所述确定模块10还包括:
读取单元,用于读取所述用户账号携带的流程节点标识符,并根据所述流程节点标识符,确定所述用户账号是否具有对所述合同文件的解密权限;
确定单元,用于若具有对所述合同文件的解密权限,则根据预设的账号与操作权限对应关系表,确定与所述用户账号对应的操作权限类型。
本申请合同文签装置具体实施方式与上述合同文签方法各实施例基本相同,在此不再赘述。
此外,本申请实施例还提出一种计算机可读存储介质,该计算机可读存储介质可以是易失性的,也可以是非易失性的。
计算机可读存储介质上存储有合同文签程序,合同文签程序被处理器执行时实现如下步骤:
获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
本申请计算机可读存储介质的具体实施方式与上述合同文签方法各实施例基本相同,在此不再赘述。
需要强调的是,为进一步保证上述合同文件的私密性和安全性,上述合同文件信息还可以存储于一区块链的节点中。
本申请所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个计算机可读存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (20)

  1. 一种合同文签方法,所述合同文签方法包括以下步骤:
    获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
    对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
    在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
  2. 如权利要求1所述的合同文签方法,其中,所述对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件的步骤包括:
    对所述合同文件进行解密,并根据所述操作权限类型,对解密的所述合同文件进行转换;
    若所述操作权限类型为编辑类型,则将解密的所述合同文件转换为支持编辑的合同文本,并将支持编辑的合同文本作为解密文件;
    若所述操作权限类型为签章类型,则判断与所述签章类型对应的签章权限是否为完整权限,若为完整权限,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件;
    若所述签章权限非完整权限,则判断所述签章权限是否支持对所述合同文件进行签章,若支持对所述合同文件进行签章,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件。
    若所述签章权限不支持对所述合同文件进行签章,则将解密的所述合同文件以预设格式展示。
  3. 如权利要求2所述的合同文签方法,其中,所述对所述解密文件进行验证的步骤包括:
    若所述操作权限类型为编辑类型,则提取所述解密文件中的文本信息和第一已签章信息,将所述文本信息显示,并在接收到基于显示的所述文本信息发送的修改信息时,根据所述修改信息对所述文本信息进行修改;
    查找与所述第一已签章信息对应的第一参考签章,并根据所述第一参考签章对所述第一已签章信息进行验证;
    若所述操作权限类型为签章类型,则提取所述解密文件中的第二已签章信息,并查找与所述第二已签章信息对应的第二参考信息,根据所述第二参考签章对所述第二已签章信息进行验证。
  4. 如权利要求1所述的合同文签方法,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
    在对所述解密文件验证通过后,显示所述解密文件,并在获取到基于显示的所述解密文件输入的电子签章时,判断所述电子签章在所述解密文件中的位置是否为签章位置;
    若所述位置为签章位置,则判断所述电子签章的签章字体是否具有识别性,若具有识别性,则将所述电子签章和所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
  5. 如权利要求1所述的合同文签方法,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
    在对所述解密文件验证通过后,读取与所述用户账号对应的签章图片,并将所述签章图片和所述解密文件进行拼接;
    对所述签章图片在所述解密文件中的拼接位置进行图像处理,并将经图像处理后的所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
  6. 如权利要求4或5所述的合同文签方法,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤之后包括:
    根据所述合同文件的文件类型,判断对所述解密文件进行签章的当前签章流程节点之后是否存在尚未签章的签章流程节点;
    若存在尚未签章的签章流程节点,则根据所述文件类型,查找所述签章合同文件的加密规则,并根据所述加密规则,对所述签章合同文件进行加密;
    将加密的所述签章合同文件作为新的合同文件传输到尚未签章的签章流程节点,以供尚未签章的签章流程节点执行获取合同文件的步骤,直到与所述合同文件对应的签章流程节点均进行签章。
  7. 如权利要求1-5任一项所述的合同文签方法,其中,所述确定与所述解密请求对应的用户账号的操作权限类型的步骤包括:
    读取所述用户账号携带的流程节点标识符,并根据所述流程节点标识符,确定所述用户账号是否具有对所述合同文件的解密权限;
    若具有对所述合同文件的解密权限,则根据预设的账号与操作权限对应关系表,确定与所述用户账号对应的操作权限类型。
  8. 一种合同文签装置,所述合同文签装置包括:
    确定模块,用于获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
    生成模块,用于对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
    签章模块,用于在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
  9. 一种合同文签设备,所述合同文签设备包括存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的合同文签程序,所述合同文签程序被所述处理器执行时实现如下步骤:
    获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
    对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
    在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
  10. 如权利要求9所述的合同文签设备,其中,所述对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件的步骤包括:
    对所述合同文件进行解密,并根据所述操作权限类型,对解密的所述合同文件进行转换;
    若所述操作权限类型为编辑类型,则将解密的所述合同文件转换为支持编辑的合同文本,并将支持编辑的合同文本作为解密文件;
    若所述操作权限类型为签章类型,则判断与所述签章类型对应的签章权限是否为完整权限,若为完整权限,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件;
    若所述签章权限非完整权限,则判断所述签章权限是否支持对所述合同文件进行签章,若支持对所述合同文件进行签章,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件。
    若所述签章权限不支持对所述合同文件进行签章,则将解密的所述合同文件以预设格式展示。
  11. 如权利要求10所述的合同文签设备,其中,所述对所述解密文件进行验证的步骤包括:
    若所述操作权限类型为编辑类型,则提取所述解密文件中的文本信息和第一已签章信息,将所述文本信息显示,并在接收到基于显示的所述文本信息发送的修改信息时,根据所述修改信息对所述文本信息进行修改;
    查找与所述第一已签章信息对应的第一参考签章,并根据所述第一参考签章对所述第一已签章信息进行验证;
    若所述操作权限类型为签章类型,则提取所述解密文件中的第二已签章信息,并查找与所述第二已签章信息对应的第二参考信息,根据所述第二参考签章对所述第二已签章信息进行验证。
  12. 如权利要求9所述的合同文签设备,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
    在对所述解密文件验证通过后,显示所述解密文件,并在获取到基于显示的所述解密文件输入的电子签章时,判断所述电子签章在所述解密文件中的位置是否为签章位置;
    若所述位置为签章位置,则判断所述电子签章的签章字体是否具有识别性,若具有识别性,则将所述电子签章和所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
  13. 如权利要求9所述的合同文签设备,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
    在对所述解密文件验证通过后,读取与所述用户账号对应的签章图片,并将所述签章图片和所述解密文件进行拼接;
    对所述签章图片在所述解密文件中的拼接位置进行图像处理,并将经图像处理后的所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
  14. 如权利要求12或13所述的合同文签设备,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤之后包括:
    根据所述合同文件的文件类型,判断对所述解密文件进行签章的当前签章流程节点之后是否存在尚未签章的签章流程节点;
    若存在尚未签章的签章流程节点,则根据所述文件类型,查找所述签章合同文件的加密规则,并根据所述加密规则,对所述签章合同文件进行加密;
    将加密的所述签章合同文件作为新的合同文件传输到尚未签章的签章流程节点,以供尚未签章的签章流程节点执行获取合同文件的步骤,直到与所述合同文件对应的签章流程节点均进行签章。
  15. 如权利要求9-13任一项所述的合同文签设备,其中,所述确定与所述解密请求对应的用户账号的操作权限类型的步骤包括:
    读取所述用户账号携带的流程节点标识符,并根据所述流程节点标识符,确定所述用户账号是否具有对所述合同文件的解密权限;
    若具有对所述合同文件的解密权限,则根据预设的账号与操作权限对应关系表,确定与所述用户账号对应的操作权限类型。
  16. 一种计算机可读存储介质,所述计算机可读存储介质上存储有合同文签程序,所述合同文签程序被处理器执行时实现如下步骤:
    获取合同文件,并当接收到对合同文件的解密请求时,确定与所述解密请求对应的用户账号的操作权限类型;
    对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件,并对所述解密文件进行验证;
    在对所述解密文件验证通过后,对所述解密文件进行签章,并在与所述合同文件对应的签章流程节点均进行签章后,完成所述合同文件的文签。
  17. 如权利要求16所述的计算机可读存储介质,其中,所述对所述合同文件进行解密,生成与所述操作权限类型对应的解密文件的步骤包括:
    对所述合同文件进行解密,并根据所述操作权限类型,对解密的所述合同文件进行转换;
    若所述操作权限类型为编辑类型,则将解密的所述合同文件转换为支持编辑的合同文本,并将支持编辑的合同文本作为解密文件;
    若所述操作权限类型为签章类型,则判断与所述签章类型对应的签章权限是否为完整权限,若为完整权限,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件;
    若所述签章权限非完整权限,则判断所述签章权限是否支持对所述合同文件进行签章,若支持对所述合同文件进行签章,则将解密的所述合同文件转换为支持签章的合同文本,并将支持签章的合同文本作为解密文件。
    若所述签章权限不支持对所述合同文件进行签章,则将解密的所述合同文件以预设格式展示。
  18. 如权利要求17所述的计算机可读存储介质,其中,所述对所述解密文件进行验证的步骤包括:
    若所述操作权限类型为编辑类型,则提取所述解密文件中的文本信息和第一已签章信息,将所述文本信息显示,并在接收到基于显示的所述文本信息发送的修改信息时,根据所述修改信息对所述文本信息进行修改;
    查找与所述第一已签章信息对应的第一参考签章,并根据所述第一参考签章对所述第一已签章信息进行验证;
    若所述操作权限类型为签章类型,则提取所述解密文件中的第二已签章信息,并查找与所述第二已签章信息对应的第二参考信息,根据所述第二参考签章对所述第二已签章信息进行验证。
  19. 如权利要求16所述的计算机可读存储介质,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
    在对所述解密文件验证通过后,显示所述解密文件,并在获取到基于显示的所述解密文件输入的电子签章时,判断所述电子签章在所述解密文件中的位置是否为签章位置;
    若所述位置为签章位置,则判断所述电子签章的签章字体是否具有识别性,若具有识别性,则将所述电子签章和所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
  20. 如权利要求16所述的计算机可读存储介质,其中,所述在对所述解密文件验证通过后,对所述解密文件进行签章的步骤包括:
    在对所述解密文件验证通过后,读取与所述用户账号对应的签章图片,并将所述签章图片和所述解密文件进行拼接;
    对所述签章图片在所述解密文件中的拼接位置进行图像处理,并将经图像处理后的所述解密文件转换为预设格式的签章合同文件,以对所述解密文件进行签章。
PCT/CN2020/135334 2020-04-30 2020-12-10 合同文签方法、装置、设备及计算机可读存储介质 WO2021218166A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010370030.7A CN111581653A (zh) 2020-04-30 2020-04-30 合同文签方法、装置、设备及计算机可读存储介质
CN202010370030.7 2020-04-30

Publications (1)

Publication Number Publication Date
WO2021218166A1 true WO2021218166A1 (zh) 2021-11-04

Family

ID=72124673

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/135334 WO2021218166A1 (zh) 2020-04-30 2020-12-10 合同文签方法、装置、设备及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN111581653A (zh)
WO (1) WO2021218166A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114663550A (zh) * 2022-03-17 2022-06-24 北京华伟恒远信息系统技术有限公司 用于线上签章的会议管理方法、装置、会议平台及介质
CN115549978A (zh) * 2022-09-04 2022-12-30 昆明理工大学 一种基于区块链的电子签章利用wasm与ipfs的存证验签系统
CN115618805A (zh) * 2022-11-23 2023-01-17 深圳市马博士网络科技有限公司 一种自助电子签章生成系统及方法
CN117114719A (zh) * 2023-10-24 2023-11-24 四川数智云链科技有限公司 基于供应链全流程的数字防伪方法
CN117171817A (zh) * 2023-11-03 2023-12-05 北京点聚信息技术有限公司 基于区块链的电子签章安全管理方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581653A (zh) * 2020-04-30 2020-08-25 平安科技(深圳)有限公司 合同文签方法、装置、设备及计算机可读存储介质
CN112686648B (zh) * 2021-01-31 2024-01-30 重庆渝高科技产业(集团)股份有限公司 一种审核签章文件的电子签名管理方法及系统
CN113885464A (zh) * 2021-10-26 2022-01-04 中国核动力研究设计院 用于核电厂dcs系统算法组态的功能图页电子签名方法
CN114444129B (zh) * 2021-12-28 2024-04-19 航天信息股份有限公司 一种对电子印章进行动态控制的方法及系统
CN117745204B (zh) * 2023-12-04 2024-10-11 武汉海昌信息技术有限公司 一种基于流程引擎的数据处理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460966A (zh) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 基于请求方类别的合同签订方法、装置及终端设备
US20190147027A1 (en) * 2016-07-25 2019-05-16 Feitian Technologies Co., Ltd. Method for concluding electronic contracts and server
CN109784922A (zh) * 2019-01-02 2019-05-21 深圳壹账通智能科技有限公司 电子合同签署方法、装置、计算机设备和存储介质
CN109829317A (zh) * 2018-12-14 2019-05-31 平安科技(深圳)有限公司 一种基于手写签名图片生成电子合同的方法、装置及系统
CN111581653A (zh) * 2020-04-30 2020-08-25 平安科技(深圳)有限公司 合同文签方法、装置、设备及计算机可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190147027A1 (en) * 2016-07-25 2019-05-16 Feitian Technologies Co., Ltd. Method for concluding electronic contracts and server
CN109460966A (zh) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 基于请求方类别的合同签订方法、装置及终端设备
CN109829317A (zh) * 2018-12-14 2019-05-31 平安科技(深圳)有限公司 一种基于手写签名图片生成电子合同的方法、装置及系统
CN109784922A (zh) * 2019-01-02 2019-05-21 深圳壹账通智能科技有限公司 电子合同签署方法、装置、计算机设备和存储介质
CN111581653A (zh) * 2020-04-30 2020-08-25 平安科技(深圳)有限公司 合同文签方法、装置、设备及计算机可读存储介质

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114663550A (zh) * 2022-03-17 2022-06-24 北京华伟恒远信息系统技术有限公司 用于线上签章的会议管理方法、装置、会议平台及介质
CN115549978A (zh) * 2022-09-04 2022-12-30 昆明理工大学 一种基于区块链的电子签章利用wasm与ipfs的存证验签系统
CN115549978B (zh) * 2022-09-04 2024-02-20 昆明理工大学 一种基于区块链的电子签章利用wasm与ipfs的存证验签系统
CN115618805A (zh) * 2022-11-23 2023-01-17 深圳市马博士网络科技有限公司 一种自助电子签章生成系统及方法
CN115618805B (zh) * 2022-11-23 2023-03-17 深圳市马博士网络科技有限公司 一种自助电子签章生成系统及方法
CN117114719A (zh) * 2023-10-24 2023-11-24 四川数智云链科技有限公司 基于供应链全流程的数字防伪方法
CN117114719B (zh) * 2023-10-24 2024-02-09 四川数智云链科技有限公司 基于供应链全流程的数字防伪方法
CN117171817A (zh) * 2023-11-03 2023-12-05 北京点聚信息技术有限公司 基于区块链的电子签章安全管理方法
CN117171817B (zh) * 2023-11-03 2024-01-19 北京点聚信息技术有限公司 基于区块链的电子签章安全管理方法

Also Published As

Publication number Publication date
CN111581653A (zh) 2020-08-25

Similar Documents

Publication Publication Date Title
WO2021218166A1 (zh) 合同文签方法、装置、设备及计算机可读存储介质
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN109951489B (zh) 一种数字身份认证方法、设备、装置、系统及存储介质
US9992026B2 (en) Electronic biometric (dynamic) signature references enrollment method
CN110798315B (zh) 基于区块链的数据处理方法、装置及终端
CN112199721B (zh) 认证信息处理方法、装置、设备及存储介质
JP6296060B2 (ja) e文書に署名するための追加的な確認を備えたアナログデジタル(AD)署名を使用する方法
US11757640B2 (en) Non-fungible token authentication
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US8584016B2 (en) System and method for verifying an electronic document
KR20210044312A (ko) 문서 인증 및 공개 시스템 및 이의 컴퓨터 기반 방법
CN110598433B (zh) 基于区块链的防伪信息处理方法、装置
CN109829317A (zh) 一种基于手写签名图片生成电子合同的方法、装置及系统
KR20170005400A (ko) 암호화 시스템 및 방법
CN110569672A (zh) 一种基于移动设备的高效可信电子签名系统及方法
CN111311259A (zh) 票据处理方法、装置、终端及计算机可读存储介质
JP2016012902A (ja) 電子データ利用システム、携帯端末装置、及び電子データ利用システムにおける方法
CN113129008A (zh) 数据处理方法、装置、计算机可读介质及电子设备
CN111681141A (zh) 文件认证方法、文件认证装置及终端设备
CN102521164B (zh) 移动存储器的访问控制方法、移动存储器及系统
USRE49968E1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110490003B (zh) 用户可信数据生成方法、获取方法、装置及系统
US20240177155A1 (en) Decentralized information transmission system and method thereof
Wahyuni et al. Digitograph: A Mobile Digital Signatures Application for PDF file Using ED25519 and Asymmetric Encryption
WO2021243594A1 (zh) 基于集体验证的部分数据验证方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20934163

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 20.02.2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20934163

Country of ref document: EP

Kind code of ref document: A1