CN108234442A - Obtain method, system and the readable storage medium storing program for executing of contract - Google Patents
Obtain method, system and the readable storage medium storing program for executing of contract Download PDFInfo
- Publication number
- CN108234442A CN108234442A CN201711030640.7A CN201711030640A CN108234442A CN 108234442 A CN108234442 A CN 108234442A CN 201711030640 A CN201711030640 A CN 201711030640A CN 108234442 A CN108234442 A CN 108234442A
- Authority
- CN
- China
- Prior art keywords
- contract
- party
- encrypted
- website
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000004044 response Effects 0.000 claims abstract description 48
- 238000012544 monitoring process Methods 0.000 claims abstract description 37
- 238000007639 printing Methods 0.000 claims description 35
- 238000000605 extraction Methods 0.000 claims description 14
- 238000010586 diagram Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 238000000151 deposition Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of methods for obtaining contract, the described method comprises the following steps:The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are printed;When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is verified, and authorize after being proved to be successful the permission of the website of third party's access preset, so that the third party carries out browsing contract.The invention also discloses a kind of systems and computer readable storage medium for obtaining contract.The present invention enable to third party contract can be carried out browsing check.
Description
Technical field
The present invention relates to block chain technical field more particularly to a kind of obtain the method for contract, system and computer-readable
Storage medium.
Background technology
With the development and the progress of information technology and the development of bit coin and block chain technology of society, open on the market
There is a kind of mode of doing business based on block chain application platform in beginning.When being traded by this mode of doing business, participant
It needs to sign an agreement and contract by number platform of contracting, and for entire block chain, for considerations such as safeties, only
Participant with or monitoring side of having the right the agreement and contract of signing checked, printed, and other third parties and arbitration side
Can not to sign an agreement and contract carry out browsing check, be not easy to third party and agreement and contract monitored and verified.
Invention content
It is a primary object of the present invention to propose a kind of method, system and computer readable storage medium for obtaining contract,
Aim to solve the problem that other third parties and arbitration side can not be to signing an agreement and contract carries out the technical issues of browsing is checked.
To achieve the above object, the present invention provides a kind of method for obtaining contract, the method includes:
The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are beaten
Print;
When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is tested
Card, and the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
Optionally, the step of described pair of contract got is encrypted includes:
Symmetric cryptography is carried out to the contract got;
Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
Optionally, the Quick Response Code includes:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing
Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
Optionally, described the step of being verified to encrypted contract, includes:
Extraction carries out private cipher key during asymmetric encryption, and is solved by the encrypted contract of the private cipher key pair
It is close;
When successful decryption, it is determined that be verified.
Optionally, it before the step of permission of the website for authorizing third party's access preset, further includes:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized
The permission stood.
Optionally, it after described the step of generating corresponding Quick Response Code according to encrypted contract, further includes:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
Optionally, it after described the step of being verified to encrypted contract, further includes:
When failing the authentication, then refuse the request of the website of third party's access preset.
Optionally, it is described after the step of permission of website of third party's access preset is authorized after being proved to be successful, also wrap
It includes:
When detecting that third party enters default website, display third party provides the information for carrying out authentication;
When receiving the information for carrying out authentication, contract is shown, and the carry out authentication that will be received
Information and third party browse contract prompt message be sent to participant.
In addition, to achieve the above object, the present invention also provides a kind of system for obtaining contract, the system for obtaining contract
Including:Block chain, preset website and the program for obtaining contract, the program for obtaining contract is by the block chain, preset
The step of method of acquisition contract as described above is realized when website performs.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
The program for obtaining contract is stored on storage medium, the program for obtaining contract is realized as described above when being executed by processor
The step of obtaining the method for contract.
Method, system and the computer readable storage medium proposed by the present invention for obtaining contract obtains be stored in area first
Number signing platform contract in block chain, and the contract got is encrypted;Then according to the generation pair of encrypted contract
Quick Response Code is answered, so that the participant with print right or monitoring side are printed;It is two-dimentional by scanning when receiving third party
When checking contract instruction of code triggering, verifies encrypted contract, and authorizes third party after being proved to be successful and access in advance
If website permission so that the third party carries out browsing contract, by the above-mentioned means, third party has printing by obtaining
The Quick Response Code that the participant or monitoring side of permission are printed, you can by scanning the two-dimensional code, according to preset website to contract
It is browsed, contract is monitored and is verified, so as to which third party be facilitated to browse contract.
Description of the drawings
Fig. 1 is the flow diagram for the method first embodiment that the present invention obtains contract;
Fig. 2 is the refinement that the present invention obtains the step of contract got in the method second embodiment of contract is encrypted
Flow diagram;
Fig. 3 is that the present invention obtains the thin of the step of being verified in the method 3rd embodiment of contract to encrypted contract
Change flow diagram;
Fig. 4 is the flow diagram for the method sixth embodiment that the present invention obtains contract;
Fig. 5 be the present embodiments relate to acquisition contract system hardware structure schematic diagram.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:The number signing platform being stored in block chain is obtained first to close
About, and to the contract got it is encrypted;Then corresponding Quick Response Code is generated according to encrypted contract, for printing right
The participant or monitoring side of limit are printed;When receive third party by scan the two-dimensional code triggering check contract instruct when,
Encrypted contract is verified, and authorizes after being proved to be successful the permission of the website of third party's access preset, so that described
Third party carries out browsing contract, by the above-mentioned means, third party by acquisition with print right participant or monitoring side into
The Quick Response Code of row printing, you can by scanning the two-dimensional code, browsed to contract according to preset website, monitored to contract
And verification, so as to which third party be facilitated to browse contract.
The embodiment of the present invention is it is considered that in the prior art, for considerations such as safeties, only participant with or have the right to supervise
Prosecutor is checked the agreement and contract of signing, is printed, and other third parties and arbitration side can not be to signing an agreement and closing
It is checked with browsing is carried out, is not easy to third party and agreement and contract are monitored and verified.
For this purpose, the embodiment of the present invention proposes a kind of method for obtaining contract, the number being stored in block chain is obtained first
Signing platform contract, and the contract got is encrypted;Then corresponding Quick Response Code is generated according to encrypted contract, for
Participant or monitoring side with print right are printed;When receiving third party conjunction is checked by scan the two-dimensional code triggering
When about instructing, encrypted contract is verified, and authorizes after being proved to be successful the permission of the website of third party's access preset,
So that the third party carries out browsing contract, by the above-mentioned means, third party by participant of the acquisition with print right or
The Quick Response Code that monitoring side is printed, you can by scanning the two-dimensional code, browsed according to preset website to contract, to contract
It is monitored and is verified, so as to which third party be facilitated to browse contract.
The present invention provides a kind of method for obtaining contract.
With reference to Fig. 1, Fig. 1 is the flow diagram for the method first embodiment that the present invention obtains contract.
In the present embodiment, this method includes:
Step S10 obtains the number signing platform contract being stored in block chain, and the contract got is added
It is close;
In the present embodiment, the method for the acquisition contract is applied to the system for obtaining contract, specifically, referring to Fig. 5, figure
5 system architecture schematic diagrams of acquisition contract being related to for the embodiment of the present invention, the system of the acquisition contract include:Block
Chain, preset website and the program for obtaining contract, wherein, specifically, the preset website is common WEB, i.e. third party
Browsing can only be carried out by common WEB and consults contract.
