Summary of the invention
The purpose of the present invention, which aims to solve at least one of above-mentioned technological deficiency, especially electronic contract law of contracting online, to be hadEffect property is not high, is easy the problem of being trapped, being tampered.
The present invention provides a kind of electronic contracts to sign method, comprising the following steps:
Electronic contract including signature authentication interface is sent to target user end;
Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;
Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
The signed electronic contract is encrypted by predetermined encryption rule.
Preferably, the predetermined encryption rule is based on CA technology secrecy rule.
It is further, described that the electronic contract including signature authentication interface is sent to target user end, comprising:
It receives target user end and acquires the user images including target signature in real time, and obtain and used in the electronic contractThe associated associated images of family information;
It will be compared from the target signature extracted in the associated images and the target signature in the user images, reallyWhether the user in the fixed associated images and the user images is same user;
When being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
Further, after being carried out by predetermined encryption rule to the signed electronic contract, which comprises
Critical field in the electronic contract is extracted, by the critical field and the user images in a manner of associatedStorage.
Further, by include signature authentication interface electronic contract be sent to target user end before, the methodInclude:
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
Further, after receiving the signing that the first user terminal issues and inviting instruction, the method also includes:
The electronic contract comprising first user information is sent to the first user terminal.
Further, after receiving second user end and receiving the instruction of the invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes instituteState the first user information.
Further, in the pass for receiving the generation electronic contract that second user is filled at the second user endAfter key information, which comprises
Sent to the first user terminal include the key message the electronic contract, in order to which the first user is described theThe modification instruction of the electronic contract is modified in the triggering of one user terminal;
The modification instruction that first user terminal is sent is received, sends repairing for the electronic contract to second user endChange notice, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modificationThe electronic contract afterwards.
The present invention provides a kind of electronic contracts to sign device, comprising:
Signature authentication interface sending module, for will include that the electronic contract at signature authentication interface is sent to target userEnd;
Electronic contract generation module is directed to the signing messages that the signature authentication interface issues for receiving target user endWith signature timestamp;
Relating module, for generating signed electronics according to the signing messages, signature timestamp and the electronic contractContract;
Encrypting module, for being encrypted by predetermined encryption rule to the signed electronic contract.The present invention is implementedA kind of server provided in example, comprising:
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and quiltIt is configured to be executed by one or more of processors, one or more of application programs are configured to carry out according to any skillElectronic contract described in art scheme signs the step of method.
Compared with prior art, embodiment provided by the invention has the advantages that
1, a kind of electronic contract signature method provided in the embodiment of the present invention, comprising the following steps: will include that signature is recognizedThe electronic contract at card interface is sent to target user end;It receives target user end and is directed to the signature that the signature authentication interface issuesInformation and signature timestamp;Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;The signed electronic contract is encrypted by predetermined encryption rule.On electronic signature Contract basis, by timestamp,The method of encryption guarantees the tamper-resistance properties of electronic contract, legal effect of contracting online.
2, a kind of electronic contract signature method provided in the embodiment of the present invention, the predetermined encryption rule is based on CA skillArt encryption rule.By the support at Third Party Authentication center, effective method is provided for the online signing legal effect of electronic contractRestrain effect.
3, a kind of electronic contract signature method provided in the embodiment of the present invention, is applied to house lease field, breaks biographyThe limitation that system is rented a house in contract signing model to lease both sides' time, space, the both sides to sign a contract can also be according to personal reasonDirectly add supplementary provision in terminal so that electronic contract neat and tidy, and electronic contract save with data mode andThe critical field in electronic contract, the phonotape and videotape during signature will be extracted, convenient for carrying out with government department or other authorized organizationsPut on record or other shared docking, while guaranteeing that the people to sign a contract is corresponding with the information of a side on electronic contract, guarantees that contracts hasEffect property, avoids being swindled.The transmission of contract is facilitated by critical field or is put on record, and cost of labor is reduced.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following descriptionObviously, or practice through the invention is recognized.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to endSame or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attachedThe embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " oneIt is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the inventionDiction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or additionOther one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim memberPart is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also beIntermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrangeDiction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology artLanguage and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should alsoUnderstand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior artThe consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as hereTo explain.
A kind of electronic contract signature method provided in the embodiment of the present invention is mainly used in house lease field, will be in roomRoom leases field and introduces electronic contract, simplifies landlord and lessee signs the process of electronic contract, forms house lease on line and closesRing breaks the limitation in traditional contract signing model of renting a house to lease both sides' time, space.Wherein in the embodiment of the present inventionOne user can be landlord/lessor, and second user can be lessee/tenantry, and the first user terminal is what the first user usedTerminal, second user end are the terminal that second user uses, and target user end includes the first user terminal and second user end, and meshMark user terminal includes but is not limited to the application program being installed on the communication equipment that mobile phone, computer, plate etc. can be shot.
A kind of electronic contract signature method provided in the embodiment of the present invention, as shown in Figure 1, a kind of embodiment whereinIn, comprising the following steps:
S100: the electronic contract including signature authentication interface is sent to target user end;
S200: signing messages and signature timestamp that target user end is issued for the signature authentication interface are received;
S300: signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;
S400: the signed electronic contract is encrypted by predetermined encryption rule.
The content in Current electronic contract is determined without mistaking in tenantry and lessor, and sending to both sides includes that signature is recognizedThe electronic contract for demonstrate,proving interface, i.e., send the electronic contract including signature authentication interface to tenantry and lessor,In order to which user signs on the signature authentication interface of electronic contract, while user can also check the item in electronic contractWhether money meets the requirements.It certainly include holding in electronic contract before sending including the electronic contract on signature authentication interfaceRent side and lessor's essential information, houseclearing and lease treaty etc..If essential information includes name, phone, identification card numberCode etc., houseclearing includes house essential information and user's supplemental information, and the basic information in house includes house address, area, courtTo etc., user's supplemental information is the house situation (family property information in such as house) of user's supplement, premises perimeter facility;Lease itemIt about include: that rent, purposes of renting a house, rent pay information, promise breaking relevant information, supplementary provision etc..Aforementioned information by lessor and/Or tenantry fills on terminal interface, in the contract of lease of property for the information addition that terminal will fill in.
For the ease of user's signature and increase signature validity, avoid user signature when triggered activity interface itsHis control instruction, app sends electron underwriting authentication interface to user first, to enable a customer to sign on the surface,After user signs in authentication interface before this, at the corresponding position of signature addition electronic contract, if Party A is lessor,Party B is tenantry, and after lessor signs on electronic contract, which is just added to Party A's signature position of electronic contractThe signature after tenantry signs on electronic contract, is just added at Party B's signature position of electronic contract by place.When user existsAfter completing signature on the signature authentication interface, the backstage app receives the signature of the user, and is generated to electronic contractIn.After guaranteeing that the tamper-resistance properties of electronic contract, user complete signature on digital certificate interface, obtains and closed with the electronicsWith associated timestamp, the timestamp and the electronic contract are associated.Specifically, user will need to cover the timeThe data of stamp are sent to time stamp server after eap-message digest generates timestamp request, when being returned by time stamp serverBetween stamp response message give signing and issuing of stabbing of client deadline.Terminal (app) first uses the electronic contract for needing to add timestampHash coding encrypting forms abstract, and timestamp request is generated on the basis of the abstract, i.e., includes the abstract in the request, thenTime stamp server is sent the request to, is stabbed by time stamp server time of return stamp response message to the terminal deadlineIt signs and issues, due to including that electronic contract is made a summary in request message, when timestamp returns to terminal, i.e., closes the timestamp and electronicsWith being associated, when other users change the electronic contract, timestamp associated there fails, at this point, then explanation shouldElectronic contract is modified, and then guarantees the solidification of electronic contract time of signature, prevents electronic contract to be tampered, while also preventing outA possibility that being cheated in existing user time.It should be noted that time stamp server is mainly authenticated by official and believable thirdSquare tube reason, and believable timestamp is signed and issued based on the time stamp server, timestamp can prove that electronic message (various electronic documentsAnd electronic data) a time point be it is already existing, complete, can verify that have the electronic certificate of legal effect.
On the basis of joined timestamp, closed by predetermined encryption rule to including the signature and with the timestampThe electronic contract of connection encrypts, to ensure that electronic contract is contracted legal effect online.Specifically, due to the shape of electronic contract dataFormula is stored or is transmitted, therefore, in storage transmission process, it usually needs guarantee the confidentiality of electronic contract, integrality,Availability;Confidentiality is that electronic contract is transmitted by data packet ciphertext, and after being intercepted and captured by people, other people can not understand;CompletelyProperty prevent someone's malice from distorting electronic contract data message it is (common in conjunction with both timestamp above-mentioned and predetermined encryption ruleIt realizes);Availability can allow communicating pair (tenantry and lessor) can proper solution by a kind of general cryptographic protocolIt is close.Specifically, there are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.Symmetric cryptography is to addIt is close and decryption using the common algorithm of the same key include 3DES, AES (key length include 128,192,256,384 etc.), the symmetric encipherment algorithms such as blowfish, twofish, IDEA, RC6, CAST5.Key is divided into a pair in public key encryptionPublic key and private key.It can only be unlocked with private key with the data of public key encryption, all inextricable with public key oneself, vice versa.Public key: canIt to be disclosed to owner, extracts from private key, private key: being generated by particular algorithm, user oneself retains, it is necessary to assureIts privacy, public key encryption may be implemented digital signature, three key exchange, data encryption functions, digital signature: essentially consist inAllow the identity of recipient's acknowledged;Key exchange: then sender's one symmetric key of recipient's public key encryption is being sent outGive recipient;Data encryption: public key is directly to the scene of data encryption and few, because of symmetric cryptography faster than public key encryption 3A order of magnitude, so usually using symmetric cryptography.Public key encryption algorithms most in use: RSA, DSA, ELGamal.One-Way Encryption predominantly mentionsTake data fingerprint;One-Way Encryption algorithms most in use: MD5: Message Digest 5,5 version numbers, 128 fixed length output;SHA1:Secure Hash Algorithm, 1 is version number, 160;There are also SHA224, SHA256, SHA384, SHA512.In order to guarantee electronic contractThe integrality and authentication of data aforementioned encryption rule can also be used in combination, detailed process are as follows: 1, use One-Way EncryptionTechnology secrecy data generate a condition code, ensure that the integrality of data.2, with the private key of Party A to the condition code of generation intoRow encryption.Only Party A's private key for having oneself, ensure that authentication.3, data and encrypted condition code symmetrically addIt is close.4, with the public key encryption of Party B symmetric cryptography password obtained in the previous step.For decrypting process are as follows: 1, use the private key of Party BFirst decrypt symmetric cryptography password.2, the data and condition code for going decryption to encrypt with obtained symmetric cryptography password.Using unidirectionalThe data that Encryption Algorithm encryption previous step decrypts.3, decrypting feature code is removed using the public key of Party A, obtains sending in Party AThe condition code of data.4, whether the condition code compared in 3,4 steps is consistent.When consistent, decoding data obtains electronic contract.It is logicalIt crosses encryption rule realization above-mentioned to encrypt to including the signature and with the associated electronic contract of the timestamp, guarantees electronics conjunctionWith online signing legal force.
Preferably, the predetermined encryption rule is based on CA technology secrecy rule.
Specifically, CA technology be an authoritative Third Party Authentication mechanism, be based on openssl be a multi-functional lifeTool is enabled to realize signing and issuing for certificate.Specifically, the algorithm that opensll is provided includes: symmetric encipherment algorithm, rivest, shamir, adelman(DHA, RSA, EIGamal, DSA), message digest algorithm (MD5, SHA1, SHA512, CRC-32), key and certificate management.The CA application program that OpenSSL is provided is exactly a small-sized Certificate Authority (CA), realizes digital signature and signs and issuesWhole flow process and certificate management most of mechanism.Electronic contract digital signature was signed and issued based on the realization of CA platformCheng Zhong further includes one and implements and provide the security infrastructure with universality of security service with public key concept and technologyPKI, a complete pki system should include following sections: visa mechanism (CA), registration body (RA), certificate access library(CB), certificate revocation list (CRL) etc..In application process of the present invention, certificate agency CA is the foundation of trust of PKI, it is managedThe whole life cycle of public key, effect include: to provide certificate, the validity period of regulation certificate and by publication Certificate Revocation Lists(CRL) ensuring when necessary can be with revocation certificate.Registration body RA provides an interface between user and CA, it obtains and authenticatesThe identity of user proposes certificate request to CA.It mainly completes to collect user information and confirms the function of user identity.Certificate is depositedLibrary is taken to be responsible for the access of certificate, can be by user oneself, or pass through directory service.LIST SERVER can be a tissueIn it is existing, be also possible to provide in PKI scheme.Certificate revocation list (Certificate revocation lists, againCertificate blacklist) it is referred to as that application program and other systems provide a kind of mode of inspection certificate validity.Any one certificateAfter abolishment, certificate agency CA can be notified by way of issuing CRL each related side (as associated of the present invention terminal,Lessor, tenantry).
Specifically, registration body is the terminal for carrying out realizing that electronic contract signs process in the present invention in implementation process(house lease app) provides an interface between user and CA, it obtains and authenticate the identity of user, proposes to demonstrate,prove to CABook request.Further, first is filed a request by terminal, and the public key of oneself and some information are submitted to ca authentication, by CAAfter certification passes through, the certificate comprising first essential information and first public key can be issued to first.In order to guarantee the safety of electronic contractProperty, the communication between second and first is secure communication, and therefore, first can issue the certificate of oneself second, and second can first be gone in the same CACheck whether the certificate of first is correct effectively, if inquiry is out of question, second can be securely communicated normally with first.Specifically such as existWhen electronic contract being staggeredly sent to tenantry and lessor, a contract documents are issued other side second by terminal by first,Entire transmission process is as follows for first: 1. creation symmetric keys (corresponding software generates, and is disposable) are encrypted with itContract, and symmetric key is packaged with the public key of second.2. creating digital signature, hashing algorithm (such as MD5 algorithm) is carried out simultaneously to contractGenerate original digest, the first private key encryption of oneself abstract (public/private key pair oneself can both be created or be provided by CA).3. mostAfterwards, first (is signed the digital certificate of key, encrypted abstract and first after encrypted contract, packing by authoritative institution CAHair) second is issued together.And after second receives encryption file, it needs to complete following act: after 1. receive, decrypting to obtain with the private key of secondSymmetric key, and the contract of encryption is unlocked with symmetric key, obtain contract in plain text.2. the digital certificate acquisition by first belongs to firstPublic key, and unlock abstract (referred to as make a summary 1) with it.3. the contract after pair decryption is come using hashing algorithm same with senderCreation abstract (referred to as abstract 2).4. comparing abstract 1 and abstract 2, if they are the same, then it represents that information is not tampered with, and from first.
Further, in a kind of wherein embodiment, as shown in Fig. 2, that will include the electronics conjunction at signature authentication interfaceIt is same to be sent among target user end, which comprises
S110: it receives target user end and acquires the user images including target signature in real time, and obtain and closed with the electronicsWith the associated associated images of middle user information;
S120: it will be carried out pair from the target signature in the target signature extracted in the associated images and the user imagesThan determining whether the user in the associated images and the user images is same user;
S130: when being determined as same user, the electronic contract including signature authentication interface is sent to target user end.
In order to guarantee that the law on-line signing of the electronic contract of signature has message, it is therefore desirable to ensure to sign electronics and closeSame people artificial same people corresponding with user information on electronic contract.Specifically, including the signature being sent to userBefore the electronic contract of authentication interface, receives target user end and acquire the user images including target signature, i.e. face in real timeImage includes the five features (profile and size of eyes, nose, mouth, ear, face etc.) of user in image, obtain withThe associated associated images of user information in the electronic contract, wherein user information is the official's letter that can prove that user identityBreath has electronic data in official such as the facial image on user identity card.Therefore, it extracts in user images and associated imagesTarget signature compare, i.e., the features such as the profile of eyes, nose, mouth, ear, face etc. and size are passed through into recognition of faceAlgorithm compares, and determines the user of signature electronic contract and whether the corresponding user of identity information is same people.Specific mistakeCheng Ru, extracting target signature method can the face identification method by geometrical characteristic, the recognition of face side based on eigenface (PCA)The recognition of face side of method, the face identification method based on eigenface LBP, the face identification method of neural network, elastic graph matchingMethod etc..Such as the face identification method process based on eigenface LBP is as follows, carries out gray processing processing to image, is then mentioned by LBPTake target signature in face, obtain include target signature face figure, avoid in image other as the comparison of two images of interference.The facial image including target signature obtained after LBP is handled is subjected to ULBP dimension-reduction treatment, by the figure after dimension-reduction treatmentEach grid is generated into histogram as being divided into multiple grids, and on this basis, histogram and target signature are linked,So that the feature vector of target signature gathers together, the histogram of same characteristic features in two images is compared,When the histogram height of same target signature is identical with size, then it can determine that as same user, and then ensure that user signs onlineLegal effect about.When being determined as same user, then the institute including the signature authentication interface is sent to the app program of terminalElectronic contract is stated, in order to which user signs on the signature authentication interface, realizes process as previously described.
Further, it is described the signed electronic contract is encrypted by predetermined encryption rule after, it is describedMethod includes:
Critical field in the electronic contract is extracted, by the critical field and the user images in a manner of associatedStorage.
When needing using the electronic contract, is called in order to enable the electronic contract is easy matching, therefore, extract the electricityCritical field in sub- contract stores the critical field and the user images in a manner of associated.It guarantees that electronics closesSame confidentiality, safety and authenticity inquires or calls the electronic contract or relevant with electronic contract convenient for the later periodInformation, while the electronic contract saves in the form of data, is also less prone to the case where leading to damage due to the factor of environment.It closesKey field includes the key message (subscriber identity information) filled in, contract number, abstract (such as Hash volume generated with predetermined mannerOne or more of code) etc., it is government or other authorization machines based on being arranged in terminal when the later period inquires or callsThe mating interface of structure access, so that one or more of government or other authorized organizations input critical field inquiry or tuneWith the electronic contract or with the associated information of electronic contract, convenient for put on record with government department or other authorized organizations or itsIts shared docking.
Further, before the electronic contract including signature authentication interface being sent to target user end, the method packetIt includes:
Instruction is invited in the signing for receiving the sending of the first user terminal, issues signing invitation notification to second user end;
The instruction that the second user end receives the invitation notification is received, electronic contract template is obtained.
Further, after receiving the signing that the first user terminal issues and inviting instruction, the method also includes:
The electronic contract comprising first user information is sent to the first user terminal.
When user is tenantry, when tenantry sees the suitable source of houses at the terminal, tenantry determines current houseWith oneself ideal source of houses it is close or identical when, then issue signing to the lessor for issuing the information of renting a house on app and invite, withDetermine whether the source of houses has a mind to hire out the source of houses to tenantry also in the state of renting a house or lessor.Tenantry is in terminalSigning is triggered on interface and invites control, if user clicks a certain virtual key at the terminal, when user clicks completion, is generated to outRent side, which issues to contract, invites instruction, which invites title, identification card number, telephone number etc. in instruction including tenantry, becauseThis, after user clicks a certain virtual key at the terminal, needs to be generated to electronics to its displaying in the terminal of tenantry first and closesTenantry's information in, it is identical as user information above, in order to receive the signing in lessor it is invited to that electronics is taken to closeWhen with template, tenantry's information can be directly appended in electronic contract, while tenantry also can confirm that whether the information is correct,When incorrect, tenantry modifies its information at the terminal.Specifically, pop-up includes holding when tenantry issues signing and invitesThe interface of rent side's essential information, tenantry check or fill on the surface the essential information of tenantry, and true in tenantryEssential information is determined without mistaking, and tenantry clicks determination on interface, after terminal is determined based on user's click, at this time just to lessorIssue signing invitation notification.Wherein, in inviting instruction, the essential information including contract invitation notification and tenantry.Signing is invitedIt please notify according to preset template generation, if template is " * * * issues signing invitation notification to you ", wherein " * * * " is tenantryTitle, which extracts from the user name of tenantry's register account number.After lessor receives signing invitation notification,The notice interface is popped up at the interface of lessor, after user clicks the determination virtual key for receiving signing invitation on the surface,It generates and receives signing and invite instruction, include obtaining preset electronic contract template from database in the instruction, and in electronic contractHave been added the information of tenantry and lessor.
Further, after receiving the second user end and receiving the instruction of the invitation notification, which comprises
Receive the key message for the generation electronic contract that second user is filled at the second user end;
According to electronic contract described in the key message and the electronic contract template generation, the key message includes instituteState the first user information.
Further, in the pass for receiving the generation electronic contract that second user is filled at the second user endAfter key information, which comprises
Sent to the first user terminal include the key message the electronic contract, in order to which the first user is described theThe modification instruction of the electronic contract is modified in the triggering of one user terminal;
The modification instruction that first user terminal is sent is received, sends repairing for the electronic contract to second user endChange notice, so that second user is based on the amendment advice and modifies the electronic contract;
The key message for receiving the electronic contract modification that second user is filled at the second user end, generates modificationThe electronic contract afterwards.
After getting electronic contract template, show to include needing to fill in electronic contract key message to lessor one by oneUser Interface, i.e., the same User Interface can only be filled in category information, and such as moving in time surface can only fill in or select to move inThe range of lease time can only be filled in or be selected to time, lease time range, other supplementary provisions, rent pay the behaviour such as informationIt is identical to make method.It wherein needs at the reserved location of fill message to be interrelated in key message interface and electronic contract templateAnd it is one-to-one.After filling the key message for generating electronic contract in lessor, terminal receives lessor and selects the generation filled outThe key message of electronic contract generates electronic contract mould to bring key message at the corresponding position of electronic contract template intoPlate, wherein key message includes user information, i.e. tenantry's information and lessor's information.Not bad key message is filled out in lessor's choosingAfterwards, in conjunction with aforementioned tenantry's information, corresponding electronic contract is generated, which is saved and sends the electronics to tenantryContract, in order to tenantry browse check the electronic contract, determine whether do not met in the electronic contract legal provisions and/orTo oneself lossy clause project.If tenantry, which determines to exist in the electronic contract, does not meet legal provisions and/or to oneselfWhen lossy clause project, tenantry clicks modification on the interface of terminal, and tenantry fills in unsatisfied in terminal interfaceClause and/or project generate the modification instruction for being sent to lessor, wherein include in the instruction after tenantry clicks modificationThe unsatisfied clause of tenantry and/or project and the amendment advice for sending it to lessor.Receive what lessor filled inThe key message of electronic contract modification, generates modified electronic contract.After lessor receives the amendment advice, at the terminalThe key message of relevant provision and/or project is modified, modification process is identical with the operation for filling in key message, and modification is completedAfterwards, the determining virtual key of point solution on lessor's terminal interface, to enable the terminals to obtain and receive the modified key message,Modified electronic contract is equally generated based on the identical process of aforementioned generation electronic contract.To guarantee the clause in electronic contractIt is fair, between reduction lease later period tenantry and lessor contradiction to lessor and tenantry with project.It needsIllustrate, aforementioned tenantry and lessor can exchange, and when lessor confirms that tenantry is suitble to the source of houses of oneself, hire out directionTenantry issue signing invitation notification, subsequent process with charter direction rent a house sending contract invitation notification it is identical, being only that will be formerTenantry is converted into lessor, and former lessor is converted to tenantry, in order to which lessor selects suitable tenantry.
Furthermore it is also possible to establish the option of the corresponding modification key message of credit grade of tenantry, lessor.Citing:The low tenantry of credit grade, it is desirable that pre-pay 4 months cash pledges, the high tenantry of credit grade can pre-pay 1 month cash pledge.IntoOne step, credit grade, evaluation or the similar information of other side can be shown to tenantry, lessor, repaired for tenantry, lessorIt is referred to when changing.But these information are simultaneously not written into contract.For example, showing the nearest evaluation in 3 years of tenantry to lessor, makeTenantry voluntarily assesses modification content.
A kind of electronic contract signature device provided in the embodiment of the present invention, in a kind of wherein embodiment, such as Fig. 3 instituteShow, comprising:
Signature authentication interface sending module 100, for by include signature authentication interface electronic contract be sent to target useFamily end;
Electronic contract generation module 200 is directed to the signature that the signature authentication interface issues for receiving target user endInformation and signature timestamp;
Relating module 300, for generating signed electricity according to the signing messages, signature timestamp and the electronic contractSub- contract;
Encrypting module 400, for being encrypted by predetermined encryption rule to the signed electronic contract.
Further, it is also wrapped continuing with a kind of device of electronic contract signature referring to Fig. 3, provided in the embodiment of the present inventionIt includes:
Acquisition unit 110 acquires the user images including target signature for receiving target user end in real time, and obtain withThe associated associated images of user information in the electronic contract;Target's feature-extraction unit 120, being used for will be from the associated diagramThe target signature extracted as in is compared with the target signature in the user images, determines the associated images and the useWhether the user in the image of family is same user;Signature authentication interface transmission unit 130, for when being determined as same user,Electronic contract including signature authentication interface is sent to target user end.Critical field extraction module 420, it is described for extractingCritical field in electronic contract stores the critical field and the user images in a manner of associated.Signing is invited logicalKnow sending module 101, instruction is invited in the signing for receiving the sending of the first user terminal, is invited to the sending signing of second user end logicalKnow;Contract template obtains module 102, and the instruction of the invitation notification is received for receiving the second user end, obtains electronicsContract template.Display module 103 sends the electronic contract comprising first user information for the first user terminal.Key letterReceiving module 104 is ceased, for receiving the crucial letter for the generation electronic contract that second user is filled at the second user endBreath;First electronic contract generation module 105, for according to electronics described in the key message and the electronic contract template generationContract, the key message include first user information.Electronic contract display module 106 is sent for the first user terminalThe electronic contract comprising the key message, in order to which the first user modifies the electronics in first user terminal triggeringThe modification of contract instructs;Amendment advice sending module 107, the modification instruction sent for receiving first user terminal,The amendment advice of the electronic contract is sent to second user end, so that second user is based on the amendment advice and modifies the electricitySub- contract;Second electronic contract generation module 108, the electronics filled in for receiving second user at the second user endThe key message of change to the contract generates the modified electronic contract.
The side of above-mentioned electronic contract signature may be implemented in a kind of device of electronic contract signature provided in an embodiment of the present inventionThe embodiment of method, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.
A kind of computer readable storage medium provided in an embodiment of the present invention stores on the computer readable storage mediumThere is computer program, the method for electronic contract signature described in any one technical solution is realized when which is executed by processor.Wherein, the computer readable storage medium includes but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, read-only memory), RAM (Random AcceSS Memory, immediatelyMemory), EPROM (EraSable Programmable Read-Only Memory, Erarable Programmable Read only Memory),(Electrically EraSable Programmable Read-Only Memory, electric erazable programmable is read-only to be deposited EEPROMReservoir), flash memory, magnetic card or light card.It is, storage equipment includes by equipment (for example, computer, mobile phone) with energyAny medium for the form storage or transmission information enough read can be read-only memory, disk or CD etc..
A kind of computer readable storage medium provided in an embodiment of the present invention, in the base for guaranteeing online signing legal forceOn plinth, the embodiment of above-mentioned electronic contract signature is realized, house lease field is introduced into, formed house lease on line and closeRing breaks the limitation in traditional contract signing model of renting a house to lease both sides' time, space;By the electricity including signature authentication interfaceSub- contract is sent to target user end;It receives target user end and is directed to signing messages and signature that the signature authentication interface issuesTimestamp;Signed electronic contract is generated according to the signing messages, signature timestamp and the electronic contract;Added by defaultClose rule encrypts the signed electronic contract.In the embodiment of offer of the invention, in tenantry and lessorDetermine that the content in Current electronic contract without mistaking, sends the electronic contract including signature authentication interface to both sides, i.e.,The electronic contract including signature authentication interface is sent, to tenantry and lessor in order to which user is in the label of electronic contractIt signs in name authentication interface, while user can also check whether the clause in electronic contract meets the requirements.Certainly it is sending outIt send including including tenantry and lessor's essential information, room before the electronic contract on signature authentication interface, in electronic contractRoom information and lease treaty etc..The information is filled on terminal interface by lessor and/or tenantry, and terminal will fill outIn the contract of lease of property for the information addition write.For the ease of user's signature and increase the validity signed, user is avoided to signWhen triggered activity interface other control instructions, terminal first to user send electron underwriting authentication interface, to enable a customer toIt signs on the surface, after user signs in authentication interface before this, by the corresponding position of signature addition electronic contractSet place.After guaranteeing that the tamper-resistance properties of electronic contract, user complete signature on digital certificate interface, obtain and the electronicsThe associated timestamp of contract, the timestamp and the electronic contract are associated.On the basis of joined timestamp,It is encrypted by predetermined encryption rule to including the signature and with the associated electronic contract of the timestamp, to ensure electronic contractOnline signing legal effect.There are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.By precedingThe encryption rule stated is realized to be encrypted to including the signature and with the associated electronic contract of the timestamp, guarantees that electronic contract existsLine signing legal force.
The method of above-mentioned electronic contract signature may be implemented in computer readable storage medium provided in an embodiment of the present inventionEmbodiment, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.
In addition, the present invention also provides a kind of servers, as shown in figure 4, the server process in another embodimentThe devices such as device 503, memory 505, input unit 507 and display unit 509.It will be understood by those skilled in the art that Fig. 4 showsStructure devices out do not constitute the restriction to Servers-all, may include than illustrating more or fewer components or groupClose certain components.Memory 505 can be used for storing application program 501 and each functional module, and the operation of processor 503 is stored inThe application program 501 of reservoir 505, thereby executing the various function application and data processing of equipment.Memory 505 can be interiorMemory or external memory, or including both built-in storage and external memory.Built-in storage may include read-only memory(ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flashDevice or random access memory.External memory may include hard disk, floppy disk, ZIP disk, USB flash disk, tape etc..It is disclosed in this invention to depositReservoir includes but is not limited to the memory of these types.Memory 505 disclosed in this invention is only used as example rather than as limitIt is fixed.
Input unit 507 is used to receive the input of signal, and receives the key message of user's input with the signature of, userAnd the operational order of user's input.Input unit 507 may include touch panel and other input equipments.Touch panel can be receivedCollecting the touch operation of client on it or nearby, (for example client is being touched using any suitable object or attachment such as finger, stylusControl on panel or the operation near touch panel), and drive corresponding attachment device according to a pre-set procedure;It is other defeatedEntering equipment can include but is not limited to physical keyboard, function key (such as broadcasting control button, switch key etc.), trace ball, mouseOne of mark, operating stick etc. are a variety of.Display unit 509 can be used for showing the information of client's input or be supplied to the letter of clientThe various menus of breath and computer equipment.The forms such as liquid crystal display, Organic Light Emitting Diode can be used in display unit 509.Processor 503 is the control centre of computer equipment, using the various pieces of various interfaces and the entire computer of connection, is passed throughOperation executes the software program and/or module being stored in memory 503, and calls the data being stored in memory,Perform various functions and handle data.One or more processors 503 shown in Fig. 4 are able to carry out, realize shown in Fig. 3The function of signature authentication interface sending module 100, the function of relating module 300, adds the function of electronic contract generation module 200The function of close module 400, the function of acquisition unit 110, the function of target's feature-extraction unit 120, signature authentication interface are sentFunction, the function of critical field extraction module 420, the function for invitation notification sending module 101 of contracting, contract mould of unit 130Plate obtains the function of module 102, the function of display module 103, the function of key message receiving module 104, the first electronic contractThe function of generation module 105, the function of electronic contract display module 106, the function of amendment advice sending module 107, the second electricityThe function of sub- contract generation module 108.
In one embodiment, the server includes one or more processors 503, and one or more storagesDevice 505, one or more application program 501, wherein one or more of application programs 501 are stored in memory 505And be configured as being executed by one or more of processors 503, one or more of application programs 301 are configured to carry outElectronic contract described in above embodiments signs method.
A kind of server provided in an embodiment of the present invention realizes on the basis of guaranteeing online signing legal forceThe embodiment of above-mentioned electronic contract signature, is introduced into house lease field, forms house lease closed loop on line, break traditional rentTo the limitation of lease both sides' time, space in room contract signing model;Electronic contract including signature authentication interface is sent toTarget user end;Receive signing messages and signature timestamp that target user end is issued for the signature authentication interface;According toThe signing messages, signature timestamp and the electronic contract generate signed electronic contract;By predetermined encryption rule to instituteSigned electronic contract is stated to be encrypted.In the embodiment of offer of the invention, determined in tenantry and lessor currentContent in electronic contract without mistaking, sent to both sides include signature authentication interface the electronic contract, i.e., to tenantry andLessor sends the electronic contract including signature authentication interface, in order to which user is at the signature authentication interface of electronic contractOn sign, while user can also check whether the clause in electronic contract meets the requirements.It certainly include signature sendingInclude before electronic contract in authentication interface, in electronic contract tenantry and lessor's essential information, houseclearing andLease treaty etc..The information is filled on terminal interface by lessor and/or tenantry, and the information that terminal will fill in addsIn the contract of lease of property added.For the ease of user's signature and increase the validity signed, avoids user's triggered activity in signatureOther control instructions at interface, terminal sends electron underwriting authentication interface to user first, to enable a customer on the surfaceIt signs, after user signs in authentication interface before this, at the corresponding position of signature addition electronic contract.In order to protectThe tamper-resistance properties of electronic contract are demonstrate,proved, after user completes signature on digital certificate interface, are obtained associated with the electronic contractTimestamp, the timestamp and the electronic contract are associated.On the basis of joined timestamp, added by defaultClose rule is to including the signature and encrypt with the associated electronic contract of the timestamp, to ensure that electronic contract is contracted method onlineRestrain effect.There are many forms, such as symmetric cryptography, public key encryption, One-Way Encryption for predetermined encryption rule.It is advised by encryption above-mentionedIt then realizes to including the signature and encrypted with the associated electronic contract of the timestamp, guarantees that electronic contract is contracted law onlineValidity.
The embodiment of the method for the electronic contract signature of above-mentioned offer may be implemented in server provided in an embodiment of the present invention,Concrete function realizes the explanation referred in embodiment of the method, and details are not described herein.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the artFor member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answeredIt is considered as protection scope of the present invention.