[go: up one dir, main page]

CN108234442A - Obtain method, system and the readable storage medium storing program for executing of contract - Google Patents

Obtain method, system and the readable storage medium storing program for executing of contract Download PDF

Info

Publication number
CN108234442A
CN108234442A CN201711030640.7A CN201711030640A CN108234442A CN 108234442 A CN108234442 A CN 108234442A CN 201711030640 A CN201711030640 A CN 201711030640A CN 108234442 A CN108234442 A CN 108234442A
Authority
CN
China
Prior art keywords
contract
party
encrypted
website
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711030640.7A
Other languages
Chinese (zh)
Other versions
CN108234442B (en
Inventor
侯庭伟
孙建平
黄丽标
李俊
蒋澜
周波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN201711030640.7A priority Critical patent/CN108234442B/en
Publication of CN108234442A publication Critical patent/CN108234442A/en
Application granted granted Critical
Publication of CN108234442B publication Critical patent/CN108234442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of methods for obtaining contract, the described method comprises the following steps:The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are printed;When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is verified, and authorize after being proved to be successful the permission of the website of third party's access preset, so that the third party carries out browsing contract.The invention also discloses a kind of systems and computer readable storage medium for obtaining contract.The present invention enable to third party contract can be carried out browsing check.

Description

Obtain method, system and the readable storage medium storing program for executing of contract
Technical field
The present invention relates to block chain technical field more particularly to a kind of obtain the method for contract, system and computer-readable Storage medium.
Background technology
With the development and the progress of information technology and the development of bit coin and block chain technology of society, open on the market There is a kind of mode of doing business based on block chain application platform in beginning.When being traded by this mode of doing business, participant It needs to sign an agreement and contract by number platform of contracting, and for entire block chain, for considerations such as safeties, only Participant with or monitoring side of having the right the agreement and contract of signing checked, printed, and other third parties and arbitration side Can not to sign an agreement and contract carry out browsing check, be not easy to third party and agreement and contract monitored and verified.
Invention content
It is a primary object of the present invention to propose a kind of method, system and computer readable storage medium for obtaining contract, Aim to solve the problem that other third parties and arbitration side can not be to signing an agreement and contract carries out the technical issues of browsing is checked.
To achieve the above object, the present invention provides a kind of method for obtaining contract, the method includes:
The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are beaten Print;
When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is tested Card, and the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
Optionally, the step of described pair of contract got is encrypted includes:
Symmetric cryptography is carried out to the contract got;
Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
Optionally, the Quick Response Code includes:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
Optionally, described the step of being verified to encrypted contract, includes:
Extraction carries out private cipher key during asymmetric encryption, and is solved by the encrypted contract of the private cipher key pair It is close;
When successful decryption, it is determined that be verified.
Optionally, it before the step of permission of the website for authorizing third party's access preset, further includes:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized The permission stood.
Optionally, it after described the step of generating corresponding Quick Response Code according to encrypted contract, further includes:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
Optionally, it after described the step of being verified to encrypted contract, further includes:
When failing the authentication, then refuse the request of the website of third party's access preset.
Optionally, it is described after the step of permission of website of third party's access preset is authorized after being proved to be successful, also wrap It includes:
When detecting that third party enters default website, display third party provides the information for carrying out authentication;
When receiving the information for carrying out authentication, contract is shown, and the carry out authentication that will be received Information and third party browse contract prompt message be sent to participant.
In addition, to achieve the above object, the present invention also provides a kind of system for obtaining contract, the system for obtaining contract Including:Block chain, preset website and the program for obtaining contract, the program for obtaining contract is by the block chain, preset The step of method of acquisition contract as described above is realized when website performs.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium The program for obtaining contract is stored on storage medium, the program for obtaining contract is realized as described above when being executed by processor The step of obtaining the method for contract.
Method, system and the computer readable storage medium proposed by the present invention for obtaining contract obtains be stored in area first Number signing platform contract in block chain, and the contract got is encrypted;Then according to the generation pair of encrypted contract Quick Response Code is answered, so that the participant with print right or monitoring side are printed;It is two-dimentional by scanning when receiving third party When checking contract instruction of code triggering, verifies encrypted contract, and authorizes third party after being proved to be successful and access in advance If website permission so that the third party carries out browsing contract, by the above-mentioned means, third party has printing by obtaining The Quick Response Code that the participant or monitoring side of permission are printed, you can by scanning the two-dimensional code, according to preset website to contract It is browsed, contract is monitored and is verified, so as to which third party be facilitated to browse contract.
Description of the drawings
Fig. 1 is the flow diagram for the method first embodiment that the present invention obtains contract;
Fig. 2 is the refinement that the present invention obtains the step of contract got in the method second embodiment of contract is encrypted Flow diagram;
Fig. 3 is that the present invention obtains the thin of the step of being verified in the method 3rd embodiment of contract to encrypted contract Change flow diagram;
Fig. 4 is the flow diagram for the method sixth embodiment that the present invention obtains contract;
Fig. 5 be the present embodiments relate to acquisition contract system hardware structure schematic diagram.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:The number signing platform being stored in block chain is obtained first to close About, and to the contract got it is encrypted;Then corresponding Quick Response Code is generated according to encrypted contract, for printing right The participant or monitoring side of limit are printed;When receive third party by scan the two-dimensional code triggering check contract instruct when, Encrypted contract is verified, and authorizes after being proved to be successful the permission of the website of third party's access preset, so that described Third party carries out browsing contract, by the above-mentioned means, third party by acquisition with print right participant or monitoring side into The Quick Response Code of row printing, you can by scanning the two-dimensional code, browsed to contract according to preset website, monitored to contract And verification, so as to which third party be facilitated to browse contract.
The embodiment of the present invention is it is considered that in the prior art, for considerations such as safeties, only participant with or have the right to supervise Prosecutor is checked the agreement and contract of signing, is printed, and other third parties and arbitration side can not be to signing an agreement and closing It is checked with browsing is carried out, is not easy to third party and agreement and contract are monitored and verified.
For this purpose, the embodiment of the present invention proposes a kind of method for obtaining contract, the number being stored in block chain is obtained first Signing platform contract, and the contract got is encrypted;Then corresponding Quick Response Code is generated according to encrypted contract, for Participant or monitoring side with print right are printed;When receiving third party conjunction is checked by scan the two-dimensional code triggering When about instructing, encrypted contract is verified, and authorizes after being proved to be successful the permission of the website of third party's access preset, So that the third party carries out browsing contract, by the above-mentioned means, third party by participant of the acquisition with print right or The Quick Response Code that monitoring side is printed, you can by scanning the two-dimensional code, browsed according to preset website to contract, to contract It is monitored and is verified, so as to which third party be facilitated to browse contract.
The present invention provides a kind of method for obtaining contract.
With reference to Fig. 1, Fig. 1 is the flow diagram for the method first embodiment that the present invention obtains contract.
In the present embodiment, this method includes:
Step S10 obtains the number signing platform contract being stored in block chain, and the contract got is added It is close;
In the present embodiment, the method for the acquisition contract is applied to the system for obtaining contract, specifically, referring to Fig. 5, figure 5 system architecture schematic diagrams of acquisition contract being related to for the embodiment of the present invention, the system of the acquisition contract include:Block Chain, preset website and the program for obtaining contract, wherein, specifically, the preset website is common WEB, i.e. third party Browsing can only be carried out by common WEB and consults contract.
In the present embodiment, since block chain (Blockchain) is by a string of data blocks using cryptography method generation Composition, each block contains the cryptographic Hash (hash) of a block, since original block (genesis block) Current block is connected to, forms block chain.Block chain is also the distributed data base system participated in by node, is substantially one and goes The database account book of centralization is the network platform that Everyone is equal shares, and participates in providing the foundation jointly for crew;Upload to area The record of block chain is full disclosure, everybody can obtain the copy of all records, and people is encouraged to participate in jointly;With bit coin Block chain for, each person of participating in business is the node of block network, and each node has a complete public account Book backs up, and has recite all Transaction Informations since bit coin is born above.Any one node, which initiates trading activity, all to be needed Each node relevant information being transmitted in block network, so as to which the account book on all nodes can verify that this is handed over It is easy to be and accurately update.In addition, account book is blockette storage, with the increase of transaction, new data block can be attached to Through on existing chain, forming chain structure.Simultaneously as block chain is by the restriction that exercises supervision in many ways, therefore, block chain tool There is the characteristic that can not be distorted, that is, upload to the data of block chain, cannot change, ensure that the authenticity of data.If There is malicious node to provide false data, then false data will permanently be recorded as the history criminal evidence, so as to greatly reduce false number According to upload.Therefore, using preserving the contract of signing into block chain in the embodiment of the present invention, so as to ensure that the true of contract Reality, and contract is prevented to be tampered, after preservation, when needing that contract is encrypted, it is necessary first to which extraction needs to add Then close contract is ensureing not injuring the base for carrying out the number signing platform security for signing contract and ensureing contract party's privacy On plinth, the contract extracted is encrypted, wherein, in order to ensure safety of the contract in data transmission procedure, can combine The encryption thought of symmetric cryptography and asymmetric encryption, has carried out contract multi-layer security, wherein symmetric cryptography refer to send and For the both sides of reception data using identical key (symmetric key) to being encrypted and decrypted in plain text, encryption/decryption speed is fast, fits Conjunction handles mass data, but just since encryption and decryption is using same symmetric key, for symmetric key management compared with For difficulty.And asymmetric encryption then needs two keys:Public-key cryptography (public key) and private cipher key (private key), public key is to other sides Open, private key then oneself preserves;Public key is a pair of with private key, if data are encrypted with public key, only with corresponding private Key could be decrypted;If data are encrypted with private key, then could only be decrypted with corresponding public key;Added due to asymmetric Close algorithm is complicated so that the speed that encrypting and decrypting speed does not have symmetric cryptography to decrypt is fast, but due to encryption and decryption key not Together, thus its safety be better than symmetric cryptography.
Step S20 generates corresponding Quick Response Code, for the participant with print right or monitoring according to encrypted contract Fang Jinhang is printed;
After contract is encrypted, Quick Response Code is corresponded to according to the Symmetric key generation for carrying out symmetric cryptography, will closed After being about stored in corresponding block chain node, participant or monitoring side can be checked and be carried out to the contract of preservation Printing, and after contract is printed, printing Quick Response Code, the Quick Response Code that third party passes through scanning and printing can be carried out, you can it obtains Corresponding treaty content on block chain node, it is to be understood that third party may only be to corresponding contract on block chain node Content carries out browsing and checks, and cannot modify.
Further, the Quick Response Code includes:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
The symmetric key obtained behind address and progress symmetric cryptography comprising the common WEB of access i.e. in Quick Response Code, from And the browsing of contract is checked by the common WEB and symmetric key realization.
Step S30, when receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, to encrypted conjunction About verified, and authorize after being proved to be successful the permission of the website of third party's access preset so that the third party carry out it is clear Look at contract.
In participant or monitoring side printing Quick Response Code, and after third party gets Quick Response Code, third party can be by sweeping The Quick Response Code got is retouched, contract is checked so as to fulfill browsing, therefore, in third party by scanning the two-dimensional code, and triggers and checks When contract instructs, encrypted contract is verified first, i.e., first by pair after asymmetric encryption in Quick Response Code Key is claimed to be decrypted, in embodiments of the present invention, the symmetric key after asymmetric encryption may only be by public WEB be decrypted, therefore, receive check contract instruction when, first by it is described check contract instruction be committed to it is common WEB is decrypted the symmetric key after asymmetric encryption by common WEB, after by decryption, third Side can obtain the permission for accessing common WEB, and then whether the symmetric key further in verification Quick Response Code is correct, when described When symmetric key is correct, third party can carry out browsing contract.
The method of acquisition contract that the present embodiment proposes obtains the number signing platform being stored in block chain and closes first About, and to the contract got it is encrypted;Then corresponding Quick Response Code is generated according to encrypted contract, for printing right The participant or monitoring side of limit are printed;When receive third party by scan the two-dimensional code triggering check contract instruct when, Encrypted contract is verified, and authorizes after being proved to be successful the permission of the website of third party's access preset, so that described Third party carries out browsing contract, by the above-mentioned means, third party by acquisition with print right participant or monitoring side into The Quick Response Code of row printing, you can by scanning the two-dimensional code, browsed to contract according to preset website, monitored to contract And verification, so as to which third party be facilitated to browse contract.
Further, with reference to Fig. 2, the method first embodiment that contract is obtained based on the present invention proposes that the present invention obtains contract Method second embodiment.
In the present embodiment, the step S10 includes:
Step S11 carries out symmetric cryptography to the contract got;
Step S12 carries out asymmetric public key encryption to the symmetric key of the symmetric cryptography by the preset website.
In the present embodiment, in order to ensure safety of the contract in data transmission procedure, can combine symmetric cryptography and The encryption thought of asymmetric encryption has carried out contract multi-layer security, and wherein symmetric cryptography refers to send and receive the double of data Using identical key (symmetric key) to being encrypted and decrypted in plain text, encryption/decryption speed is fast for side, is suitble to mass data It is handled, but just since encryption and decryption is using same symmetric key, it is more difficult for the management of symmetric key.It is rather than right Encryption is claimed then to need two keys:Public-key cryptography (public key) and private cipher key (private key), public key are disclosed to other sides, private key then from Oneself preserves;Public key is a pair of with private key, if data are encrypted with public key, could only be decrypted with corresponding private key;Such as Fruit is encrypted data with private key, then could only be decrypted with corresponding public key;Since the algorithm of asymmetric encryption is complicated, So that the speed that encrypting and decrypting speed does not have symmetric cryptography to decrypt is fast, but since the key of encryption and decryption is different, thus its safety Property be better than symmetric cryptography.
Therefore, the present embodiment, since if symmetric key is shown in plain text, is just destroyed using first symmetric cryptography is carried out to contract Therefore the safety of contract, further carries out asymmetric encryption, so as to ensure that the safety of contract to the symmetric key.
The method of acquisition contract that the present embodiment proposes, by carrying out symmetric cryptography to the contract got;Then to institute The symmetric key for stating symmetric cryptography carries out asymmetric public key encryption by the preset website, so as to ensure that the safety of contract Property.
Further, with reference to Fig. 3, the method first embodiment that contract is obtained based on the present invention proposes that the present invention obtains contract Method 3rd embodiment.
In the present embodiment, the step S30 includes:
Step S31, extraction carries out private cipher key during asymmetric encryption, and passes through the encrypted conjunction of the private cipher key pair About it is decrypted;
Step S32, when successful decryption, it is determined that be verified.
In the present embodiment, due to consideration that symmetric key is shown in plain text, the safety of contract is just destroyed, in order to ensure pair Claim the safety of key, the mode that the encryption of symmetric key can be used asymmetric encryption carries out, i.e., using unsymmetrical key group In public-key cryptography be encrypted, and the corresponding private cipher key of this public-key cryptography must be existed only in common WEB, in this way It just can guarantee that Public Key encrypted content can not be decrypted in other third parties, so as to improve safety, therefore, can adopt It is encrypted with the shared key pair symmetric key of unsymmetrical key.
Therefore, encrypted contract is verified and is decrypted as to encrypted symmetric key, specifically, can be led to Private cipher key during asymmetric encryption is crossed, to being decrypted by the symmetric key after asymmetric encryption, due to described privately owned close Key is stored in common WEB, therefore, the private cipher key first in common WEB during extraction progress asymmetric encryption, and lead to The encrypted symmetric key of the private cipher key pair is crossed to be decrypted;When successful decryption, it is determined that be verified.
Further, it after described the step of being verified to encrypted contract, further includes:
When failing the authentication, then refuse the request of the website of third party's access preset.
It is decrypted when by the encrypted symmetric key of the private cipher key pair;When decrypting failure, it is determined that test Card failure, then refuse the request of the website of third party's access preset.
Further, the method first embodiment for contract being obtained based on the present invention proposes that the present invention obtains the method the of contract Four embodiments.
In the present embodiment, it before the step of permission of the website for authorizing third party's access preset, further includes:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized The permission stood.
In the present embodiment, it after it will be decrypted by the encrypted symmetric key of the private cipher key pair, needs Further the symmetric key is verified, that is, when verifying the symmetric key that includes of current two-dimension and carrying out symmetric cryptography Whether symmetric key is consistent, specifically, obtains the symmetric key in the Quick Response Code verified by common WEB;Then by described in Symmetric key is compared with symmetric key when carrying out symmetric cryptography;When the symmetric key is with carrying out pair during symmetric cryptography When claiming key agreement, the permission of the website of third party's access preset is authorized.
Further, the method first embodiment for contract being obtained based on the present invention proposes that the present invention obtains the method the of contract Five embodiments.
In the present embodiment, it after described the step of generating corresponding Quick Response Code according to encrypted contract, further includes:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
In the present embodiment, when receiving the two-dimentional code instruction of printing, need verification triggering print command participant or Whether monitoring side has the permission of printing, the participant or monitoring side of extraction triggering print command;It is specifically as follows extraction to participate in Then side or the authentication information of monitoring side judge whether the participant or monitoring side have according to the authentication information The permission of standby printing Quick Response Code;If the participant or monitoring side have the permission of printing Quick Response Code, the printing two is performed Code instruction is tieed up, carries out Quick Response Code printing.
Further, with reference to Fig. 4, the method first embodiment that contract is obtained based on the present invention proposes that the present invention obtains contract Method sixth embodiment.
In the present embodiment, after the step S30 it the step of, further includes:
Step S40, when detecting that third party enters default website, display third party provides the letter for carrying out authentication Breath;
Step S50 when receiving the information for carrying out authentication, contract is shown, and the progress that will be received The prompt message that the information of authentication and third party browse contract is sent to participant.
In the present embodiment, it is decrypted when by the encrypted symmetric key of the private cipher key pair;Work as successful decryption When, and when the symmetric key that includes of current two-dimension is consistent with symmetric key when carrying out symmetric cryptography, when detecting third When side enters default website, display third party provides the information for carrying out authentication;The third party of contract will be browsed by reminding Authentication information is inputted, so as to obtain the third-party identity for carrying out browsing contract, and works as and receives carry out authentication Information when, contract is shown, the information of the progress authentication received and third party are then browsed into carrying for contract Show that information is sent to participant, so that participant knows that contract is browsed, and know the third-party identity of browsing contract.
The present invention further provides a kind of systems for obtaining contract.
As shown in figure 5, the system of the acquisition contract can include:Processor 1001, such as CPU, network interface 1004 are used Family interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to implement the company between these components Connect letter.User interface 1003 can include display screen (Display), input unit such as keyboard (Keyboard), can be selected Family interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 can optionally include standard Wireline interface, wireless interface (such as Wi-Fi interface).Memory 1005 can be depositing for high-speed RAM memory or stabilization Reservoir (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned place Manage the storage device of device 1001.
Optionally, the system for obtaining contract can also include user interface, network interface, camera, RF (Radio Frequency, radio frequency) circuit, sensor, voicefrequency circuit, WiFi module etc..User interface can include display screen (Display), input unit such as keyboard (Keyboard), optional user interface can also include wireline interface, the nothing of standard Line interface.Network interface can optionally include standard wireline interface and wireless interface (such as WI-FI interfaces).
It is closed it will be understood by those skilled in the art that the system structure of acquisition contract shown in Fig. 5 is not formed to obtaining The restriction of system about can include either combining certain components or different components than illustrating more or fewer components Arrangement.
As shown in figure 5, as that can include operating system in a kind of memory 1005 of computer storage media and obtain Take the program of contract.Wherein, operating system is management and obtains the hardware of system of contract and the program of software resource, supports to obtain Take the operation of the program and other software or program of contract.
In the system of acquisition contract shown in Fig. 5, network interface 1004 is mainly used for connecting background server, with backstage Server is into row data communication;User interface 1003 is mainly used for connecting client, with client into row data communication;And it handles Device 1001 can be used for calling the program of acquisition contract stored in memory 1005, and perform following operate:
The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are beaten Print;
When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is tested Card, and the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
Symmetric cryptography is carried out to the contract got;
Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
Extraction carries out private cipher key during asymmetric encryption, and is solved by the encrypted contract of the private cipher key pair It is close;
When successful decryption, it is determined that be verified.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized The permission stood.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
When failing the authentication, then refuse the request of the website of third party's access preset.
Further, the processor 1001 is additionally operable to perform the program of acquisition contract stored in memory 1004, with Realize following steps:
When detecting that third party enters default website, display third party provides the information for carrying out authentication;
When receiving the information for carrying out authentication, contract is shown, and the carry out authentication that will be received Information and third party browse contract prompt message be sent to participant.
Each embodiment of method that the present invention obtains the specific embodiment and above-mentioned acquisition contract of the system of contract is essentially identical, Therefore not to repeat here.
The present invention further provides a kind of computer readable storage medium, the computer-readable recording medium storage has one A or multiple programs, one or more of programs can be performed by one or more processor, to realize following steps:
The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are beaten Print;
When receiving third party by scanning the two-dimensional code when checking that contract instructs of triggering, encrypted contract is tested Card, and the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
Symmetric cryptography is carried out to the contract got;
Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
The uniform resource locator of preset website, wherein, it is flat that the uniform resource locator includes access number signing Platform corresponds to the access address of contract and accesses the symmetric key of symmetric cryptography contract.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
Extraction carries out private cipher key during asymmetric encryption, and is solved by the encrypted contract of the private cipher key pair It is close;
When successful decryption, it is determined that be verified.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
Obtain the symmetric key in the Quick Response Code by preset website authentication;
The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the net of third party's access preset is authorized The permission stood.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
When failing the authentication, then refuse the request of the website of third party's access preset.
Further, one or more of programs can be performed by one or more of processors, also realize with Lower step:
When detecting that third party enters default website, display third party provides the information for carrying out authentication;
When receiving the information for carrying out authentication, contract is shown, and the carry out authentication that will be received Information and third party browse contract prompt message be sent to participant.
The method and acquisition contract of the specific embodiment of computer readable storage medium of the present invention and above-mentioned acquisition contract Each embodiment of system is essentially identical, and therefore not to repeat here.
It should also be noted that, herein, term " comprising ", "comprising" or its any other variant are intended to non- It is exclusive to include, so that process, method, article or device including a series of elements not only include those elements, But also it including other elements that are not explicitly listed or further includes solid by this process, method, article or device Some elements.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including Also there are other identical elements in the process of the element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes Be engaged in device, air conditioner or the network equipment etc.) method that performs each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

  1. A kind of 1. method for obtaining contract, which is characterized in that the described method comprises the following steps:
    The number signing platform contract being stored in block chain is obtained, and the contract got is encrypted;
    Corresponding Quick Response Code is generated according to encrypted contract, so that the participant with print right or monitoring side are printed;
    When receive third party by scan the two-dimensional code triggering check contract instruct when, encrypted contract is verified, And the permission of the website of third party's access preset is authorized after being proved to be successful, so that the third party carries out browsing contract.
  2. 2. the method for contract is obtained as described in claim 1, which is characterized in that the described pair of contract got was encrypted Step includes:
    Symmetric cryptography is carried out to the contract got;
    Asymmetric public key encryption is carried out by the preset website to the symmetric key of the symmetric cryptography.
  3. 3. the method for contract is obtained as described in claim 1, which is characterized in that the Quick Response Code includes:
    The uniform resource locator of preset website, wherein, the uniform resource locator includes accessing number signing platform pair It answers the access address of contract and accesses the symmetric key of symmetric cryptography contract.
  4. 4. the method for contract is obtained as described in claim 1, which is characterized in that described that encrypted contract verified Step includes:
    Extraction carries out private cipher key during asymmetric encryption, and is decrypted by the encrypted contract of the private cipher key pair;
    When successful decryption, it is determined that be verified.
  5. 5. the method for contract is obtained as claimed in claim 4, which is characterized in that the website for authorizing third party's access preset Permission the step of before, further include:
    Obtain the symmetric key in the Quick Response Code by preset website authentication;
    The symmetric key and symmetric key when carrying out symmetric cryptography are compared;
    When the symmetric key is consistent with symmetric key when carrying out symmetric cryptography, the website of third party's access preset is authorized Permission.
  6. 6. the method for contract is obtained as described in claim 1, which is characterized in that described generated according to encrypted contract corresponds to After the step of Quick Response Code, further include:
    When receiving printing two dimension code instruction, the participant or monitoring side of extraction triggering print command;
    Judge whether the participant or monitoring side have the permission of printing Quick Response Code;
    If the participant or monitoring side have the permission of printing Quick Response Code, the two-dimentional code instruction of the printing is performed.
  7. 7. the method for contract is obtained as described in claim 1, which is characterized in that described that encrypted contract verified After step, further include:
    When failing the authentication, then refuse the request of the website of third party's access preset.
  8. 8. the method for obtaining contract such as claim 1-7 any one of them, which is characterized in that described to be authorized after being proved to be successful After the step of permission of the website of third party's access preset, further include:
    When detecting that third party enters default website, display third party provides the information for carrying out authentication;
    When receiving the information for carrying out authentication, contract is shown, and the letter of progress authentication that will be received The prompt message that breath and third party browse contract is sent to participant.
  9. 9. a kind of system for obtaining contract, which is characterized in that the system for obtaining contract includes:Block chain, preset website And the program of contract is obtained, the program for obtaining contract realizes that right such as will when being performed by the block chain, preset website The step of seeking the method for the acquisition contract described in any one of 1 to 8.
  10. 10. a kind of computer readable storage medium, which is characterized in that acquisition is stored on the computer readable storage medium and is closed Program about, the program for obtaining contract realize such as acquisition described in any item of the claim 1 to 8 when being executed by processor The step of method of contract.
CN201711030640.7A 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract Active CN108234442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711030640.7A CN108234442B (en) 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711030640.7A CN108234442B (en) 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract

Publications (2)

Publication Number Publication Date
CN108234442A true CN108234442A (en) 2018-06-29
CN108234442B CN108234442B (en) 2020-11-27

Family

ID=62654891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711030640.7A Active CN108234442B (en) 2017-10-26 2017-10-26 Method, system and readable storage medium for acquiring contract

Country Status (1)

Country Link
CN (1) CN108234442B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109166027A (en) * 2018-07-02 2019-01-08 阿里巴巴集团控股有限公司 A kind of loaning bill contract processing method and processing device
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN109361654A (en) * 2018-09-18 2019-02-19 深圳崀途科技有限公司 A kind of method and system for negotiating encryption handling business secret based on block chain
CN109461230A (en) * 2018-10-01 2019-03-12 北京洛必达科技有限公司 A kind of block chain information processing system and method
CN109635572A (en) * 2018-11-05 2019-04-16 深圳变设龙信息科技有限公司 A kind of contract signing method, apparatus and terminal device based on block chain
CN110110552A (en) * 2019-04-30 2019-08-09 佛山科学技术学院 A kind of electronics license data sharing method and system based on block chain
CN110177088A (en) * 2019-05-08 2019-08-27 矩阵元技术(深圳)有限公司 A kind of temporary identity authentication method, apparatus and system
CN110414937A (en) * 2019-07-29 2019-11-05 重庆晨鲸科技有限公司 Upper chain type electronic signature based on two dimensional code and deposit card method and system
CN116015935A (en) * 2022-12-30 2023-04-25 中国工商银行股份有限公司 API message processing method and device for signing across mechanisms

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139188A (en) * 2015-09-09 2015-12-09 西南大学 On-line electronic contract signing method based on mobile terminal
CN105912283A (en) * 2016-04-29 2016-08-31 邓迪 Block chain based printer and realization method
US20160314550A1 (en) * 2015-04-23 2016-10-27 Adobe Systems Incorporated Limited user contract content sharing
CN106951943A (en) * 2017-03-13 2017-07-14 江苏信源久安信息科技有限公司 Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160314550A1 (en) * 2015-04-23 2016-10-27 Adobe Systems Incorporated Limited user contract content sharing
CN105139188A (en) * 2015-09-09 2015-12-09 西南大学 On-line electronic contract signing method based on mobile terminal
CN105912283A (en) * 2016-04-29 2016-08-31 邓迪 Block chain based printer and realization method
CN106951943A (en) * 2017-03-13 2017-07-14 江苏信源久安信息科技有限公司 Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109166027A (en) * 2018-07-02 2019-01-08 阿里巴巴集团控股有限公司 A kind of loaning bill contract processing method and processing device
CN109361654A (en) * 2018-09-18 2019-02-19 深圳崀途科技有限公司 A kind of method and system for negotiating encryption handling business secret based on block chain
CN109361654B (en) * 2018-09-18 2021-10-26 广州市溢信科技股份有限公司 Method and system for managing business secret based on block chain negotiation encryption
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN109461230A (en) * 2018-10-01 2019-03-12 北京洛必达科技有限公司 A kind of block chain information processing system and method
CN109635572A (en) * 2018-11-05 2019-04-16 深圳变设龙信息科技有限公司 A kind of contract signing method, apparatus and terminal device based on block chain
CN110110552A (en) * 2019-04-30 2019-08-09 佛山科学技术学院 A kind of electronics license data sharing method and system based on block chain
CN110177088A (en) * 2019-05-08 2019-08-27 矩阵元技术(深圳)有限公司 A kind of temporary identity authentication method, apparatus and system
CN110177088B (en) * 2019-05-08 2021-09-21 矩阵元技术(深圳)有限公司 Temporary identity authentication method, device and system
CN110414937A (en) * 2019-07-29 2019-11-05 重庆晨鲸科技有限公司 Upper chain type electronic signature based on two dimensional code and deposit card method and system
CN116015935A (en) * 2022-12-30 2023-04-25 中国工商银行股份有限公司 API message processing method and device for signing across mechanisms

Also Published As

Publication number Publication date
CN108234442B (en) 2020-11-27

Similar Documents

Publication Publication Date Title
CN108234442A (en) Obtain method, system and the readable storage medium storing program for executing of contract
US8209744B2 (en) Mobile device assisted secure computer network communication
US9094823B2 (en) Data processing for securing local resources in a mobile device
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
CN107948736A (en) A kind of audio and video preservation of evidence method and system
CN102413464B (en) GBA (General Bootstrapping Architecture)-based secret key negotiation system and method of telecommunication capability open platform
CN101401465B (en) Method and system for recursive authentication in a mobile network
CN110519268B (en) Voting method, device, equipment, system and storage medium based on block chain
CN106104562A (en) Safety of secret data stores and recovery system and method
CN106302502A (en) A kind of secure access authentication method, user terminal and service end
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
WO2017201809A1 (en) Communication method and system for terminal
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
WO2017185450A1 (en) Method and system for authenticating terminal
CN105591744A (en) Network real-name authentication method and system
CN113515756B (en) High-credibility digital identity management method and system based on block chain
CN103327034A (en) Safe login method, system and device
CN109254734A (en) A kind of date storage method, device, equipment and computer readable storage medium
CN105681340A (en) Digital certificate use method and apparatus
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN106533693A (en) Access method and device of railway vehicle monitoring and maintenance system
CN101309147A (en) A method of identity authentication based on image password
CN110166471A (en) A kind of portal authentication method and device
CN109740319A (en) Digital authentication method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant