[go: up one dir, main page]

CN112231656A - File signing and checking device, system and method - Google Patents

File signing and checking device, system and method Download PDF

Info

Publication number
CN112231656A
CN112231656A CN202010920761.4A CN202010920761A CN112231656A CN 112231656 A CN112231656 A CN 112231656A CN 202010920761 A CN202010920761 A CN 202010920761A CN 112231656 A CN112231656 A CN 112231656A
Authority
CN
China
Prior art keywords
visitor
information
module
signing
permission list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010920761.4A
Other languages
Chinese (zh)
Inventor
韩正杰
罗立平
吴婵芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yuzhan Precision Technology Co ltd
Original Assignee
Shenzhen Yuzhan Precision Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yuzhan Precision Technology Co ltd filed Critical Shenzhen Yuzhan Precision Technology Co ltd
Priority to CN202010920761.4A priority Critical patent/CN112231656A/en
Publication of CN112231656A publication Critical patent/CN112231656A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a file signing and checking device, system and method. The method comprises the following steps: obtaining login request information input by a visitor; acquiring a preset file when the login request information is in the first permission list; performing real name verification on the visitor; receiving first confirmation information input by the visitor when the visitor is confirmed to pass real-name verification, and generating a first printing instruction according to the first confirmation information; completing the printing and signing check of the visitor on a preset file according to the first printing instruction, and generating notification information to notify a visitor unit to which the visitor belongs in the second permission list to carry out printing and auditing; responding to second confirmation information input by the visitor unit according to the notification information, and generating a second stamp instruction; and completing the seal signing check of the visitor unit on the preset file according to a second seal instruction. The method and the device can avoid the problems of low efficiency and cost increase of the input of specially-assigned persons for managing the paper books of the confidential contracts and the employee official documents.

Description

File signing and checking device, system and method
Technical Field
The present application relates to the field of data processing, and in particular, to a file signing and checking apparatus, system and method.
Background
In order to better protect intellectual property of companies and clients and avoid unnecessary loss of companies due to a disclosure event, all suppliers and their personnel who contact or enter a new product development or product production area of a company as visitors are often required to sign up security contracts designated by the company and attach a visitor certificate of job. At present, the management of security contracts of suppliers and personnel and the on-duty certification documents of visitors needs to invest special personnel to manage the paper books of the documents, and meanwhile, the storage of the paper books is easy to lose.
Disclosure of Invention
In view of the above, there is a need for an electronic document signing and checking apparatus, system and method to automatically complete document signing and checking, so as to avoid the problems of low efficiency and increased cost of invested specialists in managing the books of confidential contracts and documents certified by visitors, and avoid the problem of easy loss of the stored books.
A first aspect of the present application provides a file signing method, including:
obtaining login request information input by a visitor;
judging whether the login request information is in a first authority list or not;
when the login request information is in the first permission list, acquiring a preset file;
performing real name verification on the visitor;
receiving first confirmation information input by the visitor when the visitor is confirmed to pass the real-name verification, and generating a first printing instruction according to the first confirmation information;
completing the printing and signing check of the visitor on the preset file according to the first printing instruction, and generating notification information to notify a visitor unit to which the visitor belongs in a second permission list to carry out printing and auditing;
responding to second confirmation information input by the visitor unit according to the notification information, and generating a second stamp instruction; and
and completing the printing and signing check of the visitor unit on the preset file according to the second printing instruction.
Preferably, the method further comprises: before obtaining login request information input by a visitor, obtaining an on-duty certification document of the visitor;
generating the first permission list according to visitor information recorded in the visitor presence certificate file; and
and generating the second permission list according to the visitor unit information recorded in the visitor on-duty certification document.
Preferably, the acquiring the preset file includes:
providing a plurality of project files when the login request information is in the first permission list;
and taking one project file selected by the visitor from the plurality of project files as the preset file.
Preferably, the real name verification of the visitor comprises:
acquiring personal basic information input by the visitor, and judging whether the personal basic information input by the visitor is consistent with personal basic information recorded in advance in the first permission list or a third-party server;
when confirming that the personal basic information of the visitor is consistent with the personal basic information recorded in advance in the first permission list or the third-party server, acquiring the face information of the visitor, and judging whether the acquired face information is consistent with the face information recorded in advance in the first permission list or the third-party server;
when the acquired face information is confirmed to be consistent with the face information recorded in advance in the first authority list or a third-party server, confirming that the visitor passes the real-name verification; and
and when the personal basic information of the visitor is confirmed to be inconsistent with the personal basic information recorded in advance in the first permission list or the third-party server, or when the acquired face information is confirmed to be inconsistent with the face information recorded in advance in the first permission list or the third-party server, confirming that the visitor does not pass the real-name authentication.
Preferably, the receiving the first confirmation information input by the visitor includes:
providing a first approving interface, wherein the content and the content confirmation option of the preset file are displayed on the first approving interface;
displaying a verification code interface when the visitor is determined to select the content confirmation option, wherein a verification code sending field and a verification code input field are displayed on the verification code interface;
when the visitor is determined to select the verification code sending field, sending a target verification code to the mobile phone of the visitor;
receiving a verification code input by the visitor through the verification code input field; and
and when the verification code input by the visitor in the verification code input field is consistent with the target verification code, generating the first confirmation message.
Preferably, the method further comprises, after completing the signing with the seal of the guest unit on the preset file according to the second print instruction:
acquiring certificate number information of the visitor contained in the login request information;
acquiring the project name of the preset file;
acquiring the seal check date of the preset file;
acquiring the file number of the preset file; and
and generating a record list according to the certificate number information of the visitor, the special case name of the preset file, the seal check date and the file number.
Preferably, the method further comprises:
providing a query interface, receiving query information, and querying the signing and checking progress of the preset file according to the query information.
Preferably, the method further comprises:
and locally storing the preset file which is signed and checked by the visitor unit.
Preferably, the method further comprises:
and displaying the corresponding function according to the role of the visitor after the login is successful.
A second aspect of the present application provides a document approving apparatus, including:
an input device;
a processor connected to the input device for:
obtaining login request information input by a visitor;
judging whether the login request information is in a first authority list or not;
when the login request information is in the first permission list, acquiring a preset file;
performing real name verification on the visitor;
receiving first confirmation information input by the visitor when the visitor is confirmed to pass the real-name verification, and generating a first printing instruction according to the first confirmation information;
completing the printing and signing check of the visitor on the preset file according to the first printing instruction, and generating notification information to notify a visitor unit to which the visitor belongs in a second permission list to carry out printing and auditing;
responding to second confirmation information input by the visitor unit according to the notification information, and generating a second stamp instruction; and
and completing the printing and signing check of the visitor unit on the preset file according to the second printing instruction.
A third aspect of the present application provides a document approving system comprising:
the information management system comprises an information input interface module, a used seal auditing module and an information generating module, wherein the information input interface module is used for receiving an on-duty certificate application form submitted by a visitor; the use-print auditing module is used for carrying out use-print auditing on the on-duty certification application form; the information generation module generates a first permission list and a second permission list according to the on-duty certification application form which finishes the usage audit, wherein the first permission list comprises information of the visitor who finishes the usage audit, and the second permission list comprises information of the unit to which the visitor who finishes the usage audit belongs;
the signing and checking system connected with the information management system through a network comprises a login management module, a real-name authentication module, a first signing and checking module, a printing notification module and a second signing and checking module:
the login management module is used for acquiring login request information input by a visitor and allowing the visitor to log in when the login request information is in the first permission list;
the real-name verification module is used for performing real-name verification on the visitor who successfully logs in;
the first seal signing module is used for receiving first confirmation information input by the visitor when the visitor is confirmed to pass real-name verification, generating a first seal instruction according to the first confirmation information, and completing seal signing and signing for the visitor on a preset file according to the first seal instruction;
the seal use notification module is used for generating notification information after the first seal check module completes the seal use check so as to notify the visitor unit to which the visitor belongs in the second permission list to carry out seal use check;
and the second signature checking module is used for responding to second confirmation information input by the visitor unit according to the notification information, generating a second signature instruction, and completing the signature checking of the visitor unit on the preset file according to the second signature instruction.
Preferably, the real name verification module includes:
the first verification module is used for acquiring the personal basic information input by the visitor and judging whether the personal basic information input by the visitor is consistent with the personal basic information recorded in advance in the first permission list or the third-party server;
the first confirmation module is used for confirming that the visitor passes the real-name verification when the obtained personal basic information is confirmed to be consistent with the personal basic information recorded in advance in the first permission list or the third-party server; confirming that the visitor is not authenticated by the real name when it is confirmed that the personal basic information of the visitor is not identical to the personal basic information previously recorded in the first authority list or the third-party server.
Preferably, the real name verification module further comprises:
the second verification module is used for acquiring the face information of the visitor when confirming that the personal basic information of the visitor is consistent with the personal basic information recorded in advance in the first authority list or the third-party server, and judging whether the acquired face information is consistent with the face information recorded in advance in the first authority list or the third-party server;
the second confirmation module is used for confirming that the visitor passes the real-name verification when the obtained face information is consistent with the face information recorded in advance in the first authority list or the third-party server; and when the acquired face information is confirmed to be inconsistent with the face information recorded in advance in the first authority list or the third-party server, confirming that the visitor does not pass the real-name verification.
Preferably, the system further comprises:
and the electronic seal stamping module is used for automatically stamping the electronic seal of the visitor unit to which the visitor belongs on the on-duty certification application form after the use seal auditing module finishes use seal auditing.
Preferably, the system further comprises:
and the file signing module is used for providing a plurality of project files before the successful login visitor is subjected to real name verification, and taking one project file selected by the visitor from the plurality of project files as the preset file.
This application accomplishes the visitor according to first seal instruction and is in sign and check with the seal on the file of predetermineeing, and generate notice information in order to inform the second authority list visitor unit at visitor place carries out the audit with the seal to respond to visitor unit based on the second of notice information input confirms information, generates the second and prints the instruction, and according to visitor unit is accomplished to the second seal instruction and is in sign and check with the seal on the file of predetermineeing to can avoid the problem that the input special messenger carries out the inefficiency and the incremental cost of managing to secret contract and visitor's certificate of job, can avoid the problem that the save of paper book file easily appears losing simultaneously.
Drawings
Fig. 1 is an application environment diagram of a file signing method according to an embodiment of the present application.
FIG. 2 is a functional unit diagram of a file checking system according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a login interface according to an embodiment of the present application.
Fig. 4 is a functional block diagram of a real-name authentication module according to an embodiment of the present invention.
FIG. 5 is a diagram illustrating a first signoff interface according to an embodiment of the present application.
Fig. 6 is a schematic diagram of a verification code interface according to an embodiment of the present application.
FIG. 7 is a flowchart of a file signing method according to an embodiment of the present application.
Fig. 8 is a flowchart illustrating real name verification performed on a visitor according to an embodiment of the present disclosure.
Description of the main elements
Figure BDA0002666655680000051
Figure BDA0002666655680000061
The following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
In order that the above objects, features and advantages of the present application can be more clearly understood, a detailed description of the present application will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present application, and the described embodiments are merely a subset of the embodiments of the present application and are not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
As used in this application, the term "processor" may refer to any type of processing circuit or device. A processor may be implemented as a combination of processing circuits or computational processing units (e.g., a CPU, a GPU, or a combination of both). Thus, for purposes of description, a processor may refer to a single core processor; a single processor with software multi-threaded execution capability; a multi-core processor; a multi-core processor having software multi-thread execution capability; a multi-core processor having hardware multithreading; a parallel processing (or computing) platform; and a parallel computing platform with distributed shared memory. Additionally, or for another example, a processor may refer to an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), a Programmable Logic Controller (PLC), a Complex Programmable Logic Device (CPLD), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed or configured (e.g., manufactured) to perform the functions described herein. In some embodiments, processors may use nanoscale architectures in order to optimize space usage or enhance performance of systems, devices, or other electronic devices according to the present application. For example, the processor may include molecular transistors and/or quantum dot based transistors, switches, and gates.
Furthermore, in the present specification and drawings, terms such as "store," "memory," "data store," "memory," "repository," and substantially any other information storage means associated with the operation and function of the components of the present application refer to memory means, entities implemented in one or more memory devices, or means forming a memory device. It should be noted that the memory means or memory apparatus described herein implements or includes a non-transitory computer storage medium readable or accessible by a computing device. Such media may be implemented in any method or technology for storing information, such as machine-accessible instructions (e.g., computer-readable instructions), information structures, program modules, or other information objects.
The memory means or memory devices disclosed herein may be implemented as volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. Further, the memory component or memory device may be removable or non-removable, and/or internal or external to the computing apparatus or component. Examples of various types of non-transitory storage media may include hard disk drives, zip drives, CD-ROMs, Digital Versatile Disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, flash memory cards or other types of memory cards, magnetic cassettes, or any other non-transitory medium suitable for retaining the desired information and accessible by the computing device. For example, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM has many forms, such as Synchronous RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory devices or memories of an operating or computing environment described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Conditional language such as "may," "can," "might," or "may" is generally intended to convey that certain implementations may include certain features, elements, and/or operations, while other implementations do not, unless specifically stated otherwise or understood otherwise in the context of usage. Thus, such conditional language is not generally intended to imply that features, elements, and/or operations are in any way required for one or more implementations or that one or more implementations must contain logic for deciding, with or without user input or prompting, whether such features, elements, and/or operations are contained or are to be performed in any particular implementation.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more machine or computer-executable instructions for implementing the specified operations. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The computer-readable program instructions of the present application may be downloaded to a corresponding computing/processing device from a computer-readable storage medium or an external computer or external storage device via a network (e.g., the internet, a local area network, a wide area network, and/or a wireless network). The network may include copper transmission cables, optical transmission fibers, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable non-transitory storage medium within the respective computing/processing device.
What has been described in this specification and the accompanying drawings includes examples of systems, apparatus, techniques, and computer program products that, individually and in combination, allow for tracking and tracing of components of products manufactured in industrial facilities. It is, of course, not possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various elements of the present application, but it is recognized that many further combinations and permutations of the disclosed elements are possible. It is therefore evident that various modifications may be made thereto without departing from the scope or spirit of the application. In addition, or in the alternative, other embodiments of the present application may be apparent from consideration of the specification and drawings and practice of the present application as presented herein. The examples set forth in the specification and figures are to be considered in all respects as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Referring to fig. 1, an application environment diagram of a file signing method in an embodiment of the present application is shown. The document approving method is applied to the document approving device 1. In the present embodiment, the document approval apparatus 1 may be an electronic device such as a mobile terminal or a computer. For example, the document approving device 1 may be a smart watch, a bracelet, a mobile phone, a laptop, a tablet computer, a desktop computer, a notebook, a server, or a cloud terminal device. The file approving apparatus 1 is installed with a file approving application (for example, the file approving system in fig. 2), and a user can implement automatic file approving by performing corresponding operations on a displayed operation interface in the running file approving application.
In this embodiment, the document approving device 1 at least includes a power source 11, a processor 12, a memory 13, an input device 14, a camera 15, an audio circuit 16, a display unit 17, a radio frequency circuit 18, and a WiFi module 19. The processor 12 is electrically connected to the power supply 11, the memory 13, the input device 14, the camera 15, the audio circuit 16, the display unit 17, the radio frequency circuit 18, and the WiFi module 19, respectively. The power supply 11 is used to supply power to the various components of the document approving device 1. The input device 14 is used for receiving information input by a user, such as login request information input by a guest who wants to sign a document, personal basic information, etc., and transmitting the received information to the processor 12. For example, the input device 14 may be at least one of a mouse, a keyboard, and a touch screen. The camera 15 is used to acquire image data, such as facial image information of a visitor who is to sign a document, and transmit the image data to the processor 12. Audio circuitry 16 is operative to receive user speech information and to communicate the received speech information to processor 12. The display unit 17 is used for receiving the image data transmitted by the processor 12 and displaying the image data, and is also used for displaying an operation interface of the file approval application program. The document signing device 1 is in communication connection with a network or a server through the radio frequency circuit 18 or the WiFi module 19, and is used for receiving information sent by the network or the server.
In this embodiment, the processor 12 may be a Central Processing Unit (CPU), other general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, or the like. In another embodiment, the processor 12 may be a microprocessor or any conventional processor, and the processor 12 may also be a control center of the document approving apparatus 1, and various interfaces and lines may be used to connect various parts of the entire document approving apparatus 1.
In the present embodiment, the memory 13 is used for storing data and/or software codes. In this embodiment, the storage 13 may be an internal storage unit in the document approving apparatus 1, for example, a hard disk or a memory in the document approving apparatus 1. In another embodiment, the memory 13 may also be an external storage device in the document approving apparatus 1, such as a plug-in hard disk equipped on the document approving apparatus 1, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like.
Referring to fig. 2, a functional unit diagram of a file signing system 100 according to an embodiment of the present application is shown. In this embodiment, the document approving system 100 includes an information management system 200 and an approving system 300. In the present embodiment, the information management system 200 and the approval system 300 are applied to different terminal apparatuses, and the information management system 200 and the approval system 300 are connected via a network. In another embodiment, the information management system 200 and the approving system 300 are applied in the same terminal, for example, the information management system 200 and the approving system 300 are applied in the document approving device 1.
In the present embodiment, the information management system 200 includes an information entry interface module 201, a used stamp verification module 202, an information generation module 203, and an electronic stamp stamping module 204. The information entry interface module 201 is used for receiving an incumbent certification application form submitted by a visitor. The use seal auditing module 202 is used for carrying out use seal auditing on the on-duty certification application form. The information generation module 203 generates a first permission list and a second permission list according to the on-duty certification application form which completes the seal audit, wherein the first permission list comprises information of the visitor who completes the seal audit, and the second permission list comprises information of the unit to which the visitor who completes the seal audit belongs. The electronic seal stamping module 204 is used for automatically stamping the electronic seal of the visitor unit to which the visitor belongs on the certificate-of-employment application form after the use-seal auditing module 202 completes the use-seal auditing.
In this embodiment, the signature system 300 includes a login management module 301, a real-name authentication module 302, a first signature verification module 303, a print notification module 304, a second signature verification module 305, a file signature verification module 306, a recording module 307, and a query module 308. In the present embodiment, the login management module 301, the real name authentication module 302, the first signature verification module 303, the used-print notification module 304, the second signature verification module 305, the file signature verification module 306, the recording module 307, and the query module 308 are stored in the memory 13 of the file signature verification apparatus 1, and are called and executed by the processor 12. Modules, as referred to herein, are a series of computer program instruction segments that are capable of performing a particular function and are more suitable than programs for describing the execution of software in the signing system 300. In other embodiments, the login management module 301, the real name authentication module 302, the first signature verification module 303, the notice of use module 304, the second signature verification module 305, the file signature verification module 306, the recording module 307, and the query module 308 are program segments or code embedded or fixed in the processor 12 of the file signature device 1.
The login management module 301 obtains login request information input by a guest and allows the guest to login when the login request information is in the first permission list.
In this embodiment, the login management module 301 displays a login interface 20, and obtains login request information input by the visitor through the input device 14 through the login interface 20. Referring to fig. 3, a schematic diagram of a login interface 20 according to an embodiment of the present disclosure is shown, in which the login interface 20 includes a user name input field 21 and a certificate code input field 22. The login request information comprises user name information and certificate code information. After the visitor inputs the user name information in the user name input field 21 and the credential code information in the credential code input field 22, the login management module 301 obtains the login request information including the user name information and the credential code information through the login interface 20.
The login management module 301 further determines whether the login request information is in the first permission list. In this embodiment, the information of the visitor who has previously completed the audit with the stamp stored in the first permission list includes user name information and certificate code information of the visitor, the user name information of the visitor includes a simplified name, a traditional name and the like of the visitor, and the certificate code information of the visitor includes an identity card number, a employee's card number, a passport number and the like of the visitor. The login management module 301 determines whether the user name information and the credential code information in the login request information are recorded in the first permission list, and determines that the login request information is in the first permission list when the user name information and the credential code information in the login request information are recorded in the first permission list, otherwise determines that the login request information is not in the first permission list. In another embodiment, the information of the visitor who previously completes the audit with the stamp stored in the first permission list includes user name information or certificate code information of the visitor, the login management module 301 determines whether the user name information or certificate code information in the login request information is recorded in the first permission list, and determines that the login request information is in the first permission list when the user name information or certificate code information in the login request information is recorded in the first permission list, otherwise determines that the login request information is not in the first permission list. In this embodiment, the login management module 301 allows the guest to log in the default system when the login request information is in the first permission list. In this embodiment, the default system is a platform for checking a document with a stamp.
Whether the login request information is in the first permission list or not is judged by the login management module 301, so that visitor groups can be limited, and the condition that technical information, production information and the like of companies and clients are leaked due to the fact that unallowed visitors contact or enter new product research and development or product production areas of the companies is avoided.
The real-name authentication module 302 performs real-name verification on the successfully logged-in visitor. Referring to fig. 4, a functional block diagram of the real-name authentication module 302 according to an embodiment of the invention is shown. In the present embodiment, the real name authentication module 302 includes a first verification module 3021, a first confirmation module 3022, a second verification module 3023, and a second confirmation module 3024. In one embodiment, the first verification module 3021 is configured to obtain basic personal information input by a visitor and determine whether the basic personal information input by the visitor is consistent with basic personal information previously recorded in the first permission list or the third-party server. The first confirmation module 3022 is configured to confirm that the visitor passes real-name authentication when it is confirmed that the acquired personal basic information of the face is consistent with the personal basic face information recorded in advance in the first authority list or the third-party server; and when the personal basic information of the visitor is confirmed to be inconsistent with the personal basic information recorded in the first permission list or the third-party server in advance, confirming that the visitor does not pass real-name verification. It should be noted that the personal basic information here includes a name, a mobile phone number, an identification number, and the like. The second verification module 3023 is configured to obtain the face information of the visitor when it is determined that the personal basic information of the visitor is consistent with the personal basic information recorded in advance in the first permission list or the third-party server, and determine whether the obtained face information is consistent with the face information recorded in advance in the first permission list or the third-party server. The second confirmation module 3024 is configured to confirm that the visitor passes real-name authentication when it is confirmed that the acquired face information is consistent with the face information recorded in advance in the first authority list or the third-party server; and when the obtained face information is confirmed to be inconsistent with the face information recorded in advance in the first authority list or the third-party server, confirming that the visitor does not pass real-name verification.
The visitor who successfully logs in is subjected to real-name verification through the real-name authentication module 302, so that the identity authenticity of the visitor can be ensured, and the condition that other people disguise as permitted visitors to contact or enter a new product research and development area or a product production area of a company to cause the leakage of technical information, production information and the like of the company and customers is avoided.
Although in the present embodiment, the real-name authentication module 302 performs real-name authentication for each successfully logged-in visitor, according to actual needs, the real-name authentication module 302 may perform real-name authentication only for the successfully logged-in visitor for the first time and not perform real-name authentication for the same successfully logged-in visitor for the second time and later. Further, although the real-name authentication module 302 performs real-name authentication by the first authentication module 3021, the first confirmation module 3022, the second authentication module 3023, and the second confirmation module 3024 in the present embodiment, the real-name authentication module 302 may perform real-name authentication only by the first authentication module 3021, the first confirmation module 3022, or only by the second authentication module 3023, and the second confirmation module 3024, as necessary.
The first signing and checking module 303 receives first confirmation information input by the visitor when confirming that the visitor passes the real-name verification, generates a first printing instruction according to the first confirmation information, and completes the signing and checking of the visitor on the preset file according to the first printing instruction. In this embodiment, the first signature checking module 303 provides the first signature checking interface 30 for the visitor to input the first confirmation information. Referring to fig. 5, a schematic diagram of a first signoff interface 30 according to an embodiment of the present application is shown. In particular embodiments, first endorsement interface 30 includes a display area 31 and a content validation option 32. The first signature check module 303 displays the contents of the preset file on the display area 31 and displays the verification code interface 40 when it is determined that the visitor selects the contents confirmation option 32 (in other words, when the visitor receives the first confirmation message input). Please refer to fig. 6, which is a diagram illustrating a verification code interface 40 according to an embodiment of the present application. In this embodiment, the verification code interface 40 displays a verification code sending field 41 and a verification code inputting field 42. In this embodiment, the first signature checking module 303 sends the target verification code to the communication device of the visitor through the background server when determining that the visitor selects the verification code sending field 41. The first signature checking module 303 receives the verification code inputted by the visitor through the verification code input field 42, and generates a first printing instruction when the verification code inputted by the visitor in the verification code input field 42 is identical to the target verification code. Then, the first signature checking module 303 checks the visitor with the signature on the preset document according to the completion of the first print instruction generation.
The seal notification module 304 generates notification information to notify the visitor unit where the visitor in the second permission list is located to perform seal verification on the preset file after the first seal verification module 303 completes the seal verification. In this embodiment, the notification message is at least one of a text message and a voice message. In this embodiment, the usage print notifying module 304 generates a text message or a voice message, and then sends the text message or the voice message to a terminal corresponding to a visitor unit through the radio frequency circuit 18 or the WiFi module 19, so as to notify the visitor unit where the visitor in the second permission list is located to perform usage print verification on the preset file.
In this embodiment, the usage print notification module 304 generates notification information after the first signature checking module 303 completes the usage print checking to notify the visitor unit where the visitor in the second permission list is located to select a preset file from the file list to be checked, and performs the usage print checking on the preset file.
The second signature checking module 305 generates a second signature instruction in response to the second confirmation information input by the visitor unit according to the notification information, and completes signature checking of the visitor unit on the preset file according to the second signature instruction. In this embodiment, the visitor unit inputs the second confirmation information after completing the authentication through the corresponding terminal and sends the second confirmation information to the document approving apparatus 1. The second signature checking module 305 receives the second confirmation information to generate a second signature instruction, and completes the signature checking of the visitor unit on the preset file according to the second signature instruction.
The file signing module 306 is configured to provide a plurality of project files before performing real name verification on a successfully logged-in visitor, and use a project file selected by the visitor from the plurality of project files as a preset file. Thus, the operation convenience and the operation efficiency are improved. In this embodiment, the predetermined file includes at least a security contract.
The recording module 307 is used for storing a preset file for completing the signature check. In this embodiment, the recording module 307 is further configured to obtain credential number information of the visitor included in the login request information, obtain a project name of the preset file, obtain a signature and check date for the preset file, obtain a file number of the preset file, and generate a recording list according to the credential number information of the visitor, the project name of the preset file, the signature and check date for the preset file, and the file number. In this embodiment, the recording module 307 is further configured to locally store the pre-set file signed by the seal for the visitor unit.
The query module 308 is configured to provide a query interface, receive query information, and query the checking progress of the preset file according to the query information. In this embodiment, the query information includes a file number of the preset file, and the query module 308 queries the signing and checking progress of the corresponding preset file according to the file number of the preset file in the query information.
According to the application, the visitor signs and checks the printing on the preset file according to the first printing instruction, the notification information is generated to inform the visitor unit where the visitor in the second permission list is located to conduct printing verification, the visitor unit responds to second confirmation information input by the notification information, the second printing instruction is generated, and the visitor unit signs and checks the printing on the preset file according to the second printing instruction, so that the problems that an invested specially-assigned person manages the books of the confidential contracts and the visitor's certificate files inefficiently and the cost is increased can be avoided, and meanwhile the problem that the books are easy to lose due to storage can be avoided.
Referring to fig. 7, a flowchart of a file signing method according to an embodiment of the present application is shown. The method is applied to the file approving device 1. The order of the steps in the flow chart may be changed, and some steps may be omitted or combined according to different requirements. The method comprises the following steps.
Step S701, obtaining login request information input by the visitor.
In the present embodiment, the document approving apparatus 1 displays a login interface 20, and obtains login request information input by the visitor through the input apparatus 14 through the login interface 20. Referring to fig. 3, in the present embodiment, the login interface 20 includes a user name input field 21 and a certificate code input field 22. The login request information comprises user name information and certificate code information. After the visitor inputs the user name information in the user name input field 21 and the certification code information in the certification code input field 22, the document approving apparatus 1 acquires the login request information including the user name information and the certification code information through the login interface 20.
Step S702 determines whether the login request information is in the first permission list. In this embodiment, the information of the visitor who has previously completed the audit with the stamp stored in the first permission list includes user name information and certificate code information of the visitor. The file signing device 1 judges whether the user name information and the certificate code information in the login request information are recorded in the first authority list, and determines that the login request information is in the first authority list when the user name information and the certificate code information in the login request information are recorded in the first authority list, otherwise determines that the login request information is not in the first authority list. In another embodiment, the information of the visitor who previously completed the audit with prints stored in the first authority list includes user name information or certificate code information of the visitor, the file approving apparatus 1 determines whether the user name information or certificate code information in the login request information is recorded in the first authority list, and determines that the login request information is in the first authority list when the user name information or certificate code information in the login request information is recorded in the first authority list, otherwise determines that the login request information is not in the first authority list. In this embodiment, the document signing and checking device 1 acquires a certificate of the visitor in work, and generates a first permission list according to visitor information recorded in the certificate of the visitor in work, wherein the visitor information at least includes user name information, certificate code information, contact information and the like.
In step S703, when the login request information is in the first permission list, a preset file is obtained. In this embodiment, when the login request information is in the first permission list, the document approving apparatus 1 provides a plurality of project documents, and the receiving visitor selects one of the project documents as the default document. In this embodiment, the predetermined file includes at least a security contract.
Step S704, the real name verification is carried out on the visitor. Fig. 8 is a flowchart illustrating real-name authentication for a visitor according to an embodiment of the present application. The real name verification of the visitor comprises the following steps: step S801, acquiring personal basic information input by a visitor; step S802, judging whether the personal basic information input by the visitor is consistent with the personal basic information recorded in advance in the first permission list or the third-party server, wherein the step S803 is executed when the personal basic information of the visitor is confirmed to be consistent with the personal basic information recorded in advance in the first permission list or the third-party server, otherwise, the step S805 is executed; step S803, obtaining the face information of the visitor, and judging whether the obtained face information is consistent with the face information recorded in advance in the first authority list or the third-party server, wherein the step S804 is executed when the obtained face information is confirmed to be consistent with the face information recorded in advance in the first authority list or the third-party server, otherwise, the step S805 is executed; step S804, confirming that the visitor passes real name verification; in step S805, it is confirmed that the visitor has not passed the real name authentication.
Step S705, receiving first confirmation information input by the visitor when the visitor is confirmed to pass real name verification, and generating a first stamp instruction according to the first confirmation information. In the present embodiment, the document approving apparatus 1 provides a first approving interface 30 for the visitor to input the first confirmation information. Referring to FIG. 4, in one embodiment, the first endorsement interface 30 includes a display area 31 and a content validation option 32. The document approving apparatus 1 displays the contents of a preset document on the display area 31 and displays the verification code interface 40 when it is determined that the visitor selects the contents confirmation option 32. Referring to fig. 5, the verification interface 40 displays a verification code sending field 41 and a verification code input field 42. In this embodiment, the document approving apparatus 1 transmits the target verification code to the communication apparatus of the visitor through the backend server when it is determined that the visitor selects the verification code transmission field 41, receives the verification code input by the visitor through the verification code input field 42, and generates the first print instruction when the verification code input by the visitor in the verification code input field 42 is identical to the target verification code.
Step S706, completing the printing signing check of the visitor on the preset file according to the first printing instruction, and generating notification information to notify the visitor unit where the visitor in the second permission list is located to perform printing checking on the preset file. In the present embodiment, the document signing apparatus 1 completes signing with a stamp on a preset document by a visitor according to the generated first stamp instruction. The document signing and checking device 1 generates notification information after the visitor completes signing and checking the preset document with the seal, so as to notify the visitor unit where the visitor in the second permission list is located to check the preset document with the seal. The notification message is at least one of a text message or a voice message. In this embodiment, the document approving device 1 generates a text message or a voice message, and then sends the text message or the voice message to a terminal corresponding to a visitor unit through the radio frequency circuit 18 or the WiFi module 19, so as to notify the visitor unit where the visitor in the second permission list is located to perform a usage-printing audit on the preset document. In this embodiment, the second permission list records information of the visitor unit, such as a simplified name, a traditional name, a simplified legal representative name, a traditional legal representative name, and the like of the visitor unit. In a specific embodiment, the document approving apparatus 1 generates a second permission list according to guest unit information recorded in the guest job certification document.
In this embodiment, the document signing and checking device 1 stores the preset document in the document list to be signed and checked after completing the signature signing and checking of the visitor on the preset document according to the first print instruction, generates the notification information to notify the visitor unit where the visitor in the second permission list is located to select the preset document from the document list to be signed and checks the preset document for printing.
Step S707, in response to the second confirmation information input by the visitor unit according to the notification information, generates a second stamp instruction. In this embodiment, the visitor unit inputs the second confirmation information after completing the authentication through the corresponding terminal and sends the second confirmation information to the document approving apparatus 1. The document approving device 1 receives the second confirmation information and generates a second stamp instruction.
And step S708, completing the seal signing check of the visitor unit on the preset file according to the second seal instruction.
In this embodiment, after the completion of the approval of the stamp for use on the preset document, the method further includes: and storing the preset file which is checked with the seal. In this embodiment, the document signing apparatus 1 is further configured to obtain document number information of the visitor included in the login request information, obtain a project name of the preset document, obtain a signature date for the preset document, obtain a document number of the preset document, and generate a record list according to the document number of the visitor, the project name of the preset document, the signature date for the preset document, and the document number. In this embodiment, the document signing apparatus 1 is further configured to locally store the pre-set document signed by the seal for the visitor unit.
In this embodiment, after the completion of the approval of the stamp for use on the preset document, the method further includes: providing a query interface, receiving query information, and querying the signing and checking progress of the preset file according to the query information. In this embodiment, the query information includes a file number of the preset file, and the file approving device 1 queries the approving progress of the corresponding preset file according to the file number of the preset file in the query information.
In this embodiment, the method further comprises: and when the login request information is judged to be in the first permission list, determining that the visitor successfully logs in the preset system, and displaying the corresponding function according to the role of the visitor after the visitor successfully logs in. In this embodiment, the default system is a platform for signing and checking a file by printing, for example, the default system has a function of displaying the default file, providing a first signing and checking interface, and displaying a record list. In the embodiment, the role of the visitor can be set according to the role level of the visitor, and different authority management functions can be displayed according to different roles of the visitor.
According to the method and the system, the visitor signs and checks the printing on the preset file according to the first printing instruction, the notification information is generated to inform the visitor unit where the visitor in the second permission list is located to check the printing, the visitor unit responds to the second confirmation information input by the notification information, the second printing instruction is generated, and the visitor unit signs and checks the printing on the preset file according to the second printing instruction, so that the problems of low efficiency and cost increase of managing the paper books of the confidential contract and the visitor on duty certification file by investors can be avoided, and meanwhile the problem that the paper books are easy to lose due to storage can be avoided.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is to be understood that the word "comprising" does not exclude other modules or steps, and the singular does not exclude the plural. Several modules or electronic devices recited in the electronic device claims may also be implemented by one and the same module or electronic device by means of software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present application and not for limiting, and although the present application is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present application without departing from the spirit and scope of the technical solutions of the present application.

Claims (15)

1. A file approving method, comprising:
obtaining login request information input by a visitor;
judging whether the login request information is in a first authority list or not;
when the login request information is in the first permission list, acquiring a preset file;
performing real name verification on the visitor;
receiving first confirmation information input by the visitor when the visitor is confirmed to pass the real-name verification, and generating a first printing instruction according to the first confirmation information;
completing the printing and signing check of the visitor on the preset file according to the first printing instruction, and generating notification information to notify a visitor unit to which the visitor belongs in a second permission list to carry out printing and auditing;
responding to second confirmation information input by the visitor unit according to the notification information, and generating a second stamp instruction; and
and completing the printing and signing check of the visitor unit on the preset file according to the second printing instruction.
2. The document signing method of claim 1, further comprising: before obtaining the login request information input by the guest,
obtaining a visitor presence certificate;
generating the first permission list according to visitor information recorded in the visitor presence certificate file; and
and generating the second permission list according to the visitor unit information recorded in the visitor on-duty certification document.
3. The document approving method according to claim 1, wherein the acquiring the preset document includes:
providing a plurality of project files when the login request information is in the first permission list;
and taking one project file selected by the visitor from the plurality of project files as the preset file.
4. The document signing method of claim 1, wherein said validating said guest for a real name comprises:
acquiring personal basic information input by the visitor, and judging whether the personal basic information input by the visitor is consistent with personal basic information recorded in advance in the first permission list or a third-party server;
when confirming that the personal basic information of the visitor is consistent with the personal basic information recorded in advance in the first permission list or the third-party server, acquiring the face information of the visitor, and judging whether the acquired face information is consistent with the face information recorded in advance in the first permission list or the third-party server;
when the acquired face information is confirmed to be consistent with the face information recorded in advance in the first authority list or a third-party server, confirming that the visitor passes the real-name verification; and
and when the personal basic information of the visitor is confirmed to be inconsistent with the personal basic information recorded in advance in the first permission list or the third-party server, or when the acquired face information is confirmed to be inconsistent with the face information recorded in advance in the first permission list or the third-party server, confirming that the visitor does not pass the real-name authentication.
5. The document approving method of claim 1, wherein the receiving the first confirmation input by the guest comprises:
providing a first approving interface, wherein the content and the content confirmation option of the preset file are displayed on the first approving interface;
displaying a verification code interface when the visitor is determined to select the content confirmation option, wherein a verification code sending field and a verification code input field are displayed on the verification code interface;
when the visitor is determined to select the verification code sending field, sending a target verification code to the mobile phone of the visitor;
receiving a verification code input by the visitor through the verification code input field; and
and when the verification code input by the visitor in the verification code input field is consistent with the target verification code, generating the first confirmation message.
6. The document approving method according to claim 1, further comprising, after completing the approving of the guest unit on the preset document with the seal according to the second print instruction:
acquiring certificate number information of the visitor contained in the login request information;
acquiring the project name of the preset file;
acquiring the seal check date of the preset file;
acquiring the file number of the preset file; and
and generating a record list according to the certificate number information of the visitor, the special case name of the preset file, the seal check date and the file number.
7. The document signing method of claim 1, further comprising:
providing a query interface, receiving query information, and querying the signing and checking progress of the preset file according to the query information.
8. The document signing method of claim 1, further comprising:
and locally storing the preset file which is signed and checked by the visitor unit.
9. The document signing method of claim 1, further comprising:
and displaying the corresponding function according to the role of the visitor after the login is successful.
10. A document approving device comprising:
an input device;
a processor connected to the input device for:
obtaining login request information input by a visitor;
judging whether the login request information is in a first authority list or not;
when the login request information is in the first permission list, acquiring a preset file;
performing real name verification on the visitor;
receiving first confirmation information input by the visitor when the visitor is confirmed to pass the real-name verification, and generating a first printing instruction according to the first confirmation information;
completing the printing and signing check of the visitor on the preset file according to the first printing instruction, and generating notification information to notify a visitor unit to which the visitor belongs in a second permission list to carry out printing and auditing;
responding to second confirmation information input by the visitor unit according to the notification information, and generating a second stamp instruction; and
and completing the printing and signing check of the visitor unit on the preset file according to the second printing instruction.
11. A document approving system comprising:
the information management system comprises an information input interface module, a used seal auditing module and an information generating module, wherein the information input interface module is used for receiving an on-duty certificate application form submitted by a visitor; the use-print auditing module is used for carrying out use-print auditing on the on-duty certification application form; the information generation module generates a first permission list and a second permission list according to the on-duty certification application form which finishes the usage audit, wherein the first permission list comprises information of the visitor who finishes the usage audit, and the second permission list comprises information of the unit to which the visitor who finishes the usage audit belongs;
the signing and checking system connected with the information management system through a network comprises a login management module, a real-name authentication module, a first signing and checking module, a printing notification module and a second signing and checking module:
the login management module is used for acquiring login request information input by a visitor and allowing the visitor to log in when the login request information is in the first permission list;
the real-name verification module is used for performing real-name verification on the visitor who successfully logs in;
the first seal signing module is used for receiving first confirmation information input by the visitor when the visitor is confirmed to pass real-name verification, generating a first seal instruction according to the first confirmation information, and completing seal signing and signing for the visitor on a preset file according to the first seal instruction;
the seal use notification module is used for generating notification information after the first seal check module completes the seal use check so as to notify the visitor unit to which the visitor belongs in the second permission list to carry out seal use check;
and the second signature checking module is used for responding to second confirmation information input by the visitor unit according to the notification information, generating a second signature instruction, and completing the signature checking of the visitor unit on the preset file according to the second signature instruction.
12. The document approving system of claim 11, wherein the real name verification module comprises:
the first verification module is used for acquiring the personal basic information input by the visitor and judging whether the personal basic information input by the visitor is consistent with the personal basic information recorded in advance in the first permission list or the third-party server;
the first confirmation module is used for confirming that the visitor passes the real-name verification when the obtained personal basic information is confirmed to be consistent with the personal basic information recorded in advance in the first permission list or the third-party server; confirming that the visitor is not authenticated by the real name when it is confirmed that the personal basic information of the visitor is not identical to the personal basic information previously recorded in the first authority list or the third-party server.
13. The document approving system of claim 12, wherein the real name verification module further comprises:
the second verification module is used for acquiring the face information of the visitor when confirming that the personal basic information of the visitor is consistent with the personal basic information recorded in advance in the first authority list or the third-party server, and judging whether the acquired face information is consistent with the face information recorded in advance in the first authority list or the third-party server;
the second confirmation module is used for confirming that the visitor passes the real-name verification when the obtained face information is consistent with the face information recorded in advance in the first authority list or the third-party server; and when the acquired face information is confirmed to be inconsistent with the face information recorded in advance in the first authority list or the third-party server, confirming that the visitor does not pass the real-name verification.
14. The document approving system of claim 11, further comprising:
and the electronic seal stamping module is used for automatically stamping the electronic seal of the visitor unit to which the visitor belongs on the on-duty certification application form after the use seal auditing module finishes use seal auditing.
15. The document approving system of claim 11, further comprising:
and the file signing module is used for providing a plurality of project files before the successful login visitor is subjected to real name verification, and taking one project file selected by the visitor from the plurality of project files as the preset file.
CN202010920761.4A 2020-09-04 2020-09-04 File signing and checking device, system and method Pending CN112231656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010920761.4A CN112231656A (en) 2020-09-04 2020-09-04 File signing and checking device, system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010920761.4A CN112231656A (en) 2020-09-04 2020-09-04 File signing and checking device, system and method

Publications (1)

Publication Number Publication Date
CN112231656A true CN112231656A (en) 2021-01-15

Family

ID=74116061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010920761.4A Pending CN112231656A (en) 2020-09-04 2020-09-04 File signing and checking device, system and method

Country Status (1)

Country Link
CN (1) CN112231656A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200601776A (en) * 2004-06-17 2006-01-01 Town & Talent Technology China Co Ltd Electronic signing security protection system and method thereof
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
CN106453292A (en) * 2016-09-29 2017-02-22 广州鹤互联网科技有限公司 Electronic endorsement user management method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200601776A (en) * 2004-06-17 2006-01-01 Town & Talent Technology China Co Ltd Electronic signing security protection system and method thereof
WO2010143001A1 (en) * 2009-06-12 2010-12-16 Provenance Information Assurance Ltd Electronic document verification system and method
CN106453292A (en) * 2016-09-29 2017-02-22 广州鹤互联网科技有限公司 Electronic endorsement user management method and system

Similar Documents

Publication Publication Date Title
US20230246842A1 (en) Compact recordation protocol
US11170346B2 (en) Decentralized credentials verification network
US9397980B1 (en) Credential management
US20180225631A1 (en) Dynamic notary system
WO2020108046A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
CN108551437B (en) Method and apparatus for authenticating information
CN114037435A (en) Method and apparatus for providing information attestation using a centralized or distributed ledger
US20230275762A1 (en) Did system using browser-based security pin authentication, and control method thereof
Hsu et al. Design of an e-diploma system based on consortium blockchain and facial recognition
KR102131206B1 (en) Method, service server and authentication server for providing corporate-related services, supporting the same
CN110351672B (en) Information pushing method and device and electronic equipment
TW202022663A (en) Identity authentication system and method thereof
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN111681141B (en) File authentication method, file authentication device and terminal equipment
CN113783690A (en) Tender inviting method and device based on authentication
CN112529537A (en) Patent licensing method, device, equipment and storage medium based on block chain
CN112231656A (en) File signing and checking device, system and method
van den Broek et al. Securely derived identity credentials on smart phones via self-enrolment
US20230177528A1 (en) Systems and methods for data insights from consumer accessible data
US20230130024A1 (en) System and method for storing encryption keys for processing a secured transaction on a blockchain
TWM636173U (en) Online Grant Application System
CN111199585B (en) Ticket checking method, device, system, storage medium and computer equipment
US20250037112A1 (en) Decentralized identifier based form submissions
KR102750827B1 (en) A certificate issuance brokerage system tailored to the applicant
US20240289908A1 (en) System and method for identification document verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518109 Foxconn H5 plant 101, No. 2, Donghuan 2nd Road, Fukang community, Longhua street, Longhua District, Shenzhen, Guangdong Province; plant 5, building C09, 4th floor, building C07, 2nd floor, building C08, 3rd floor, 4th floor, building C04, zone B, Foxconn Hongguan science and Technology Park, Fucheng Dasan community, Guanlan street, Guangdong Province

Applicant after: Fulian Yuzhan Technology (Shenzhen) Co.,Ltd.

Address before: 518109 Guangzhou Guanlan Foxconn Hongguan Science Park B workshop 5 C09 buildings 4 floors, C07 buildings 2 floors, C08 buildings 3 floors 4 floors, C04 buildings 1 floors

Applicant before: SHENZHENSHI YUZHAN PRECISION TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210115

WD01 Invention patent application deemed withdrawn after publication