Electronic contract security system and method based on biological information identification

An electronic contract and electronic security technology, which is applied in the field of electronic information authentication and security, can solve the problems of waste of resources, contract tampering, and impossibility of completely consistent keys, etc., and achieve the effect of high security and convenient authentication

Active Publication Date: 2014-03-26
重庆信科通信建设监理咨询有限公司
View PDF5 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The present invention aims at the problem that the electronic contract existing in the prior art may be tampered with when the electronic contract is authenticated and stored by a third party. Waste of resources and insecure storage of user information, information matching and information extraction in different ways and methods, easily lead to leakage of characteristic information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic contract security system and method based on biological information identification
  • Electronic contract security system and method based on biological information identification
  • Electronic contract security system and method based on biological information identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] like figure 1 Shown is the functional block diagram of the electronic contract security system of the present invention, including: client U, server S, electronic security center T, the client includes: biological feature collection module, electronic contract encryption generation module, client identity authentication module; Including: server-side identity authentication module; electronic security center includes: safety database, biometric information verification module.

[0027] Biometric feature collection module: used to collect the user’s biometric features and extract biometric feature information, collect customer ID card scanning information, and obtain the ID card number as a digital signature. The biometric feature collection module converts the collected biometric feature images into biometric data , use the fuzzy extractor to fuzzy extract the biometric feature to obtain the user biometric key R. The biometric feature collection module can collect biom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic contract security system and method based on biological information identification, and relates to the technical field of computer information processing. In the prior art, electronic contracts can be tampered when the electronic contracts are handed to a third party to be saved, secrete keys generated by individual biological characteristics cannot be exactly the same, and exposure of characteristic information can be caused easily due to information matching and information extraction of different ways and methods. According to the electronic contract security system based on the biological information identification, encryption is carried out in the generated electronic contracts by using the biological information of applicants, identification card information of users are further overlaid to serve as the only authentication marks of the electronic contracts, time stamps are added to the electronic contracts, the electronic contracts are sent to a third party electronic security center for being saved and when clients need to have related services again or contract disputes appear, the secured electronic contracts are extracted from the electronic security center only by checking the biological characteristic information of the users and logging in an identification authentication server.

Description

technical field [0001] The invention relates to the technical field of computer information processing, in particular to an authentication and preservation technology of electronic information. Background technique [0002] In banking, telecommunications, insurance and other service industries, customers need to sign and confirm a large number of documents and contracts when handling business at the counter, and need to provide passwords when logging in. Such cumbersome procedures need to be repeated every time, and passwords are easily stolen. Stealing, it is impossible for business personnel to be familiar with the customer's signature, and the imitated signature is not easy to be identified, and there are many factors of account insecurity. In the information age, there are many places and scenarios where customers need to use passwords and passwords. Too many passwords are easy to confuse and forget, and passwords are also very easy to be stolen. Many users use the same ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q20/38G06F21/32H04L9/32
Inventor 高敏熊志海
Owner 重庆信科通信建设监理咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products