1. The legal security of electronic contracts
At the legal level, the legal validity of electronic contracts has long been confirmed by relevant legislation around the world. my country's "Electronic Signature Law" and "Contract Law" Relevant legislation such as the Civil Procedure Law has also widely confirmed the legal validity of electronic contracts in various fields.
And with the emergence of Internet courts in many cities across the country, electronic contracts, as electronic evidence clearly stipulated in national laws and regulations, will become increasingly convenient and effective in protecting users' legal rights and interests.
2. Technical security of electronic contracts
In the final analysis, the security of electronic contracts is to ensure the true identity of each electronic contract (the identity of both parties signing the contract is true and valid) and the true will (The signed contract is the true expression of the will of both parties), and the entire process is kept confidential (all signed information is encrypted and transmitted), and the original text remains unchanged (the contract content and signing events are tamper-proof).
These four levels cover the entire process of electronic contract signing.
Many core technologies for signing electronic contracts with confidence are precisely to ensure the safety and effectiveness of these four aspects. Let me explain it to you one by one.
①Real-name verification
Identity real-name verification includes two elements of the Ministry of Public Security, three elements of mobile phone number, three or four elements of bank card, face recognition and two elements of enterprise, legal person/agent The three human factors and other factors cover the multi-faceted verification of effective identity information of units and individuals.
And combined with mobile phone text messages, email and other methods to comprehensively guarantee the true identity and true wishes of both parties signing the contract.
②Encrypted transmission
RSA encryption algorithm performs asymmetric encrypted transmission of electronic contract data (identity information, electronic signature/chapter information, contract content), and verifies the data through hash algorithm Whether there is a match before and after transmission.
In this process, the authoritative CA organization issues a CA certificate to ensure that the transmitted data (identity information, electronic signature/stamp information, public key information, etc.) is safe and trustworthy. The private key is randomly generated from a 1024-bit garbled code, and the probability of deciphering it is zero.
Time stamp solidification technology is used by the National Timing Center of the Chinese Academy of Sciences to perform timing and punctuality testing on the creation process of each electronic contract. Once traces of modification are detected, the contract signature is deemed invalid, thereby ensuring the time accuracy and uniqueness in the timestamp certificate.
During the entire transmission process, attacks and tampering instructions at any stage will cause the hash value to change. If the timestamp certificate detects traces of the change, the contract will be deemed invalid and an error will be reported when opening the contract. . This ensures that the electronic contract is secure and confidential throughout the process of identity verification - contract initiation - transmission - signing and cannot be tampered with.
③Blockchain encryption certificate storage
Blockchain certificate storage is a distributed multi-point certificate storage for the data information of each electronic contract signed with confidence.
And the entire backup storage process uses AES256 encryption (currently using National Secret SM2) technology, and the original key is expanded through byte substitution, row displacement, column obfuscation, and round key addition when necessary. Wait for 14 rounds of encryption operations to complete the information encryption and storage. And combined with the digital fingerprint information in the Ministry of Public Security system, a credible electronic contract signing evidence chain is generated in one second. When the user needs it, a contract notarization certificate will be issued after being reviewed by the notary office.
Ensure that the electronic contract, as electronic evidence, is not only safe and confidential, but also can protect the legitimate rights and interests of both parties in a timely and effective manner.
3. Security standards for signing with confidence
Signing electronic contracts with confidence strictly follows the latest national Internet security standards and protects every electronic contract: the official website system platform deploys SSL digital certificates , and completed the national network security level protection evaluation and reached the national level three protection standard.
In addition, Zhejiang Huluwa Network Group Co., Ltd. has officially passed the international information security management system ISO27001 standard certification. The entire business ecosystem, including the safe signing of electronic contracts, has achieved the ISO27001 international certification standard.
In short, as an emerging product of the development of the Internet era, with the development of innovative technology, people's awareness of electronic contract signing methods has gradually increased, and their acceptance of electronic contracts has increased significantly. The security of electronic contracts has It will also become more and more sophisticated as services become more and more sophisticated. It is a general trend for electronic contracts to replace traditional paper contracts!