Contract online verification method

A verification method and contract technology, applied in the fields of digital data authentication, commerce, instruments, etc., can solve the problems of difficulty in distinguishing the authenticity of secondary contracts, and no method for re-authentication of contracts is provided, so as to improve security, ensure authenticity and effectiveness sexual effect

Pending Publication Date: 2019-08-06
HANGZHOU BAIHANG INFORMATION TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps verify that two parties are signing agreements correctly by encrypting their voices with specific patterns or characters from these signs without revealing any other details about them. It also checks if they have been marked up properly forged beforehand during negotiations between different countries. Overall this makes it safer than traditional methods like signature-based validation systems where only one party's data can compromise another partner's credit card payment system.

Problems solved by technology

Technics Problem addressed by this patented technical problem are how to ensure that electronically signed agreements can only become valid once they start up on their own system (the client). Current solutions require manual input from users who may accidentally damage them while making changes during transactions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Contract online verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Example 1: Such as figure 1 As shown, the steps of electronic contract generation, verification, and verification report generation: the contract initiator logs in to the third-party client with a dedicated account, and the contract initiator initiates contract writing to the third-party client; after the contract is written, the third-party client uses hash The algorithm extracts and encrypts the digest value of the written electronic contract. The encrypted electronic contract is sent to the contract initiator and the contract signer by email; after the contract signer receives the information, he logs in to the third-party client with his own account and encrypts The document is decrypted, the official electronic contract is checked, and after the contract is confirmed, the electronic signature and seal are called, stamped on the electronic contract, and the official contract is generated; the contract signer dictates a text and voice through the voiceprint collection ...

Embodiment 2

[0045] Embodiment 2: A specific step of the identity verification of the contract initiator is: First, the contract verification initiator initiates online contract verification through a third-party client, and the third-party client verifies the identity information of the contract verification initiator, and the third party The client verifies the identity information of the initiator of contract verification through one or a combination of the following methods;

[0046] A1. The contract verification initiator manually enters the digital password on the third-party client password interface;

[0047] A2. Send online identity verification information via email;

[0048] A3. Verify identity information by sending SMS verification code;

[0049] A4. Compare and verify with the voice information pre-stored in the third-party client by reading a 5-second voice password message;

[0050] A5. Collect and verify the identity image information of the initiator through the image sensor confi...

Embodiment 3

[0054] Embodiment 3: The specific steps of electronic contract comparison verification are as follows;

[0055] After the identity verification is completed, the contract verification initiator imports the pre-verified electronic contract document into the third-party system for electronic contract comparison verification. The electronic contract verification method is divided into manual verification method and system verification method. The manual verification method is Manually check the contents of the original formal electronic contract by the third-party client, and manually check the authenticity of terms and signatures by comparing with the contents of the pre-verified electronic contract documents; system verification methods include pre-verified electronic contract document content verification and pre-verified electronic contract Validity verification, pre-verified electronic contract document content verification is to extract the digest value information of the pre-v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a contract online verification method. The method comprises the following steps of S1, writing an initial contract document; S2, encrypting an electronic contract; S3, generating a formal contract; S4, affixing a watermark to the formal contract; enabling a third-party client to be further provided with a voiceprint acquisition device, enabling a contract signer to explaina section of text voice instruction, and using a third-party client system to generate a voiceprint image to cover the formal electronic contract; S5, enabling the contract verification initiator to initiate the formal contract online authentication through the third party client; S6, generating a contract verification report online. According to the technical scheme, the collected voiceprint information of the contract signer is used as the encryption information to cover the formal contract, and the identity information verification, the formal contract watermark verification and the contract content online comparison verification are carried out by the contract verification initiator, so that the authenticity and the effectiveness of the contract are ensured, and the safety of the financial transactions is improved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HANGZHOU BAIHANG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products