In the present embodiment, since block chain (Blockchain) is by a string of data blocks using cryptography method generation
Composition, each block contains the cryptographic Hash (hash) of a block, since original block (genesis block)
Current block is connected to, forms block chain.Block chain is also the distributed data base system participated in by node, is substantially one and goes
The database account book of centralization is the network platform that Everyone is equal shares, and participates in providing the foundation jointly for crew;Upload to area
The record of block chain is full disclosure, everybody can obtain the copy of all records, and people is encouraged to participate in jointly;With bit coin
Block chain for, each person of participating in business is the node of block network, and each node has a complete public account
Book backs up, and has recite all Transaction Informations since bit coin is born above.Any one node, which initiates trading activity, all to be needed
Each node relevant information being transmitted in block network, so as to which the account book on all nodes can verify that this is handed over
It is easy to be and accurately update.In addition, account book is blockette storage, with the increase of transaction, new data block can be attached to
Through on existing chain, forming chain structure.Simultaneously as block chain is by the restriction that exercises supervision in many ways, therefore, block chain tool
There is the characteristic that can not be distorted, that is, upload to the data of block chain, cannot change, ensure that the authenticity of data.If
There is malicious node to provide false data, then false data will permanently be recorded as the history criminal evidence, so as to greatly reduce false number
According to upload.Therefore, using preserving the contract of signing into block chain in the embodiment of the present invention, so as to ensure that the true of contract
Reality, and contract is prevented to be tampered, after preservation, when needing that contract is encrypted, it is necessary first to which extraction needs to add
Then close contract is ensureing not injuring the base for carrying out the number signing platform security for signing contract and ensureing contract party's privacy
On plinth, the contract extracted is encrypted, wherein, in order to ensure safety of the contract in data transmission procedure, can combine
The encryption thought of symmetric cryptography and asymmetric encryption, has carried out contract multi-layer security, wherein symmetric cryptography refer to send and
For the both sides of reception data using identical key (symmetric key) to being encrypted and decrypted in plain text, encryption/decryption speed is fast, fits
Conjunction handles mass data, but just since encryption and decryption is using same symmetric key, for symmetric key management compared with
For difficulty.And asymmetric encryption then needs two keys:Public-key cryptography (public key) and private cipher key (private key), public key is to other sides
Open, private key then oneself preserves;Public key is a pair of with private key, if data are encrypted with public key, only with corresponding private
Key could be decrypted;If data are encrypted with private key, then could only be decrypted with corresponding public key;Added due to asymmetric
Close algorithm is complicated so that the speed that encrypting and decrypting speed does not have symmetric cryptography to decrypt is fast, but due to encryption and decryption key not
Together, thus its safety be better than symmetric cryptography.
Step S20 generates corresponding Quick Response Code, for the participant with print right or monitoring according to encrypted contract
Fang Jinhang is printed;
After contract is encrypted, Quick Response Code is corresponded to according to the Symmetric key generation for carrying out symmetric cryptography, will closed
After being about stored in corresponding block chain node, participant or monitoring side can be checked and be carried out to the contract of preservation
Printing, and after contract is printed, printing Quick Response Code, the Quick Response Code that third party passes through scanning and printing can be carried out, you can it obtains
Corresponding treaty content on block chain node, it is to be understood that third party may only be to corresponding contract on block chain node
Content carries out browsing and checks, and cannot modify.
Further, the Quick Response Code includes:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing
Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
The symmetric key obtained behind address and progress symmetric cryptography comprising the common WEB of access i.e. in Quick Response Code, from
And the browsing of contract is checked by the common WEB and symmetric key realization.
Step S30, when receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, to encrypted conjunction
About verified, and authorize after being proved to be successful the permission of the website of third party's access preset so that the third party carry out it is clear
Look at contract.
In participant or monitoring side printing Quick Response Code, and after third party gets Quick Response Code, third party can be by sweeping
The Quick Response Code got is retouched, contract is checked so as to fulfill browsing, therefore, in third party by scanning the two-dimensional code, and triggers and checks
When contract instructs, encrypted contract is verified first, i.e., first by pair after asymmetric encryption in Quick Response Code
Key is claimed to be decrypted, in embodiments of the present invention, the symmetric key after asymmetric encryption may only be by public
WEB be decrypted, therefore, receive check contract instruction when, first by it is described check contract instruction be committed to it is common
WEB is decrypted the symmetric key after asymmetric encryption by common WEB, after by decryption, third
Side can obtain the permission for accessing common WEB, and then whether the symmetric key further in verification Quick Response Code is correct, when described
When symmetric key is correct, third party can carry out browsing contract.
The method of acquisition contract that the present embodiment proposes obtains the number signing platform being stored in block chain and closes first
About, and to the contract got it is encrypted;Then corresponding Quick Response Code is generated according to encrypted contract, for printing right
The participant or monitoring side of limit are printed;When receive third party by scan the two-dimensional code triggering check contract instruct when,
Encrypted contract is verified, and authorizes after being proved to be successful the permission of the website of third party's access preset, so that described
Third party carries out browsing contract, by the above-mentioned means, third party by acquisition with print right participant or monitoring side into
The Quick Response Code of row printing, you can by scanning the two-dimensional code, browsed to contract according to preset website, monitored to contract
And verification, so as to which third party be facilitated to browse contract.
Further, with reference to Fig. 2, the method first embodiment that contract is obtained based on the present invention proposes that the present invention obtains contract
Method second embodiment.
In the present embodiment, the step S10 includes:
Step S11 carries out symmetric cryptography to the contract got;
Step S12 carries out asymmetric public key encryption to the symmetric key of the symmetric cryptography by the preset website.
In the present embodiment, in order to ensure safety of the contract in data transmission procedure, can combine symmetric cryptography and
The encryption thought of asymmetric encryption has carried out contract multi-layer security, and wherein symmetric cryptography refers to send and receive the double of data
Using identical key (symmetric key) to being encrypted and decrypted in plain text, encryption/decryption speed is fast for side, is suitble to mass data
It is handled, but just since encryption and decryption is using same symmetric key, it is more difficult for the management of symmetric key.It is rather than right
Encryption is claimed then to need two keys:Public-key cryptography (public key) and private cipher key (private key), public key are disclosed to other sides, private key then from
Oneself preserves;Public key is a pair of with private key, if data are encrypted with public key, could only be decrypted with corresponding private key;Such as
Fruit is encrypted data with private key, then could only be decrypted with corresponding public key;Since the algorithm of asymmetric encryption is complicated,
So that the speed that encrypting and decrypting speed does not have symmetric cryptography to decrypt is fast, but since the key of encryption and decryption is different, thus its safety
Property be better than symmetric cryptography.
Therefore, the present embodiment, since if symmetric key is shown in plain text, is just destroyed using first symmetric cryptography is carried out to contract
Therefore the safety of contract, further carries out asymmetric encryption, so as to ensure that the safety of contract to the symmetric key.
The method of acquisition contract that the present embodiment proposes, by carrying out symmetric cryptography to the contract got;Then to institute
The symmetric key for stating symmetric cryptography carries out asymmetric public key encryption by the preset website, so as to ensure that the safety of contract
Property.
Further, with reference to Fig. 3, the method first embodiment that contract is obtained based on the present invention proposes that the present invention obtains contract
Method 3rd embodiment.
In the present embodiment, the step S30 includes:
Step S31, extraction carries out private cipher key during asymmetric encryption, and passes through the encrypted conjunction of the private cipher key pair
About it is decrypted;
Step S32, when successful decryption, it is determined that be verified.
In the present embodiment, due to consideration that symmetric key is shown in plain text, the safety of contract is just destroyed, in order to ensure pair
Claim the safety of key, the mode that the encryption of symmetric key can be used asymmetric encryption carries out, i.e., using unsymmetrical key group
In public-key cryptography be encrypted, and the corresponding private cipher key of this public-key cryptography must be existed only in common WEB, in this way
It just can guarantee that Public Key encrypted content can not be decrypted in other third parties, so as to improve safety, therefore, can adopt
It is encrypted with the shared key pair symmetric key of unsymmetrical key.
Therefore, encrypted contract is verified and is decrypted as to encrypted symmetric key, specifically, can be led to
Private cipher key during asymmetric encryption is crossed, to being decrypted by the symmetric key after asymmetric encryption, due to described privately owned close
Key is stored in common WEB, therefore, the private cipher key first in common WEB during extraction progress asymmetric encryption, and lead to
The encrypted symmetric key of the private cipher key pair is crossed to be decrypted;When successful decryption, it is determined that be verified.
Further, it after described the step of being verified to encrypted contract, further includes:
When failing the authentication, then refuse the request of the website of third party's access preset.
It is decrypted when by the encrypted symmetric key of the private cipher key pair;When decrypting failure, it is determined that test
Card failure, then refuse the request of the website of third party's access preset.
Further, the method first embodiment for contract being obtained based on the present invention proposes that the present invention obtains the method the of contract
Four embodiments.
In the present embodiment, it before the step of permission of the website for authorizing third party's access preset, further includes:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized
The permission stood.
In the present embodiment, it after it will be decrypted by the encrypted symmetric key of the private cipher key pair, needs
Further the symmetric key is verified, that is, when verifying the symmetric key that includes of current two-dimension and carrying out symmetric cryptography
Whether symmetric key is consistent, specifically, obtains the symmetric key in the Quick Response Code verified by common WEB;Then by described in
Symmetric key is compared with symmetric key when carrying out symmetric cryptography;When the symmetric key is with carrying out pair during symmetric cryptography
When claiming key agreement, the permission of the website of third party's access preset is authorized.
Further, the method first embodiment for contract being obtained based on the present invention proposes that the present invention obtains the method the of contract
Five embodiments.
In the present embodiment, it after described the step of generating corresponding Quick Response Code according to encrypted contract, further includes:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
In the present embodiment, when receiving the two-dimentional code instruction of printing, need verification triggering print command participant or
Whether monitoring side has the permission of printing, the participant or monitoring side of extraction triggering print command;It is specifically as follows extraction to participate in
Then side or the authentication information of monitoring side judge whether the participant or monitoring side have according to the authentication information
The permission of standby printing Quick Response Code;If the participant or monitoring side have the permission of printing Quick Response Code, the printing two is performed
Code instruction is tieed up, carries out Quick Response Code printing.
Further, with reference to Fig. 4, the method first embodiment that contract is obtained based on the present invention proposes that the present invention obtains contract
Method sixth embodiment.
In the present embodiment, after the step S30 it the step of, further includes:
Step S40, when detecting that third party enters default website, display third party provides the letter for carrying out authentication
Breath;
Step S50 when receiving the information for carrying out authentication, contract is shown, and the progress that will be received
The prompt message that the information of authentication and third party browse contract is sent to participant.
In the present embodiment, it is decrypted when by the encrypted symmetric key of the private cipher key pair;Work as successful decryption
When, and when the symmetric key that includes of current two-dimension is consistent with symmetric key when carrying out symmetric cryptography, when detecting third
When side enters default website, display third party provides the information for carrying out authentication;The third party of contract will be browsed by reminding
Authentication information is inputted, so as to obtain the third-party identity for carrying out browsing contract, and works as and receives carry out authentication
Information when, contract is shown, the information of the progress authentication received and third party are then browsed into carrying for contract
Show that information is sent to participant, so that participant knows that contract is browsed, and know the third-party identity of browsing contract.
The present invention further provides a kind of systems for obtaining contract.
As shown in figure 5, the system of the acquisition contract can include:Processor 1001, such as CPU, network interface 1004 are used
Family interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to implement the company between these components
Connect letter.User interface 1003 can include display screen (Display), input unit such as keyboard (Keyboard), can be selected
Family interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 can optionally include standard
Wireline interface, wireless interface (such as Wi-Fi interface).Memory 1005 can be depositing for high-speed RAM memory or stabilization
Reservoir (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned place
Manage the storage device of device 1001.
Optionally, the system for obtaining contract can also include user interface, network interface, camera, RF (Radio
Frequency, radio frequency) circuit, sensor, voicefrequency circuit, WiFi module etc..User interface can include display screen
(Display), input unit such as keyboard (Keyboard), optional user interface can also include wireline interface, the nothing of standard
Line interface.Network interface can optionally include standard wireline interface and wireless interface (such as WI-FI interfaces).
It is closed it will be understood by those skilled in the art that the system structure of acquisition contract shown in Fig. 5 is not formed to obtaining
The restriction of system about can include either combining certain components or different components than illustrating more or fewer components
Arrangement.
As shown in figure 5, as that can include operating system in a kind of memory 1005 of computer storage media and obtain
Take the program of contract.Wherein, operating system is management and obtains the hardware of system of contract and the program of software resource, supports to obtain
Take the operation of the program and other software or program of contract.
In the system of acquisition contract shown in Fig. 5, network interface 1004 is mainly used for connecting background server, with backstage
Server is into row data communication;User interface 1003 is mainly used for connecting client, with client into row data communication;And it handles
Device 1001 can be used for calling the program of acquisition contract stored in memory 1005, and perform following operate:
The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are beaten
Print;
When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is tested
Card, and the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
Symmetric cryptography is carried out to the contract got;
Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing
Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
Extraction carries out private cipher key during asymmetric encryption, and is solved by the encrypted contract of the private cipher key pair
It is close;
When successful decryption, it is determined that be verified.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized
The permission stood.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
When failing the authentication, then refuse the request of the website of third party's access preset.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with
Realize following steps:
When detecting that third party enters default website, display third party provides the information for carrying out authentication;
When receiving the information for carrying out authentication, contract is shown, and the carry out authentication that will be received
Information and third party browse contract prompt message be sent to participant.
Each embodiment of method that the present invention obtains the specific embodiment and above-mentioned acquisition contract of the system of contract is essentially identical,
Therefore not to repeat here.
The present invention further provides a kind of computer readable storage medium, the computer-readable recording medium storage has one
A or multiple programs, one or more of programs can be performed by one or more processor, to realize following steps:
The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are beaten
Print;
When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is tested
Card, and the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
Symmetric cryptography is carried out to the contract got;
Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing
Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
Extraction carries out private cipher key during asymmetric encryption, and is solved by the encrypted contract of the private cipher key pair
It is close;
When successful decryption, it is determined that be verified.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized
The permission stood.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
When failing the authentication, then refuse the request of the website of third party's access preset.
Further, one or more of programs can be performed by one or more of processors, also realize with
Lower step:
When detecting that third party enters default website, display third party provides the information for carrying out authentication;
When receiving the information for carrying out authentication, contract is shown, and the carry out authentication that will be received
Information and third party browse contract prompt message be sent to participant.
The method and acquisition contract of the specific embodiment of computer readable storage medium of the present invention and above-mentioned acquisition contract
Each embodiment of system is essentially identical, and therefore not to repeat here.
It should also be noted that, herein, term " comprising ", "comprising" or its any other variant are intended to non-
It is exclusive to include, so that process, method, article or device including a series of elements not only include those elements,
But also it including other elements that are not explicitly listed or further includes solid by this process, method, article or device
Some elements.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including
Also there are other identical elements in the process of the element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes
Be engaged in device, air conditioner or the network equipment etc.) method that performs each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
- A kind of 1. method for obtaining contract, which is characterized in that the described method comprises the following steps:The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are printed;When receive third party by scan the two-dimensional code triggering check contract instruct when, encrypted contract is verified, And the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
- 2. the method for contract is obtained as described in claim 1, which is characterized in that the described pair of contract got was encrypted Step includes:Symmetric cryptography is carried out to the contract got;Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
- 3. the method for contract is obtained as described in claim 1, which is characterized in that the Quick Response Code includes:The uniform resource locator of preset website, wherein, the uniform resource locator includes accessing number signing platform pair It answers the access address of contract and accesses the symmetric key of symmetric cryptography contract.
- 4. the method for contract is obtained as described in claim 1, which is characterized in that described that encrypted contract verified Step includes:Extraction carries out private cipher key during asymmetric encryption, and is decrypted by the encrypted contract of the private cipher key pair;When successful decryption, it is determined that be verified.
- 5. the method for contract is obtained as claimed in claim 4, which is characterized in that the website for authorizing third party's access preset Permission the step of before, further include:Obtain the symmetric key in the Quick Response Code by preset website authentication;The symmetric key and symmetric key when carrying out symmetric cryptography are compared;When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the website of third party's access preset is authorized Permission.
- 6. the method for contract is obtained as described in claim 1, which is characterized in that described generated according to encrypted contract corresponds to After the step of Quick Response Code, further include:When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;Judge whether the participant or monitoring side have the permission of printing Quick Response Code;If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
- 7. the method for contract is obtained as described in claim 1, which is characterized in that described that encrypted contract verified After step, further include:When failing the authentication, then refuse the request of the website of third party's access preset.
- 8. the method for obtaining contract such as claim 1-7 any one of them, which is characterized in that described to be authorized after being proved to be successful After the step of permission of the website of third party's access preset, further include:When detecting that third party enters default website, display third party provides the information for carrying out authentication;When receiving the information for carrying out authentication, contract is shown, and the letter of progress authentication that will be received The prompt message that breath and third party browse contract is sent to participant.
- 9. a kind of system for obtaining contract, which is characterized in that the system for obtaining contract includes:Block chain, preset website And the program of contract is obtained, the program for obtaining contract realizes that right such as will when being performed by the block chain, preset website The step of seeking the method for the acquisition contract described in any one of 1 to 8.
- 10. a kind of computer readable storage medium, which is characterized in that acquisition is stored on the computer readable storage medium and is closed Program about, the program for obtaining contract realize such as acquisition described in any item of the claim 1 to 8 when being executed by processor The step of method of contract.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711030640.7A CN108234442B (en) | 2017-10-26 | 2017-10-26 | Method, system and readable storage medium for acquiring contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711030640.7A CN108234442B (en) | 2017-10-26 | 2017-10-26 | Method, system and readable storage medium for acquiring contract |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108234442A true CN108234442A (en) | 2018-06-29 |
CN108234442B CN108234442B (en) | 2020-11-27 |
Family
ID=62654891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711030640.7A Active CN108234442B (en) | 2017-10-26 | 2017-10-26 | Method, system and readable storage medium for acquiring contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108234442B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109166027A (en) * | 2018-07-02 | 2019-01-08 | 阿里巴巴集团控股有限公司 | A kind of loaning bill contract processing method and processing device |
CN109255210A (en) * | 2018-09-27 | 2019-01-22 | 上海点融信息科技有限责任公司 | The method, apparatus and storage medium of intelligent contract are provided in block chain network |
CN109361654A (en) * | 2018-09-18 | 2019-02-19 | 深圳崀途科技有限公司 | A kind of method and system for negotiating encryption handling business secret based on block chain |
CN109461230A (en) * | 2018-10-01 | 2019-03-12 | 北京洛必达科技有限公司 | A kind of block chain information processing system and method |
CN109635572A (en) * | 2018-11-05 | 2019-04-16 | 深圳变设龙信息科技有限公司 | A kind of contract signing method, apparatus and terminal device based on block chain |
CN110110552A (en) * | 2019-04-30 | 2019-08-09 | 佛山科学技术学院 | A kind of electronics license data sharing method and system based on block chain |
CN110177088A (en) * | 2019-05-08 | 2019-08-27 | 矩阵元技术(深圳)有限公司 | A kind of temporary identity authentication method, apparatus and system |
CN110414937A (en) * | 2019-07-29 | 2019-11-05 | 重庆晨鲸科技有限公司 | Upper chain type electronic signature based on two dimensional code and deposit card method and system |
CN116015935A (en) * | 2022-12-30 | 2023-04-25 | 中国工商银行股份有限公司 | API message processing method and device for signing across mechanisms |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105139188A (en) * | 2015-09-09 | 2015-12-09 | 西南大学 | On-line electronic contract signing method based on mobile terminal |
CN105912283A (en) * | 2016-04-29 | 2016-08-31 | 邓迪 | Block chain based printer and realization method |
US20160314550A1 (en) * | 2015-04-23 | 2016-10-27 | Adobe Systems Incorporated | Limited user contract content sharing |
CN106951943A (en) * | 2017-03-13 | 2017-07-14 | 江苏信源久安信息科技有限公司 | Believable electronic contract is printed as paper contract and restores the method for electronic contract again |
CN107273759A (en) * | 2017-05-08 | 2017-10-20 | 上海点融信息科技有限责任公司 | Method, equipment and computer-readable recording medium for protecting block chain data |
-
2017
- 2017-10-26 CN CN201711030640.7A patent/CN108234442B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160314550A1 (en) * | 2015-04-23 | 2016-10-27 | Adobe Systems Incorporated | Limited user contract content sharing |
CN105139188A (en) * | 2015-09-09 | 2015-12-09 | 西南大学 | On-line electronic contract signing method based on mobile terminal |
CN105912283A (en) * | 2016-04-29 | 2016-08-31 | 邓迪 | Block chain based printer and realization method |
CN106951943A (en) * | 2017-03-13 | 2017-07-14 | 江苏信源久安信息科技有限公司 | Believable electronic contract is printed as paper contract and restores the method for electronic contract again |
CN107273759A (en) * | 2017-05-08 | 2017-10-20 | 上海点融信息科技有限责任公司 | Method, equipment and computer-readable recording medium for protecting block chain data |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109166027A (en) * | 2018-07-02 | 2019-01-08 | 阿里巴巴集团控股有限公司 | A kind of loaning bill contract processing method and processing device |
CN109361654A (en) * | 2018-09-18 | 2019-02-19 | 深圳崀途科技有限公司 | A kind of method and system for negotiating encryption handling business secret based on block chain |
CN109361654B (en) * | 2018-09-18 | 2021-10-26 | 广州市溢信科技股份有限公司 | Method and system for managing business secret based on block chain negotiation encryption |
CN109255210A (en) * | 2018-09-27 | 2019-01-22 | 上海点融信息科技有限责任公司 | The method, apparatus and storage medium of intelligent contract are provided in block chain network |
CN109461230A (en) * | 2018-10-01 | 2019-03-12 | 北京洛必达科技有限公司 | A kind of block chain information processing system and method |
CN109635572A (en) * | 2018-11-05 | 2019-04-16 | 深圳变设龙信息科技有限公司 | A kind of contract signing method, apparatus and terminal device based on block chain |
CN110110552A (en) * | 2019-04-30 | 2019-08-09 | 佛山科学技术学院 | A kind of electronics license data sharing method and system based on block chain |
CN110177088A (en) * | 2019-05-08 | 2019-08-27 | 矩阵元技术(深圳)有限公司 | A kind of temporary identity authentication method, apparatus and system |
CN110177088B (en) * | 2019-05-08 | 2021-09-21 | 矩阵元技术(深圳)有限公司 | Temporary identity authentication method, device and system |
CN110414937A (en) * | 2019-07-29 | 2019-11-05 | 重庆晨鲸科技有限公司 | Upper chain type electronic signature based on two dimensional code and deposit card method and system |
CN116015935A (en) * | 2022-12-30 | 2023-04-25 | 中国工商银行股份有限公司 | API message processing method and device for signing across mechanisms |
Also Published As
Publication number | Publication date |
---|---|
CN108234442B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108234442A (en) | Obtain method, system and the readable storage medium storing program for executing of contract | |
US8209744B2 (en) | Mobile device assisted secure computer network communication | |
US9094823B2 (en) | Data processing for securing local resources in a mobile device | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
CN107948736A (en) | A kind of audio and video preservation of evidence method and system | |
CN102413464B (en) | GBA (General Bootstrapping Architecture)-based secret key negotiation system and method of telecommunication capability open platform | |
CN101401465B (en) | Method and system for recursive authentication in a mobile network | |
CN110519268B (en) | Voting method, device, equipment, system and storage medium based on block chain | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
CN106302502A (en) | A kind of secure access authentication method, user terminal and service end | |
CN108537046A (en) | A kind of online contract signature system and method based on block chain technology | |
WO2017201809A1 (en) | Communication method and system for terminal | |
CN107359998A (en) | A kind of foundation of portable intelligent password management system and operating method | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
WO2017185450A1 (en) | Method and system for authenticating terminal | |
CN105591744A (en) | Network real-name authentication method and system | |
CN113515756B (en) | High-credibility digital identity management method and system based on block chain | |
CN103327034A (en) | Safe login method, system and device | |
CN109254734A (en) | A kind of date storage method, device, equipment and computer readable storage medium | |
CN105681340A (en) | Digital certificate use method and apparatus | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN106533693A (en) | Access method and device of railway vehicle monitoring and maintenance system | |
CN101309147A (en) | A method of identity authentication based on image password | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN109740319A (en) | Digital authentication method and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |