CN114444129B - Method and system for dynamically controlling electronic seal - Google Patents
Method and system for dynamically controlling electronic seal Download PDFInfo
- Publication number
- CN114444129B CN114444129B CN202111627736.8A CN202111627736A CN114444129B CN 114444129 B CN114444129 B CN 114444129B CN 202111627736 A CN202111627736 A CN 202111627736A CN 114444129 B CN114444129 B CN 114444129B
- Authority
- CN
- China
- Prior art keywords
- electronic seal
- request
- file
- electronic
- initiator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 239000003999 initiator Substances 0.000 claims abstract description 161
- 238000012795 verification Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 12
- 238000009826 distribution Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 description 7
- 238000013475 authorization Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000005242 forging Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method and a system for dynamically controlling an electronic seal, wherein the method comprises the following steps: acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request initiator, and determining whether a time interval in the request content meets the requirement according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content; when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier of the request initiator and the limited file range in the electronic seal; the electronic seal is assigned to the requesting initiator so that the requesting initiator can use the electronic seal on electronic files belonging to a defined file range before the lifetime of the electronic seal expires.
Description
Technical Field
The invention relates to the technical field of information processing, in particular to a method and a system for dynamically controlling an electronic seal.
Background
The current market economy is credit economy, a market main body needs to establish a contractual relationship to realize off-line or on-line transaction, and the establishment of the contractual relationship firstly needs to establish a credit relationship between contractual parties. The seal is a representation of the credit relationship of the two parties of the guarantee transaction in the contract relationship, and influences the contract relationship to be contracted and executed. Therefore, the seal is not only a symbol in the self identity group of the market subject, but also a token for establishing the credit relationship. If the seal is forged, stolen and priced, the effectiveness of the seal will inevitably destroy the credit relationship between the economic main bodies of the market and disturb the normal order of the market operation.
In order to solve the problems of seal forging, embezzlement and private carving, electronic seals are currently arranged on the market, but most of the current electronic seals provide electronic seal services for application systems such as enterprise internal ERP, financial systems, contracts and the like, and lack of electronic seal mutual recognition mechanisms among enterprises, so that the enterprise electronic seals have serious 'island' phenomenon, and great inconvenience is brought to on-line business handling of enterprises in cross-industry, cross-region and cross-field.
Disclosure of Invention
In summary, in order to fundamentally solve the defects of the current electronic seal, the invention provides an enterprise electronic seal platform oriented to credit economy, which provides electronic seal services capable of mutual identification, anti-counterfeiting, anti-theft and anti-private for market subjects.
The platform uses digital technology with electronic authentication, electronic signature and electronic storage as cores, uses block chain as a bottom layer supporting system, and combines information provided by departments such as market bureau, public security and administrative bureau to treat data together. The platform not only solves the problems of social credibility, legal effectiveness, safety, mutual recognition and the like of the enterprise electronic seal, but also provides the capability of a third party organization for accessing the enterprise electronic seal, expands the application of the platform in the aspect of the electronic seal and realizes the mutual data communication and mutual recognition added into the platform organization.
The enterprise electronic seal platform comprises enterprise electronic seal management, enterprise electronic certificate storage management, enterprise electronic seal verification management, enterprise electronic seal application, an open platform based on Internet +, a trusted electronic authentication service platform, a blockchain service platform and a micro service platform.
According to one aspect of the present invention, there is provided a method of dynamically controlling an electronic seal, the method comprising:
In response to receiving the electronic seal use request, the enterprise server parses the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and request content, the request content including: time interval and file range;
Acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request party, determining whether a file range in the electronic seal dynamic configuration file is consistent with a file range in request content, and determining whether a time interval in the request content meets requirements according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
When the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier of the request initiator and the limited file range in the electronic seal;
The electronic seal is assigned to the requesting initiator so that the requesting initiator can use the electronic seal on electronic files belonging to a defined file range before the lifetime of the electronic seal expires.
Preferably, before the electronic seal dynamic configuration file of the requesting party is obtained according to the user identifier of the requesting party,
The enterprise server authenticates the request originator based on the user identifier of the request originator.
Preferably, the enterprise server performs identity authentication on the request initiator based on the user identifier of the request initiator, including:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
Preferably, the enterprise server performs identity authentication on the request initiator based on the user identifier of the request initiator, including:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
Preferably, the method further comprises the steps of obtaining a seal name of each electronic seal in at least one electronic seal in the electronic seal dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
Preferably, the determining whether the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content includes:
Taking a file range in the dynamic configuration file of the electronic seal as a first file set;
Taking the file range in the request content as a second file set;
When the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content;
when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
Preferably, the determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file includes:
Determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal;
determining a second time length according to the time interval in the request content;
when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement;
and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
Preferably, the electronic seal is automatically de-registered when the lifetime of the electronic seal expires.
Preferably, when the request initiator wishes to use the electronic seal on the specific file, determining whether the specific file belongs to the limited file range according to the limited file range of the electronic seal;
when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file;
When the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file.
Preferably, after the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises:
the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
According to another aspect of the present invention, there is provided a system for dynamically controlling an electronic stamp, the system comprising:
The enterprise server analyzes the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal and request content in response to receiving the electronic seal use request, wherein the request content comprises: time interval and file range;
The determining device is used for acquiring the electronic seal dynamic configuration file of the requesting party according to the user identifier of the requesting party, determining whether the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content, and determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
the setting device is used for generating the electronic seal for the request initiator when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, setting the life time for the electronic seal based on the time interval in the request content and setting the user identifier of the request initiator and the limited file range in the electronic seal;
And the distribution device is used for distributing the electronic seal to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the life time of the electronic seal expires.
Preferably, authentication means are also included for causing
The enterprise server authenticates the request originator based on the user identifier of the request originator.
Preferably, the authentication device is specifically configured to:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
Preferably, the authentication means is particularly for
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
Preferably, the electronic seal verification device is used for obtaining the seal name of each electronic seal in at least one electronic seal in the electronic seal dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
Preferably, the determining device is specifically configured to:
Taking a file range in the dynamic configuration file of the electronic seal as a first file set;
Taking the file range in the request content as a second file set;
When the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content;
when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
Preferably, the determining means is specifically for:
Determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal;
determining a second time length according to the time interval in the request content;
when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement;
and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
Preferably, the electronic seal is automatically de-registered when the lifetime of the electronic seal expires.
Preferably, when the request initiator wishes to use the electronic seal on the specific file, determining whether the specific file belongs to the limited file range according to the limited file range of the electronic seal;
when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file;
When the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file.
Preferably, after the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises:
the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
The technical key points of the invention are as follows: 1. and constructing a trusted electronic authentication platform by using a block chain technology, and realizing a digital certificate mutual authentication mechanism between electronic authentication service institutions. 2. And the intercommunication and mutual recognition of the enterprise electronic seal are realized based on the trusted authentication service platform. 3. The block chain technology is utilized to enable the information of the enterprise electronic seal to be linked and record the use electronic certificate of the enterprise electronic seal every time, so that the artificial data tampering is avoided, and the enterprise electronic seal is safer.
The technical scheme of the invention has the following advantages: 1. the electronic seal platform for enterprises facing credit economy is constructed by departments of united market bureaus, public security and the like, has social credibility and legal effectiveness, and solves the problem of inter-recognition of electronic signature intercommunication across industries and regions. 2. The provided electronic seal service function has the characteristics of history tracing, tamper resistance and the like, and solves the problems of forging, embezzling and prizing of enterprises using traditional entity seals. 3. The third party access capability of the electronic seal service is provided, the mechanism added to the platform can share information with enterprises and mutually recognize services, a good credit economic system is built, and the enterprise Li Guoli is served.
Drawings
Exemplary embodiments of the present invention may be more completely understood in consideration of the following drawings:
FIG. 1 is a flow chart of a method of dynamically controlling an electronic seal according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an implementation structure of an enterprise electronic seal platform application method oriented to credit economy according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a system for dynamically controlling an electronic stamp according to an embodiment of the present invention.
Detailed Description
Fig. 1 is a flowchart of a method of dynamically controlling an electronic stamp according to an embodiment of the present invention. The method 100 comprises the following steps: step 101, in response to receiving an electronic seal use request, the enterprise server parses the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and request content, where the request content includes: time interval and file range.
In one embodiment, before the electronic seal dynamic configuration file of the requesting party is obtained according to the user identifier of the requesting party, the enterprise server performs identity authentication on the requesting party based on the user identifier of the requesting party.
In one embodiment, the enterprise server authenticating the request originator based on the user identifier of the request originator comprises: the enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
In one embodiment, the enterprise server authenticating the request originator based on the user identifier of the request originator comprises: the enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
Step 102, acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request party, determining whether a file range in the electronic seal dynamic configuration file is consistent with a file range in request content, and determining whether a time interval in the request content meets requirements according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content.
In one embodiment, the method further comprises the step of obtaining a stamp name of each electronic stamp in at least one electronic stamp in the electronic stamp dynamic configuration file; determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file; if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
In one embodiment, the determining whether the file range in the electronic seal dynamic configuration file is consistent with the file range in the requested content includes: taking a file range in the dynamic configuration file of the electronic seal as a first file set; taking the file range in the request content as a second file set; when the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content; when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
Step 103, when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier and the limited file range of the request initiator in the electronic seal.
In one embodiment, the determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file includes: determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal; determining a second time length according to the time interval in the request content; when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement; and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
Step 104, the electronic seal is allocated to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the lifetime of the electronic seal expires.
In one embodiment, the electronic stamp automatically de-registers when the lifetime of the electronic stamp expires. In one embodiment, when the request initiator wishes to use the electronic seal on a particular document, determining whether the particular document belongs to a defined document range based on the defined document range of the electronic seal; when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file; when the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file.
In one embodiment, after the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises: the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
Fig. 2 is a schematic diagram of an implementation structure of an enterprise electronic seal platform application method oriented to credit economy according to an embodiment of the present invention. The utility model provides an enterprise electronic seal platform towards credit economy, has realized enterprise electronic seal synchronization, enterprise electronic seal preparation, state release, seal management, document electronic signature, enterprise signature examine, digital certificate discernment and verify, functions such as timestamp service are carried out adaptation and unified encapsulation, provide unified electronic signature service ability to business application, specifically includes:
1. Enterprise electronic seal management
The enterprise electronic seal management module is responsible for accepting related business applications of the enterprise electronic seal and providing generation of the enterprise electronic seal, issuing of the enterprise electronic seal and state management of the enterprise electronic seal.
(1) Generation of enterprise electronic seal
The trusted government digital certificate system and the province public security hall seal record system are established to respectively conduct the declaration and the electronic Zhang Mo acquisition of the enterprise digital certificate, and the generation of the enterprise electronic seal is completed through the binding of the electronic seal module and the digital certificate.
(2) And issuing the enterprise electronic seal.
The life cycle management of the electronic seal is completed, and the electronic seal comprises the functions of issuing, canceling, issuing and managing an abnormal state list.
(3) Enterprise electronic seal status management
And the electronic seal management system is responsible for safely submitting enterprise registration information submitted by an issuing enterprise to a seal issuing module to complete business acceptations such as application, change, cancellation and migration of the electronic seal, and simultaneously synchronizes the information to a public security system to keep consistency with physical seal state management.
2. Electronic certificate management
The electronic evidence-storing platform is constructed based on the blockchain technology, has the characteristics of decentralization, tamper resistance and the like, and provides the services of evidence storing, evidence obtaining, verification, evidence showing and the like of the basis of electronic contracts, government service, electronic accounting files and the like for each enterprise.
3. Electronic seal application
The electronic seal application consists of a mobile terminal applet and a server terminal, and mainly provides enterprise-oriented account and authorization management and daily use of the electronic seal.
The account authorization mainly provides electronic seal account management and use authorization for enterprise users; the use of the seal mainly refers to the use of the electronic seal by means of generating or scanning a two-dimensional code and the like, such as electronic seal, electronic seal verification, electronic seal file reservation and the like related in the online working process.
4. Electronic seal verification
(1) The true validity verification of the electronic seal provides verification of the authenticity of the electronic seal for cross-department application scenes and the like based on the Internet, namely whether the electronic seal is issued by market supervision departments; and verifying the state of the electronic seal, namely whether to cancel or cancel, and putting into an abnormal operation state.
(2) Verification of electronic signature provides verification services for enterprise electronic signature behavior. When the third party system receives the signature data of the enterprise electronic seal, the information such as the electronic seal, the signature data, the signature value and the like is submitted to the electronic seal system to verify the validity and the integrity of the electronic signature.
(3) Electronic seal information verification, namely providing enterprise electronic seal information and authorization relationship checking service, and verifying the authenticity (truly existing and legally continued) of the existence of the enterprise through the enterprise name or the enterprise unified social credit code; and inquiring and returning an authorization relationship between the enterprise and the office through the identity card number of the office, namely whether the office is a legal authorized representative authorized by the enterprise.
5. Open platform technology based on Internet +'
The open platform technology is to provide public services, components and models, and by opening the standard SDK and standard API of the open platform technology, a third party application developer can generate new applications by using and assembling interfaces of the third party application developer and other third party service interfaces, and simultaneously the applications can uniformly run on the platform, thereby providing more applications for enterprises and creating a digital and platform economic system.
6. Trusted electronic authentication service platform
And binding the enterprise electronic business license, the enterprise legal person, the enterprise sponsor and the electronic authentication service organization information together by utilizing the blockchain service platform to construct a trusted electronic authentication service platform, and providing mutually-recognized digital certificate service for the enterprise electronic seal. In addition, besides the mutual authentication mechanism of the digital certificates, which is realized by the electronic authentication service institutions added to the platform, the unique situation of the electronic authentication service institutions is avoided, the monopoly situation of the market is prevented, and the development of the market economy is not facilitated.
7. Block chain service platform
And the service provided by the blockchain service platform provided by the space information institute is utilized to provide applications for the upper layer, including binding and uplink of an electronic authentication service organization and enterprise information, uplink of an enterprise electronic seal, uplink of an enterprise electronic business license, providing information traceability and tamper-proof mechanisms and the like.
8. Micro service platform
The micro-service platform provided by the space information institute is utilized to lay a foundation for upper-layer application construction, including an electronic certification authority verification service, an enterprise electronic seal verification service, an enterprise electronic business license verification service and the like.
Fig. 3 is a schematic structural diagram of a system for dynamically controlling an electronic stamp according to an embodiment of the present invention. The system 300 includes: a parsing means 301, a determining means 302, a setting means 303, a distributing means 304, an authenticating means 305 and a verifying means 306.
The parsing means 301 is configured to parse the electronic seal usage request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and a request content in response to receiving the electronic seal usage request, where the request content includes: time interval and file range;
A determining device 302, configured to obtain an electronic seal dynamic configuration file of the requesting party according to a user identifier of the requesting party, determine whether a file range in the electronic seal dynamic configuration file is consistent with a file range in the requested content, and determine whether a time interval in the requested content meets a requirement according to a time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the requested content;
setting means 303, configured to generate an electronic seal for a request initiator when it is determined that a time interval in a request content meets a requirement according to a time authority in a dynamic configuration file of the electronic seal, set a lifetime for the electronic seal based on the time interval in the request content, and set a user identifier of the request initiator and a limited file range in the electronic seal;
and the allocation means 304 is used for allocating the electronic seal to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the life time of the electronic seal expires.
Authentication means 305 for causing the enterprise server to authenticate the requesting originator based on the user identifier of the requesting originator. The authentication device 305 specifically serves to: the enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
The authentication device 305 is specifically configured to retrieve, by the enterprise server, a content database based on the user identifier of the request initiator, so as to obtain a preset identity file associated with the request initiator; analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator; and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
A verification device 306, configured to obtain a stamp name of each electronic stamp in at least one electronic stamp in the electronic stamp dynamic configuration file; determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file; if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
The determining means 302 is specifically configured to: taking a file range in the dynamic configuration file of the electronic seal as a first file set; taking the file range in the request content as a second file set; when the second file set is a subset of the first file set, determining that the file range in the dynamic configuration file of the electronic seal is consistent with the file range in the request content; when the second file set is not a subset of the first file set, determining that the file range in the electronic seal dynamic configuration file is inconsistent with the file range in the requested content.
The determining means 302 is specifically configured to: determining a first time length for allowing the electronic seal to be used according to the time authority in the dynamic configuration file of the electronic seal; determining a second time length according to the time interval in the request content; when the second time length is smaller than or equal to the first time length, determining that the time interval in the request content meets the requirement; and when the second time length is greater than the first time length, determining that the time interval in the request content is not satisfactory.
When the life time of the electronic seal expires, the electronic seal automatically logs off. When a request initiator wishes to use the electronic seal on a specific file, determining whether the specific file belongs to a limited file range according to the limited file range of the electronic seal; when the electronic seal belongs to the limited file range, allowing the request initiator to use the electronic seal on the specific file; when the electronic seal does not belong to the limited file range, the request initiator is not allowed to use the electronic seal on the specific file. After the request initiator uses the electronic seal on the electronic file belonging to the limited file range, the method further comprises the following steps: the user identifier of the request initiator, the name of the electronic seal-stamped file, the file number of the electronic seal-stamped file, and the time of stamping the electronic seal are uploaded into the blockchain.
Claims (10)
1. A method of dynamically controlling an electronic seal, the method comprising:
In response to receiving the electronic seal use request, the enterprise server parses the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal, and request content, the request content including: time interval and file range;
Acquiring an electronic seal dynamic configuration file of a request party according to a user identifier of the request party, determining whether a file range in the electronic seal dynamic configuration file is consistent with a file range in request content, and determining whether a time interval in the request content meets requirements according to time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
When the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, generating the electronic seal for the request initiator, setting the life time for the electronic seal based on the time interval in the request content, and setting the user identifier of the request initiator and the limited file range in the electronic seal;
The electronic seal is assigned to the requesting initiator so that the requesting initiator can use the electronic seal on electronic files belonging to a defined file range before the lifetime of the electronic seal expires.
2. The method of claim 1, further comprising, prior to obtaining the electronic seal dynamic profile of the requesting party based on the user identifier of the requesting party, the enterprise server authenticating the requesting party based on the user identifier of the requesting party.
3. The method of claim 2, the enterprise server authenticating the request originator based on a user identifier of the request originator comprising:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
4. The method of claim 2, the enterprise server authenticating the request originator based on a user identifier of the request originator comprising:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
5. The method of claim 1, further comprising obtaining a stamp name for each electronic stamp in at least one electronic stamp in the electronic stamp dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
6. A system for dynamically controlling an electronic seal, the system comprising:
The enterprise server analyzes the electronic seal use request to obtain a user identifier of a request initiator, a seal name of the electronic seal and request content in response to receiving the electronic seal use request, wherein the request content comprises: time interval and file range;
The determining device is used for acquiring the electronic seal dynamic configuration file of the requesting party according to the user identifier of the requesting party, determining whether the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content, and determining whether the time interval in the request content meets the requirement according to the time authority in the electronic seal dynamic configuration file when the file range in the electronic seal dynamic configuration file is consistent with the file range in the request content;
the setting device is used for generating the electronic seal for the request initiator when the time interval in the request content meets the requirement according to the time authority in the dynamic configuration file of the electronic seal, setting the life time for the electronic seal based on the time interval in the request content and setting the user identifier of the request initiator and the limited file range in the electronic seal;
And the distribution device is used for distributing the electronic seal to the request initiator so that the request initiator can use the electronic seal on the electronic file belonging to the limited file range before the life time of the electronic seal expires.
7. The system of claim 6, further comprising authentication means for causing the
The enterprise server authenticates the request originator based on the user identifier of the request originator.
8. The system of claim 7, the authentication device being specifically configured to:
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is allowed to use the electronic seal, acquiring the dynamic configuration file of the electronic seal of the request initiator according to the user identifier of the request initiator.
9. The system of claim 7, the authentication device being specifically adapted to
The enterprise server searches the content database based on the user identifier of the request initiator to acquire a preset identity file associated with the request initiator;
analyzing a preset identity file associated with the request initiator to acquire identity information of the request initiator;
and when the identity information of the request initiator indicates that the request initiator is not allowed to use the electronic seal, sending a response message for refusing to use the electronic seal to the request initiator.
10. The system of claim 6, further comprising a verification device for obtaining a stamp name for each of at least one electronic stamp in the electronic stamp dynamic configuration file;
Determining whether the seal name of the electronic seal in the electronic seal use request is matched with the seal name of any electronic seal in the electronic seal dynamic configuration file;
if the two are matched, the request initiator is allowed to use the electronic seal, and if the two are not matched, the request initiator is not allowed to use the electronic seal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111627736.8A CN114444129B (en) | 2021-12-28 | 2021-12-28 | Method and system for dynamically controlling electronic seal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111627736.8A CN114444129B (en) | 2021-12-28 | 2021-12-28 | Method and system for dynamically controlling electronic seal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114444129A CN114444129A (en) | 2022-05-06 |
CN114444129B true CN114444129B (en) | 2024-04-19 |
Family
ID=81366624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111627736.8A Active CN114444129B (en) | 2021-12-28 | 2021-12-28 | Method and system for dynamically controlling electronic seal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114444129B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003337875A (en) * | 2002-05-20 | 2003-11-28 | Sony Corp | System, method of electronic approval and terminal |
EP1387551A1 (en) * | 2002-07-30 | 2004-02-04 | Security and Standards Limited | Electronic sealing for electronic transactions |
CN1838163A (en) * | 2006-01-17 | 2006-09-27 | 沈前卫 | A General Electronic Seal System Based on PKI |
CN101017544A (en) * | 2007-02-15 | 2007-08-15 | 江苏国盾科技实业有限责任公司 | Conflated seal affix authentication method having electronic seal digital certification |
CN101329750A (en) * | 2008-07-24 | 2008-12-24 | 武汉理工大学 | Anti-counterfeit seal generation and verification method with file content protection function |
WO2010143001A1 (en) * | 2009-06-12 | 2010-12-16 | Provenance Information Assurance Ltd | Electronic document verification system and method |
CN109861823A (en) * | 2018-12-20 | 2019-06-07 | 航天信息股份有限公司 | Application method, device, storage medium and the electronic equipment of E-seal |
CN109903057A (en) * | 2019-02-21 | 2019-06-18 | 清华大学 | Contract making method and device |
CN111143807A (en) * | 2019-12-13 | 2020-05-12 | 航天信息股份有限公司 | Method and system for generating electronic seal |
CN111581653A (en) * | 2020-04-30 | 2020-08-25 | 平安科技(深圳)有限公司 | Contract document signing method, device, equipment and computer readable storage medium |
CN112597455A (en) * | 2020-12-29 | 2021-04-02 | 中国农业银行股份有限公司 | Document anti-counterfeiting method and device |
CN112907225A (en) * | 2021-03-26 | 2021-06-04 | 中国建设银行股份有限公司 | Entity seal management control method, device, equipment and storage medium |
CN113619299A (en) * | 2021-07-06 | 2021-11-09 | 珠海思格特智能系统有限公司 | Seal equipment intelligent control method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106980605B (en) * | 2017-02-17 | 2018-01-19 | 平安科技(深圳)有限公司 | contract generation method and device |
-
2021
- 2021-12-28 CN CN202111627736.8A patent/CN114444129B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003337875A (en) * | 2002-05-20 | 2003-11-28 | Sony Corp | System, method of electronic approval and terminal |
EP1387551A1 (en) * | 2002-07-30 | 2004-02-04 | Security and Standards Limited | Electronic sealing for electronic transactions |
CN1838163A (en) * | 2006-01-17 | 2006-09-27 | 沈前卫 | A General Electronic Seal System Based on PKI |
CN101017544A (en) * | 2007-02-15 | 2007-08-15 | 江苏国盾科技实业有限责任公司 | Conflated seal affix authentication method having electronic seal digital certification |
CN101329750A (en) * | 2008-07-24 | 2008-12-24 | 武汉理工大学 | Anti-counterfeit seal generation and verification method with file content protection function |
WO2010143001A1 (en) * | 2009-06-12 | 2010-12-16 | Provenance Information Assurance Ltd | Electronic document verification system and method |
CN109861823A (en) * | 2018-12-20 | 2019-06-07 | 航天信息股份有限公司 | Application method, device, storage medium and the electronic equipment of E-seal |
CN109903057A (en) * | 2019-02-21 | 2019-06-18 | 清华大学 | Contract making method and device |
CN111143807A (en) * | 2019-12-13 | 2020-05-12 | 航天信息股份有限公司 | Method and system for generating electronic seal |
CN111581653A (en) * | 2020-04-30 | 2020-08-25 | 平安科技(深圳)有限公司 | Contract document signing method, device, equipment and computer readable storage medium |
CN112597455A (en) * | 2020-12-29 | 2021-04-02 | 中国农业银行股份有限公司 | Document anti-counterfeiting method and device |
CN112907225A (en) * | 2021-03-26 | 2021-06-04 | 中国建设银行股份有限公司 | Entity seal management control method, device, equipment and storage medium |
CN113619299A (en) * | 2021-07-06 | 2021-11-09 | 珠海思格特智能系统有限公司 | Seal equipment intelligent control method and system |
Non-Patent Citations (5)
Title |
---|
OFD的安全应用分析;冯辉;陈留勇;樊孝龙;李海波;王寒冰;;信息技术与标准化;20171110(第11期);第51-55页 * |
SEAL: A secure communication library for building dynamic group key agreement applications;Patrick P.C. Lee;The Journal of Systems and Software 80 (2007);20060612;第356-370页 * |
会计档案电子化管理的探索与实践;宋吉丽;;办公室业务;20200725(第14期);第55-56页 * |
信息化办公平台技术架构优化及实现;王旭东;;上海造船;20090930(第03期);第62-66页 * |
基于PKI体系的电子签章系统解析;严凡;;信息与电脑(理论版);20110515(第05期);第68-69页 * |
Also Published As
Publication number | Publication date |
---|---|
CN114444129A (en) | 2022-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7462910B2 (en) | Credential validation and issuance through a Credential Service Provider | |
CN108881290B (en) | Blockchain-based digital certificate usage method, system and storage medium | |
CN110060037B (en) | Distributed digital identity system based on block chain | |
CN100469000C (en) | System and method for creating a secure network using identity credentials of batches of devices | |
CN112257110B (en) | Electronic signature management method, management system and computer readable storage medium | |
CN101022339A (en) | Electronic sign stamp identifying method combined with digital centifi cate and stamp | |
CN111881483B (en) | Resource account binding method, device, equipment and medium based on blockchain | |
CN111292174A (en) | Tax payment information processing method and device and computer readable storage medium | |
EP4092958B1 (en) | Issuing of a digital verifiable credential | |
CN110969531A (en) | Borrowing deposit verification and online checking method and system | |
CN113239335A (en) | Block chain personnel information management system and method based on Baas | |
CN116982332A (en) | Method for authorizing a first participant in a communication network, processor device, motor vehicle and infrastructure device | |
Seifert | Digital identities–self-sovereignty and blockchain are the keys to success | |
EP4254234A1 (en) | Digital credential issuing for an entity | |
US10686777B2 (en) | Method for establishing protected electronic communication, secure transfer and processing of information among three or more subjects | |
CN118333577B (en) | Electronic seal manufacturing method and electronic seal manufacturing system | |
Koulolias et al. | STORK e-privacy and security | |
CN114444129B (en) | Method and system for dynamically controlling electronic seal | |
CN109753824B (en) | Distributed electronic signature method and system | |
CN109600338B (en) | Trusted identity management service method and system | |
CN114444130A (en) | Electronic certificate mutual trust and mutual authentication platform based on block chain | |
KR20200082186A (en) | Method and system for automatic preparation of legal document | |
EP1779635B1 (en) | Method for assigning an authentication certificate and infrastructure for assigning a certificate | |
Jaafar et al. | A proposed Security Model for E-government Based on Primary Key Infrastructure and Fingerprints. | |
CN113778561B (en) | Front-end financial service component calling method and device based on fragmentation service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |