Background
Delegation, as the name implies, is to delegate things to others or to other organizations. After the trusted identity authentication of 'real name + real person', the card holding body can authorize or delegate others to use the held electronic certificate. And the entrusting certificate is that the licensee entrusts others to use the entrusting certificate in a specific event and a specific time period. At present, entrusted action mainly occurs in various service halls on line, if A entrusts B to handle a certain thing, A needs to give the B a paper certificate and an authorization book through offline or mailing, and then the B all right replaces A to complete the transaction of the thing. When the principal of the authorized party replaces the principal of the authorized party to hold the paper certificate and the authorization book and go to the window for transaction, the paper certificate is easily lost, and the credibility of the handwritten signature cannot be guaranteed.
Due to these difficulties, the offline work materials are extremely numerous and complicated, and if the offline work materials are lost carelessly or the materials are incomplete, the people frequently run legs to work, so that the work efficiency is low.
With the rapid development of society, the demands of the masses and enterprises are increasing, and the number of offline affair handling scenes is gradually increased, and the following three affair handling scenes are generally available: individuals are entrusted to individuals, individuals are entrusted to businesses, and businesses are entrusted to individuals. And the scenario in which a business entrusts individuals is the most complex. First, a small-scale enterprise may have a small number of persons, and usually a legal representative goes to a window to handle the matters, but if the large-scale enterprise is in a large-scale enterprise, the person management is strict, for example, when the company handles the matters, the legal representative first gives the relevant data such as the reason of handling the matters and the certificate to the manager of the enterprise, and after the manager finalizes the personnel handling, the legal representative needs to write a signature on the authorization book which defines the personnel handling the matters, and then the manager gives the personnel handling the matters.
With the popularization of electronic certificates, the working habits of the masses and enterprises are greatly changed by the 'Internet + government affairs', and the existing scene is not suitable any more. On one hand, the mode of paper license and hand-written authorization book cannot ensure the security of the license, the authenticity of the signature is questioned, the manually signed document has no confidentiality, and once the document is lost, the information in the document is possibly leaked. For example, how to check the signature handwriting when a window worker takes the handwritten authorization book. How the trusting party can be sure that the certificate of the trusting party is used by the real and correct authorization. On the other hand, the link for handling the process becomes cumbersome and tedious due to layer-by-layer transmission.
Disclosure of Invention
The invention aims to provide an application method of electronic certificates entrusted among multiple roles, which can improve the working efficiency of the public and the reliability.
In order to achieve the purpose, the technical scheme of the invention is as follows: an application method of electronic certificate entrusted between multiple roles includes the following steps:
step S1, the person/enterprise adopts face-to-face code scanning entrusting or remote entrusting mode when entrusting is initiated;
step S2, if the code is face-to-face code scanning entrustment, the entrusting party selects the electronic certificate needed to be used when transacting the matters, fills in the entrusting reason, and selects the entrusting start date and end date; if the remote entrusting is carried out, the entrusting party needs to select the entrusted party firstly, fill in the information of the corresponding entrusted party, select the electronic certificate needed to be used when handling the matters, fill in the entrusting course and select the starting date and the ending date of the entrusting;
step S3, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and shown on an entrusting detail page;
step S4, if the face-to-face code scanning request is made, the requesting party generates and presents the requesting code, and the requested party scans the requesting code; if the request is a remote request, the requested party acquires the requested notification, and can choose to receive or reject the request in the request list, and then feeds back the notification of the result of the requesting party;
step S5, after successful entrusting, both entrusting parties can check the entrusted electronic certificate in an entrusting list; the consignor can actively cancel the consigned electronic certificate;
step S6, when the consignor goes to the off-line window for transaction, the consignor can scan the window staff to acquire the code through the presentation consignment code or actively scan the window presentation authorization code to associate the consignment electronic certificate in the certificate package, and complete the transaction of the items;
in step S7, the creation of the delegation book and the delegation and authorization of the electronic certificate are recorded in the blockchain chain, and the trace is able to be traced.
In an embodiment of the invention, the fields of the power of attorney can be dynamically configured according to different service scenes, and further different templates are provided for providing services for different services in different regions.
In an embodiment of the present invention, in step S7, the creating of the delegation book and the delegation and authorization of the electronic certificate are recorded as the uplink specific reference:
the consignor: the method comprises the steps that real-name authentication is required before a certificate package is used, block chain chaining and certificate storing are carried out on the result of the real-name authentication, when a consignor initiates consignment, consignment behaviors can not be repudiated, other application parties can check the consignment behaviors of the consignor through the result of the block chain chaining and confirm that the consignment behaviors exist really;
the trusted party: before using the entrusting function, the entrusted party also needs to carry out real-name authentication, the result of the real-name authentication is stored in the block chain to be used for other application parties to verify the result of the certificate storage, the behavior received/rejected by the entrusted party also stores the certificate chain, both parties generated by the entrusting behavior can confirm the entrusting behavior through the certificate storage result of the block chain, whether the entrusting party successfully entrusts the certificate or not, whether the entrusted party successfully receives the certificate or not, and can verify through the certificate storage information of the block chain, meanwhile, when the entrusted party authorizes the electronic certificate to be authorized to other people for use, the authorization behavior of the entrusted electronic certificate is chain in real time, the authorization behavior is also synchronized to the entrusting party, the entrusting party can know whether the entrusted party correctly uses the electronic certificate to transact the affairs according to the entrusting requirement or not through the certificate storage result of the block chain if the entrusted action is inconsistent with the entrusted affairs, the entrusting party can revoke the entrusting of the electronic certificate in real time;
receiving the party: when the consignee goes offline and transacts items through a window, the consignee verifies the consignee through real-name authentication information on the block chain, after the verification is passed, the consignee scans an authorization code shown by the consignee to receive an authorization electronic certificate authorized in the item transaction process, the certificate is downloaded and checked according to requirements, meanwhile, the authorization and use behaviors are stored on the block chain, and the consignee can confirm the authenticity of the authorization behaviors through reading the certificate storage result of the block chain.
Compared with the prior art, the invention has the following beneficial effects:
1. the method has the advantages that a entrusted mode and mechanism are established, offline affair handling and management requirements are met, affair handling efficiency is improved, license use safety is improved, and the difficulty of offline entrustment affair handling between the masses and the enterprise in multiple roles is solved;
2. and establishing a delegation source tracing, and promoting the generation of online delegation business based on a block chain authentication mechanism. The public entrustment and authorization actions are recorded in the uplink for the public to use.
Detailed Description
The technical scheme of the invention is specifically explained below with reference to the accompanying drawings.
The invention provides an application method of electronic license entrusted among multiple roles, which is concretely realized as follows:
firstly, making a consignment book as shown in figure 1;
second, entrusting management among multiple roles of the electronic certificate, as shown in fig. 2, is specifically as follows:
1. management of electronic certificates between multiple roles
(1) Personal
Firstly, an independent certificate packet is arranged for management before entrusting of an electronic certificate of an individual, so that the independence and the safety of the certificate are guaranteed, and secondly, when entrusting behaviors occur among individuals, the certificate entrusted to the individual by others and the certificate entrusted to the individual by the individual can be separately managed.
(2) Enterprise
Firstly, the electronic certificate of an enterprise is managed independently by an enterprise certificate package as a person, and the electronic certificate of the enterprise is different from the person in that the enterprise certificate package can be managed and used by a legal representative, the legal representative can also establish a manager, the manager is endowed with the authority to act instead, and the manager can not appoint the manager any more, and the other authorities are equal to the legal representative. If the administrator with the authority can directly entrust the certificate of the enterprise to the clerk to transact the business. Such a setting both fits the management model of the offline enterprise and greatly reduces the workload at the level of the legal representatives.
2. Delegation of electronic certificates between multiple roles
(1) And code scanning entrusts, namely entrusts the use of the certificate in a code outputting and code scanning mode when entrusting the double-aspect face-to-face transaction affairs.
Code scanning entrusting process:
step 1, the person/enterprise selects the face-to-face entrusting mode when entrusting.
And 2, selecting the certificate needed to be used when transacting the matters, filling the entrusting course, and selecting the starting date and the ending date of the entrusting.
And 3, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and presented on an entrusting detail page.
And 4, the client generates and presents the client code, and the client scans the client code by using a 'scanning' function of the mobile application terminal.
And 5, after success, both the entrusting parties can check the entrusted electronic certificate in the entrusting list. The consignor can actively withdraw the consigned electronic certificate.
And 6, when the consignee goes to an offline window for transaction, the consignee can scan the code through the presentation consignment code by window staff or actively scan the authorization code presented by the window to associate the consignment certificate in the certificate package, and complete the transaction of the items.
And 7, recording the consignation behavior and the authorization behavior of the manufacture of the consignment book and the certificate and recording the chain and tracing the chain.
(2) And remote delegation, namely when the user does not see the face, delegating the license for use in a remote delegation mode.
Remote delegation process:
step 1, the individual/enterprise selects a remote entrusting mode when entrusting is initiated.
And 2, selecting a certificate to be used when transacting the matters, selecting the consignor, inputting the identity information of the consignor in a manual adding mode, inputting a name, an identity card number and a mobile phone number if the consignment object is an individual, and inputting a unified social credit code and a legal representative/administrator mobile phone number if the consignment object is an enterprise.
And 3, after the consignor is selected, continuing to fill in the consignment affair, and selecting the starting date and the ending date of the consignment.
And 4, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and presented on an entrusting detail page.
And 5, after the remote entrusting is initiated, the entrusted party receives the message in a short message mode, and the user of the same mobile terminal application can acquire the entrusted notification in the message pushing of the application terminal.
Step 6, the authorized party can choose to receive or reject the authorization in the authorization list, and the authorization party receives the notification of the result no matter what result is.
And 7, after the entrusted party accepts the entrustment, the two parties can check the electronic certificate of the entrustment in an entrustment list, and if the entrustment is selected to be refused, the entrustment is not established. The consignor can also actively withdraw the consigned electronic certificate.
And 8, when the consignee goes to an offline window for transaction, the consignee can scan the code through the presentation consignment code by window staff or actively scan the authorization code presented by the window to associate the consignment certificate in the certificate package, and complete the transaction of the items.
And 9, recording the consignation behavior and the authorization behavior of the manufacture of the consignment book and the certificate and recording the chain and tracing the chain.
3. Dynamic configuration of Power of attorney
The fields of the entrustment can be dynamically configured according to different service scenes, and different templates are provided for providing services for different services in different regions. For example, if the consignment book sample in the area A needs to show the identification numbers of both consignors, the showing of the identification number fields of both consignors is dynamically configured according to the requirement, and if a certain personal item in the area A does not need to show the identification number, the independent configuration can be carried out according to the item.
4. Block chaining applications in delegated traffic
And facilitating the online entrusting business to occur based on a mechanism of block chain authentication.
The consignor: whether it is a personal user or a legal user, real-name authentication is required before using the certificate package, and the result of real-name authentication is to perform block chain storage. When the consignor initiates the consignment, the consignment action carries out evidence storing uplink, and the consignment action cannot be repudiated. And other application parties can check the entrusting behavior of the entrusting party through the verification result of the block chain to confirm that the entrusting behavior really exists.
The trusted party: before using the entrusting function, the entrusted party also needs to perform real-name authentication, and the result of the real-name authentication is stored in the block chain so as to be verified by other application parties. The behavior received/rejected by the consignor can also store the verification chain, and both parties generated by the delegation behavior can confirm the delegation behavior through the verification storage result of the block chain, and can check through the verification storage information of the block chain whether the consignor successfully delegates the verification and whether the consignor successfully receives the delegation verification. Meanwhile, when the consignor authorizes the consignment certificate to other people, the authorization behavior of the consignment certificate is linked up in real time, and the authorization behavior can also be synchronously transmitted to the consignor. The trusting party can know whether the trustee uses the certificate to transact the affair correctly according to the trusting requirement or not in real time through the certificate storing result of the block chain, and if the trustee is inconsistent with the trusting affair, the trustee can revoke the trusting of the certificate in real time.
Receiving the party: when the consignee goes offline and transacts the items through the window, the receiver verifies the consignee through the real-name authentication information on the block chain. After the verification, the receiver scans the authorization code presented by the authorized party to receive the authorized authorization certificate in the transaction process, the certificate is downloaded and checked according to the requirement, meanwhile, the authorization and use behaviors are stored on the block chain, and the authorized party can confirm the authenticity of the authorization behaviors by reading the block chain certificate storage result.
The above are preferred embodiments of the present invention, and all changes made according to the technical scheme of the present invention that produce functional effects do not exceed the scope of the technical scheme of the present invention belong to the protection scope of the present invention.