CN118797722A - Online course contract signing method and device - Google Patents
Online course contract signing method and device Download PDFInfo
- Publication number
- CN118797722A CN118797722A CN202410834201.5A CN202410834201A CN118797722A CN 118797722 A CN118797722 A CN 118797722A CN 202410834201 A CN202410834201 A CN 202410834201A CN 118797722 A CN118797722 A CN 118797722A
- Authority
- CN
- China
- Prior art keywords
- user
- course
- contract
- access
- version
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 73
- 238000012545 processing Methods 0.000 claims description 22
- 230000002159 abnormal effect Effects 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 4
- 238000007726 management method Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000005856 abnormality Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 230000003068 static effect Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000002716 delivery method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000012512 characterization method Methods 0.000 description 2
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a method and a device for signing an online course contract, wherein the method comprises the following steps: determining a contract template, user information and user requirements, wherein the user requirements comprise a first version of a purchased first course and whether specific services are allowed or not, determining contents corresponding to each custom field in the contract template based on the user information and the user requirements, correspondingly filling the contents corresponding to each custom field into the respective definition field, generating a contract corresponding to the user and a digital signature, and the digital signature characterizes the access authority of the user to each version of the first course. Based on the method provided by the application, the management flexibility of the access authority of the user can be improved, and the economic loss is reduced.
Description
Technical Field
The application relates to the technical field of education, in particular to an online course contract signing method and device.
Background
In the online education industry in the technical field of education, a large number of courses exist in a course library, sellers sell access rights of the courses to users in a contract signing mode, and the users acquire the access rights of the purchased courses through the contract signing and view the corresponding courses on line through the access rights.
At present, after signing a contract about a certain course with a user, the user can obtain access rights about all historical versions of the course and all versions updated subsequently, so that the management of the access rights of the user is inflexible and economic losses are easily caused.
Disclosure of Invention
The application provides an online course contract signing method and device, which can improve the management flexibility of access rights of users and reduce economic losses.
In a first aspect, the present application provides an online course contract signing method, including:
Determining a contract template, user information and user requirements, wherein the contract template comprises at least one custom field, and the user requirements comprise a first version of a purchased first course and whether a specific service is allowed or not, and the specific service characterizes an updated version of the first course which is automatically purchased by a user;
Based on the user information and the user requirements, determining the content corresponding to each custom field in the contract template, and correspondingly filling the content corresponding to each custom field into each definition field, so as to generate a contract corresponding to the user and a digital signature, wherein the digital signature characterizes the access rights of the user to each version of the first course.
In one example, the method further comprises:
And detecting whether the version of the first course is updated, and if the version of the first course is updated and the user receives the specific service, updating the contract and the digital signature corresponding to the user.
In one example, populating the content correspondence for each custom field to the respective definition field includes:
adding the same identification for each custom field and the corresponding content;
Encoding each custom field and the corresponding content to obtain a data string, wherein the data string carries an identifier before encoding;
And running a pre-written script program, and filling the data string into a custom field consistent with the carried identification.
In one example, the method further comprises:
judging whether the data string is accurately filled in the corresponding custom field;
if at least one data string is not accurately filled into the corresponding custom field, re-executing the step of running the pre-written script program to fill the data strings into the custom field consistent with the carried identification until each data string is accurately filled into the corresponding custom field.
In one example, the user information includes an access subject of the user, the method further comprising:
Encrypting the generated contract corresponding to the user to obtain an encrypted contract;
and adding a corresponding ID for the encryption contract, and binding the ID with an access subject of the user.
In one example, the method further comprises:
Acquiring an access request of a user, wherein the access request comprises an access subject of the user and an accessed second course;
And verifying whether the user has access rights to the second course based on the access subject of the user, if the user has the access rights to the second course, providing an access channel of the user to the second course, and if the user does not have the access rights to the second course, rejecting the access request of the user.
In one example, verifying whether the user has access to the second course based on the user's access principal comprises:
determining a bound ID through an access subject, and determining a corresponding encryption contract through the bound ID;
Decrypting the encrypted contract to obtain a digital signature of the user;
If the second course is a course with access rights for the user represented by the digital signature, judging that the user has the access rights for the second course;
and if the second course is not the course with the access right of the user represented by the digital signature, judging that the user does not have the access right to the second course.
In one example, the method further comprises:
and monitoring whether the contract is abnormal or not in real time, and repairing the contract when the contract is abnormal.
In one example, the method further comprises:
determining the management authority of each relevant role of each contract to the contract;
If the contract is updated, each relevant role of the contract is notified.
In a second aspect, the present application provides an online course contract signing method and apparatus, the apparatus comprising:
10. an online course contract signing method and device, comprising:
The system comprises a determining module, a processing module and a processing module, wherein the determining module is used for determining a contract template, user information and user requirements, the contract template comprises at least one custom field, the user requirements comprise a first version of a purchased first course and whether a specific service is allowed or not, and the specific service characterizes an updated version of the first course which is automatically purchased by a user;
and the processing module is used for determining the content corresponding to each custom field in the contract template based on the user information and the user requirement, filling the content corresponding to each custom field into the respective definition field, generating a contract corresponding to the user and a digital signature, and the digital signature characterizes the access authority of the user to each version of the first course.
In a third aspect, the present application provides an electronic device comprising: a processor, a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
The processor executes the computer-executable instructions stored in the memory to implement the method as in any one of the preceding claims.
In a fourth aspect, the application provides a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, are adapted to carry out a method as in any preceding claim.
In a fifth aspect, the application provides a computer program product comprising a computer program which, when executed by a processor, implements a method according to any of the preceding claims.
The online course contract signing method and device provided by the application are used for determining the content corresponding to each custom field in the contract template based on the user information, the first version of the first course purchased by the user and whether specific service is allowed or not, and correspondingly filling the content corresponding to each custom field into the respective definition field to generate the contract corresponding to the user and the digital signature, wherein the digital signature characterizes the access authority of the user to each version of the first course. The application limits the access right to the version of the course by generating the digital signature, so that the user can only access the purchased version of the course, and the flexibility of accessing the front line to the user can be improved, thereby avoiding the user from accessing the version of the course which is not purchased and reducing economic loss.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is an application scenario diagram of a prior art example;
FIG. 2 is a flowchart of an online course contract signing method according to an embodiment of the present application;
FIG. 3 is a flowchart of another online course contract signing method according to the first embodiment of the present application;
FIG. 4 is a flowchart of a method for signing an online course contract according to a first embodiment of the present application;
FIG. 5 is a flowchart of a method for signing an online course contract according to a first embodiment of the present application;
FIG. 6 is a flowchart of a method for signing an online course contract according to a first embodiment of the present application;
FIG. 7 is a flowchart of a method for signing an online course contract according to an embodiment of the present application;
FIG. 8 is a flowchart of a method for signing an online course contract according to a first embodiment of the present application;
FIG. 9 is a schematic diagram of an online course contract signing method according to a second embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to a third embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
Fig. 1 is an application scenario diagram of an example in the prior art, as shown in fig. 1, in an online education industry in the education technical field, a great number of courses exist in a course library, the same course includes at least one version, a seller sells access rights of the courses to a user in a manner of signing a contract, the user obtains access rights of purchased courses through signing the contract, and accesses the course library through the access rights, so that online checking of corresponding courses is realized.
Currently, after signing a contract with a user about a certain course, the user may obtain access rights about all historical versions of the course and all versions updated subsequently, for example, for use in the signed contract, to display that the purchased course is course a, and different versions of course a may include different lessons, for example, course a currently includes two versions, i.e., version 1 and version 2, respectively. In the example, the user currently signs a contract to purchase the course a, and the user has access rights to all versions of the course a, which results in inflexible management of access rights of the user, and if sellers of the course price different versions, economic losses are easily caused.
The online course contract signing method and device provided by the application are used for determining the content corresponding to each custom field in the contract template based on the user information, the first version of the first course purchased by the user and whether specific service is allowed or not, and correspondingly filling the content corresponding to each custom field into the respective definition field to generate the contract corresponding to the user and the digital signature, wherein the digital signature characterizes the access authority of the user to each version of the first course. The application limits the access right to the version of the course by generating the digital signature, so that the user can only access the purchased version of the course, and the flexibility of accessing the front line to the user can be improved, thereby avoiding the user from accessing the version of the course which is not purchased and reducing economic loss.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example 1
Fig. 2 is a flow chart of an online course contract signing method according to an embodiment of the present application, where, as shown in fig. 2, the method includes:
Step 201, determining a contract template, user information and user requirements, wherein the contract template comprises at least one custom field, and the user requirements comprise a first version of a purchased first course and whether a specific service is allowed or not, and the specific service characterizes an updated version of the first course which is automatically purchased by a user;
Step 202, determining the content corresponding to each custom field in the contract template based on the user information and the user requirements, and correspondingly filling the content corresponding to each custom field into each definition field to generate a contract corresponding to the user and a digital signature, wherein the digital signature characterizes the access rights of the user to each version of the first course.
In connection with the scenario example, a contract template may be created from a template editor in the contract management system, including static fields and dynamic fields in the contract template, where the static fields are contract default content, such as unchangeable fields like contract numbers. The dynamic field is a custom field of the contract, and needs to be determined according to the client information and the client requirement, for example, the course title, the course scope, the price strategy, the payment terms and the like can be custom filled according to the client requirement. User requirements may be determined by customer communication, face-to-face meetings, emails, online questionnaires, or requirement collection tools, recorded by a customer relationship management (Customer Relationship Management, abbreviated CRM) system, and the online forms are used to collect and sort the customer's requirement data, ensuring the integrity and accuracy of the requirements. The course title may be based on the course purchased by the user, and the first course purchased by the user is course a, and the course title may be: "purchase treaty for course A", the specific title may be based on the actual situation; the course scope characterizes the purchased courses in the user requirements, the user requirements comprise specific services, the specific services are optional services, namely, the user can purchase the updated version of the purchased courses automatically, for example, if the first course purchased by the user is the course A, and the first version of the purchased course A is the current latest version-version 2, the course scope is the version 2 of the course A purchased by the user. If the user still wants to view the course content in the subsequent updated version, the user can select a specific service; conversely, if the user only wants to view version 2 of course a, the user may not select a particular service. The field of the price policy may be based on the user's needs, and if the user selects a particular service, the pricing at the price policy should be the sum of the prices of version 2 and the subsequent updated versions, and if the user does not select a particular service, the pricing at the price policy should be the pricing of course a of version 2. After each custom field is filled, a contract and a digital signature of the course purchased by the user can be generated, and the representation form of the digital signature can be a key pair. The digital signature characterizes the access authority of the user to the course, the digital signature can be based on the range of the course purchased by the user, and if the range of the course purchased by the user is the version 2 of the course A, the access authority corresponding to the digital signature of the user is the version 2 of the course A. The access authority of the version of the course is limited by generating the digital signature, so that the user can only access the purchased version of the course, the flexibility of accessing the front line to the user can be improved, the user is prevented from accessing the version of the course which is not purchased, and the economic loss is reduced.
Optionally, the method further comprises:
And detecting whether the version of the first course is updated, and if the version of the first course is updated and the user receives the specific service, updating the contract and the digital signature corresponding to the user.
In combination with the scenario example, the digital signature generated according to the contract can only access the version 2 purchased at the time, and for the user selecting the specific service, the user needs to access the access right of the new version, so after the version of course a is updated, the digital signature of the user needs to be updated, so that the digital signature of the user has the right of accessing the new version. For example, if the user signs a contract, the user selects the specific service from version 2 of course a, and if course a is currently updated to version 3, the course range in the contract of the user receiving the specific service may be updated to version 2 and version 3 of course a, and then the digital signature is updated, so that the digital signature has access rights to both version 2 and version 3 of course a. Based on the method provided by the example, after the version of the first course purchased by the user is updated, the user can have access to the updated version by updating the available course range and the digital signature.
Optionally, fig. 3 is a flowchart of another online course contract signing method according to the first embodiment of the present application, as shown in fig. 3, in step 202, the step of filling the content corresponding to each custom field into the respective definition field includes:
Step 301, adding the same identifier to each custom field and the corresponding content;
step 302, coding each custom field and the corresponding content to obtain a data string, wherein the data string carries an identifier before coding;
Step 303, running a pre-written script program, and filling the data string into a custom field consistent with the carried identification.
In connection with the scenario example, each dynamic field, i.e., custom field, in the same template may be numbered, such as course title number 1, course scope number 2, price policy number 3, payment terms number 4, and so on. After determining the content to be filled in of each custom field, the content to be filled in of each custom field can be added with the same content as the corresponding custom field. Such as curriculum topics: the "purchase treaty for course a" may be numbered as "purchase treaty for course a" for number 1, and similarly, if course ranges are: "version 2 of course A", the number of "version 2 of course A" may be designated as number 2, in this way, the contents of each custom field are numbered. Since the contents of the custom fields are mostly in text form, in order to automatically fill the contents of each custom field into the corresponding custom field, the contents of each custom field can be encoded first, the number after encoding is unchanged, and each encoded data string is filled into the same custom field according to a pre-written script program, so that the automatic filling efficiency is improved.
Optionally, fig. 4 is a flow chart of another online course contract signing method according to the first embodiment of the present application, as shown in fig. 4, where the method further includes:
Step 401, judging whether the data string is accurately filled into the corresponding custom field;
If at least one data string is not accurately filled into the corresponding custom field, executing the pre-written script program again, and filling the data strings into the custom field consistent with the carried identification until each data string is accurately filled into the corresponding custom field.
In connection with the scenario example, it is checked whether each custom field is empty, if at least one custom field is empty. If the number of at least one custom field is inconsistent with the number of the filled content, judging that at least one data string is not accurately filled in the corresponding custom field. At this time, the filling of each custom field should be canceled, the pre-written script program is re-executed, and whether the data strings are accurately filled into the corresponding custom fields is re-determined until each data string is accurately filled into the corresponding custom fields. Specifically, if no custom field is empty and the number of each custom field is consistent with the number of the filled content, it is determined that each data string is accurately filled into the corresponding custom field, and at this time, execution of the pre-written script program may be stopped. Based on the method provided by the example, each data can be ensured to be correctly filled in the custom field to be corresponding.
Optionally, the user information includes an access subject of the user, fig. 5 is a flowchart of yet another online course contract signing method provided in the first embodiment of the present application, and as shown in fig. 5, the method further includes:
step 501, encrypting the generated contract corresponding to the user to obtain an encrypted contract;
Step 502, adding a corresponding ID to the encrypted contract, and binding the ID with the access subject of the user.
In combination with the scene example, the encryption mode of the contract can adopt symmetric encryption or asymmetric encryption. The characterization form of the access subject can be a login account number and a login password, the exclusive ID of the contract is added to the encrypted contract, the exclusive ID of the contract can be selected as the default code of the contract, and the access subject of the user is bound with the contract number of the user.
Optionally, fig. 6 is a flowchart of yet another online course contract signing method according to the first embodiment of the present application, as shown in fig. 6, where the method further includes:
Step 601, obtaining an access request of a user, wherein the access request comprises an access subject of the user and an accessed second course;
Step 602, verifying whether the user has access to the second course based on the access subject of the user, if the user has access to the second course, providing an access channel for the user to the second course, and if the user does not have access to the second course, rejecting the access request of the user.
In combination with the scenario example, if the user wants to access the second course in the course library, the user may initiate an access request for the second course, specifically, may first log in through the access subject of the user, then select the second course in the course library, and if the user selects to access the second course, then generate an access request for the second course. And verifying whether the user has scope authority to the second course based on the access subject of the user, if the second course is the course purchased by the user, such as the course A of the version 2, judging that the user has the access authority to the second course, and establishing an access channel between the user and the second course so as to enable the user to realize the access to the second course. Otherwise, if the second course is not the course purchased by the user, the user can be judged to not have the access right to the second course, and the access request of the user is refused. The present example can ensure that a user can only access courses with access rights by performing rights determination on the access request of the user.
Optionally, fig. 7 is a flowchart of still another online course contract signing method according to the first embodiment of the present application, as shown in fig. 7, in step 602, verifying whether the user has access rights to the second course based on the access subject of the user includes:
step 701, determining a bound ID through an access main body, and determining a corresponding encryption contract through the bound ID;
Step 702, decrypting the encrypted contract to obtain a digital signature of the user;
Step 703, if the second course is a course with access rights for the user represented by the digital signature, determining that the user has access rights for the second course;
Step 704, if the second course is not a course with access rights for the user represented by the digital signature, determining that the user does not have access rights for the second course.
In combination with the scenario example, according to the binding between the access subject and the ID of the encrypted contract, the access subject of the user can be determined through the access request of the user initiating the access request, then the ID of the encrypted contract bound with the access subject of the user is determined according to the access subject of the user, after the encrypted contract is decrypted through the key used in the same encryption, the related content of the contract can be checked, including the digital signature corresponding to the user, and whether the user has the access right to the second course can be determined based on the digital signature. For example, if the course access right represented by the digital signature includes a second course, for example, the second course is a course a of version 2 purchased by the user, it may be determined that the user has access right to the second course, otherwise, if the course access right represented by the digital signature does not include the second course, it is determined that the user does not have access right to the second course. Based on the method provided by the present example, it can be determined whether the user has access rights to the courses involved in the access request by means of digital signatures.
Optionally, the method further comprises:
and monitoring whether the contract is abnormal or not in real time, and repairing the contract when the contract is abnormal.
In connection with scenario examples, contract status is monitored, including signing, fulfillment, renewal and termination of the contract, and whether the contract is normally fulfilled at various stages is monitored. For example, if the rights of the digital signature of the user are monitored, such as if the user selects a specific service when signing a contract, it is necessary to monitor whether the course scope and the digital signature in the user's contract are updated with the update of the course version. Monitoring the contract in each stage can ensure that when the contract has abnormality in any stage, such as digital signature abnormality, the contract abnormality can be repaired even.
Optionally, fig. 8 is a flowchart of yet another online course contract signing method according to the first embodiment of the present application, where as shown in fig. 8, the method further includes:
Step 801, determining the management authority of each relevant role of each contract to the contract;
step 802, if the contract is updated, notifying each relevant role of the contract.
In combination with the scene example, the related roles of the contract mainly comprise a user, a producer, a manager and the like of the contract, wherein the user only has the viewing authority of the contract, and after the formal generation of the contract, the user does not have the modification authority of the contract. The producer of the contract can update the course range related in the contract and update the digital signature of the user after the version of the course purchased by the user is updated according to the special service signed by the user, so as to generate the updated contract. After the contract is updated, the updated contract can be sent to each corresponding role in a short message or mail mode, so that each role can know the updating condition of the contract, and the updated contract can be managed in time by the manager conveniently.
According to the embodiment, the access authority of the version of the course is limited by generating the digital signature, so that a user can only access the purchased version of the course, the flexibility of accessing the front line to the user can be improved, the user is prevented from accessing the version of the course which is not purchased, and the economic loss is reduced.
Example two
Fig. 9 is a schematic structural diagram of an online course contract signing method device according to a second embodiment of the present application, where, as shown in fig. 9, the device includes:
A determining module 91, configured to determine a contract template, user information and user requirements, where the contract template includes at least one custom field, and the user requirements include a first version of a purchased first course and whether a specific service is allowed, and the specific service characterizes an updated version of the first course that is automatically purchased by the user;
The processing module 92 is configured to determine, based on the user information and the user requirement, content corresponding to each custom field in the contract template, and fill the content corresponding to each custom field into the respective definition field, and generate a contract corresponding to the user and a digital signature, where the digital signature characterizes access rights of the user to each version of the first course.
In connection with the scenario example, the determination module 91 may create a contract template from a template editor in the contract management system, including static fields and dynamic fields in the contract template, where the static fields are contract default content, such as unchangeable fields like contract numbers. The dynamic field is a custom field of the contract, and needs to be determined according to the client information and the client requirement, for example, the course title, the course scope, the price strategy, the payment terms and the like can be custom filled according to the client requirement. User requirements may be determined by customer communication, face-to-face meetings, emails, online questionnaires, or requirement collection tools, recorded by a customer relationship management (Customer Relationship Management, abbreviated CRM) system, and the online forms are used to collect and sort the customer's requirement data, ensuring the integrity and accuracy of the requirements. The course title may be based on the course purchased by the user, and the first course purchased by the user is course a, and the course title may be: "purchase treaty for course A", the specific title may be based on the actual situation; the course scope characterizes the purchased courses in the user requirements, the user requirements comprise specific services, the specific services are optional services, namely, the user can purchase the updated version of the purchased courses automatically, for example, if the first course purchased by the user is the course A, and the first version of the purchased course A is the current latest version-version 2, the course scope is the version 2 of the course A purchased by the user. If the user still wants to view the course content in the subsequent updated version, the user can select a specific service; conversely, if the user only wants to view version 2 of course a, the user may not select a particular service. The field of the price policy may be based on the user's needs, and if the user selects a particular service, the pricing at the price policy should be the sum of the prices of version 2 and the subsequent updated versions, and if the user does not select a particular service, the pricing at the price policy should be the pricing of course a of version 2. After each custom field is filled, the processing module 92 may generate a contract for the course purchased by the user and a digital signature, which may be in the form of a key pair. The digital signature characterizes the access authority of the user to the course, the digital signature can be based on the range of the course purchased by the user, and if the range of the course purchased by the user is the version 2 of the course A, the access authority corresponding to the digital signature of the user is the version 2 of the course A. The access authority of the version of the course is limited by generating the digital signature, so that the user can only access the purchased version of the course, the flexibility of accessing the front line to the user can be improved, the user is prevented from accessing the version of the course which is not purchased, and the economic loss is reduced.
Optionally, for the user selecting the specific service, the user still has the right to access the subsequent version of the course a, but the digital signature generated according to the contract can only access the version 2 purchased at the time, so after the version of the course a is updated, the processing module 92 needs to update the contract of the user receiving the specific service, for example, if the course a has been updated to the version 3, the course range in the contract of the user receiving the specific service can be updated to the version 2 and the version 3 of the course a, and then the digital signature is updated, so that the digital signature has the access right to the version 2 and the version 3 of the course a. Based on the method provided by the example, after the version of the first course purchased by the user is updated, the user can have access to the updated version by updating the available course range and the digital signature.
Alternatively, the processing module 92 may number each dynamic field, i.e., custom field, in the same template, such as the title of the course numbered 1, the scope of the course numbered 2, the price policy numbered 3, the payment terms numbered 4, and so on. After determining the content to be filled in of each custom field, the content to be filled in of each custom field can be added with the same content as the corresponding custom field. Such as curriculum topics: the processing module 92 can determine the serial number of "purchase treaty of course a" as serial number 1, and similarly, if the course range is: "version 2 of course A", the number of "version 2 of course A" may be designated as number 2, in this way, the contents of each custom field are numbered. Since the contents of the custom fields are mostly in text form, in order to automatically fill the contents of each custom field into the corresponding custom field, the processing module 92 may encode the contents of each custom field first, the encoded number is unchanged, and according to a pre-written script program, fill each encoded data string into the same custom field encoded, so as to improve the efficiency of automatic filling.
Optionally, the processing module 92 checks whether each custom field is empty, and if at least one custom field is empty, determines that at least one data string is not accurately populated into the corresponding custom field. If no custom field is empty, it is detected whether the number of each custom field is consistent with the number of the filled content, and if at least one custom field is inconsistent with the number of the filled content, the processing module 92 determines that at least one data string is not accurately filled into the corresponding custom field. At this time, the filling of each custom field should be canceled, the pre-written script program is re-executed, and whether the data strings are accurately filled into the corresponding custom fields is re-determined until each data string is accurately filled into the corresponding custom fields. Specifically, if no custom field is empty and the number of each custom field is consistent with the number of the filled content, the processing module 92 determines that each data string is accurately filled into the corresponding custom field, and at this time, execution of the pre-written script program may be stopped. Based on the method provided by the example, each data can be ensured to be correctly filled in the custom field to be corresponding.
Alternatively, the encryption mode of the contract can be symmetric encryption or asymmetric encryption. The characterization form of the access subject can be a login account number and a login password, the exclusive ID of the contract is added to the encrypted contract, the exclusive ID of the contract can be selected as the default code of the contract, and the access subject of the user is bound with the contract number of the user.
Optionally, if the user wants to access a second course in the course library, the processing module 92 may initiate an access request for the second course, specifically, may first log in through the access subject of the processing module, then select from the course library, and if the user selects to access the second course, may generate an access request for the second course. And verifying whether the user has scope authority to the second course based on the access subject of the user, if the second course is the course purchased by the user, such as the course A of the version 2, judging that the user has the access authority to the second course, and establishing an access channel between the user and the second course so as to enable the user to realize the access to the second course. Otherwise, if the second course is not the course purchased by the user, the user can be judged to not have the access right to the second course, and the access request of the user is refused. The present example can ensure that a user can only access courses with access rights by performing rights determination on the access request of the user.
The processing module 92 may determine, according to the binding between the access subject and the ID of the encrypted contract, the access subject of the user according to the access request of the user who initiates the access request, determine, according to the access subject of the user, the ID of the encrypted contract bound thereto, decrypt the encrypted contract by using the key used in the same encryption, and then view the related content of the contract, including the digital signature corresponding to the user, and determine whether the user has access rights to the second course based on the digital signature. For example, if the course access right represented by the digital signature includes a second course, for example, the second course is a course a of version 2 purchased by the user, it may be determined that the user has access right to the second course, otherwise, if the course access right represented by the digital signature does not include the second course, it is determined that the user does not have access right to the second course. Based on the method provided by the present example, it can be determined whether the user has access rights to the courses involved in the access request by means of digital signatures.
Optionally, the processing module 92 monitors the contract status, including signing, fulfilling, renewing and terminating the contract, monitors whether the contract is normally fulfilled at each stage, and monitors each stage of the contract, so as to ensure that when the contract has an abnormality at any stage, the abnormality of the contract can be repaired.
Optionally, the relevant roles of the contract mainly include a user, a producer and a manager of the contract, wherein the user only has the viewing authority of the contract, and after the formal generation of the contract, the user does not have the modification authority of the contract. The producer of the contract may update the course ranges involved in the contract and update the digital signature of the user after the update of the version of the course purchased by the user occurs according to the special service signed by the user, thereby generating an updated contract. After the contract is updated, the processing module 92 can send the updated contract to each corresponding role in a short message or mail mode, so that each relevant role can know the updating condition of the contract, and the updated contract can be managed in time by the manager conveniently.
According to the embodiment, the access authority of the version of the course is limited by generating the digital signature, so that a user can only access the purchased version of the course, the flexibility of accessing the front line to the user can be improved, the user is prevented from accessing the version of the course which is not purchased, and the economic loss is reduced.
Example III
Fig. 10 is a schematic structural diagram of an electronic device according to a third embodiment of the present application. As shown in fig. 10, the electronic device may include: a transceiver 121, a processor 122, a memory 123.
Processor 122 executes the computer-executable instructions stored in the memory, causing processor 122 to perform the aspects of the embodiments described above. Processor 122 may be a general-purpose processor including a central processing unit CPU, a network processor (network processor, NP), etc.; but may also be a digital signal processor DSP, an application specific integrated circuit ASIC, a field programmable gate array FPGA or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component.
Memory 123 is coupled to processor 122 via the system bus and communicates with each other, and memory 123 is configured to store computer program instructions.
The transceiver 121 may be used to acquire a task to be run and configuration information of the task to be run.
The system bus may be a peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The system bus may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus. The transceiver is used to enable communication between the database access device and other computers (e.g., clients, read-write libraries, and read-only libraries). The memory may include random access memory (random access memory, RAM) and may also include non-volatile memory (non-volatile memory).
The electronic device provided by the embodiment of the application can be the terminal device of the embodiment.
The embodiment of the application also provides a chip for running the instruction, and the chip is used for executing the technical scheme of the file encryption delivery method in the embodiment.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores computer instructions, and when the computer instructions run on a computer, the computer is caused to execute the technical scheme of the file encryption delivery method in the embodiment.
The embodiment of the application also provides a computer program product, which comprises a computer program stored in a computer readable storage medium, at least one processor can read the computer program from the computer readable storage medium, and the technical scheme of the file encryption delivery method in the embodiment can be realized when the at least one processor executes the computer program.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of modules is merely a logical function division, and there may be additional divisions of a practical implementation, for example, multiple modules may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or modules, which may be in electrical, mechanical, or other forms.
The modules illustrated as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to implement the solution of this embodiment.
In addition, each functional module in the embodiments of the present application may be integrated in one processing unit, or each module may exist alone physically, or two or more modules may be integrated in one unit. The units formed by the modules can be realized in a form of hardware or a form of hardware and software functional units.
The integrated modules, which are implemented in the form of software functional modules, may be stored in a computer readable storage medium. The software functional modules described above are stored in a storage medium and include instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or processor to perform some of the steps of the methods of the various embodiments of the application.
It should be appreciated that the Processor may be a central processing unit (Central Processing Unit, abbreviated as CPU), or may be other general purpose Processor, digital signal Processor (DIGITAL SIGNAL Processor, abbreviated as DSP), application SPECIFIC INTEGRATED Circuit (ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
The memory may comprise a high-speed RAM memory, and may further comprise a non-volatile memory NVM, such as at least one magnetic disk memory, and may also be a U-disk, a removable hard disk, a read-only memory, a magnetic disk or optical disk, etc.
The bus may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, the buses in the drawings of the present application are not limited to only one bus or to one type of bus.
The storage medium may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. The storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application SPECIFIC INTEGRATED Circuits (ASIC). The processor and the storage medium may reside as discrete components in an electronic control unit or in a master control device.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the method embodiments described above may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium. The program, when executed, performs steps including the method embodiments described above; and the aforementioned storage medium includes: various media that can store program code, such as ROM, RAM, magnetic or optical disks.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments. The technical features of the above embodiments may be combined in any way, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, but should be considered as the scope of the description
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (10)
1. An on-line course contract signing method, comprising:
Determining a contract template, user information and user requirements, wherein the contract template comprises at least one custom field, and the user requirements comprise a first version of a purchased first course and whether a specific service is allowed or not, and the specific service characterizes an updated version of the first course which is automatically purchased by a user;
Based on user information and user requirements, determining contents corresponding to each custom field in the contract template, and correspondingly filling the contents corresponding to each custom field into the respective definition field to generate a contract corresponding to the user and a digital signature, wherein the digital signature characterizes access rights of the user to each version of the first course.
2. The method according to claim 1, wherein the method further comprises:
And detecting whether the version of the first course is updated, and if the version of the first course is updated and the user receives the specific service, updating the contract and the digital signature corresponding to the user.
3. The method of claim 1, wherein the populating the respective definition field with the content correspondence for each custom field comprises:
adding the same identification for each custom field and the corresponding content;
encoding each custom field and corresponding content to obtain a data string, wherein the data string carries an identifier before encoding;
And running a pre-written script program, and filling the data string into a custom field consistent with the carried identification.
4. A method according to claim 3, characterized in that the method further comprises:
judging whether the data string is accurately filled in the corresponding custom field;
if at least one data string is not accurately filled into the corresponding custom field, re-executing the step of running the pre-written script program to fill the data strings into the custom field consistent with the carried identification until each data string is accurately filled into the corresponding custom field.
5. The method of claim 1, wherein the user information comprises an access subject of the user, the method further comprising:
Encrypting the generated contract corresponding to the user to obtain an encrypted contract;
And adding a corresponding ID for the encryption contract, and binding the ID with an access subject of the user.
6. The method of claim 5, wherein the method further comprises:
acquiring an access request of a user, wherein the access request comprises an access subject of the user and an accessed second course;
And verifying whether the user has the access right to the second course based on the access subject of the user, if the user has the access right to the second course, providing an access channel of the user to the second course, and if the user does not have the access right to the second course, rejecting the access request of the user.
7. The method of claim 6, wherein verifying whether the user has access to the second course based on the user's access subject comprises:
Determining a bound ID through the access subject, and determining a corresponding encryption contract through the bound ID;
decrypting the encrypted contract to obtain a digital signature of the user;
if the second course is the course with the access right of the user represented by the digital signature, judging that the user has the access right to the second course;
and if the second course is not the course with the access right of the user represented by the digital signature, judging that the user does not have the access right to the second course.
8. The method according to any one of claims 1-7, further comprising:
and monitoring whether the contract is abnormal or not in real time, and repairing the contract when the contract is abnormal.
9. The method of claim 8, wherein the method further comprises:
determining the management authority of each relevant role of each contract to the contract;
If the contract is updated, each relevant role of the contract is notified.
10. An on-line course contract signing method and device, characterized by comprising the following steps:
A determining module configured to determine a contract template, user information, and user requirements, the contract template including at least one custom field, the user requirements including a first version of a purchased first course and whether a particular service is allowed, the particular service characterizing an updated version of the first course that the user automatically purchases;
And the processing module is used for determining the content corresponding to each custom field in the contract template based on the user information and the user requirement, filling the content corresponding to each custom field into the respective definition field, and generating a contract corresponding to the user and a digital signature, wherein the digital signature characterizes the access authority of the user to each version of the first course.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410834201.5A CN118797722A (en) | 2024-06-26 | 2024-06-26 | Online course contract signing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410834201.5A CN118797722A (en) | 2024-06-26 | 2024-06-26 | Online course contract signing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118797722A true CN118797722A (en) | 2024-10-18 |
Family
ID=93035174
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410834201.5A Pending CN118797722A (en) | 2024-06-26 | 2024-06-26 | Online course contract signing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118797722A (en) |
-
2024
- 2024-06-26 CN CN202410834201.5A patent/CN118797722A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111027971B (en) | Method, proxy node and medium for determining accounting node in blockchain network | |
JP5400869B2 (en) | Electronic application and management of digital products for network distribution | |
CN107480964B (en) | Directional transfer method for digital asset, central server and storage medium | |
US20220261461A1 (en) | Secure resource management to prevent fraudulent resource access | |
EP4339861A1 (en) | Goods transfer information processing method and apparatus, device, and storage medium | |
US20160027007A1 (en) | Loosely Coupled Hosted Application System | |
US20040111373A1 (en) | System and method of contents utilization and server thereof | |
JP2019512799A (en) | System and method for bill payment using dynamic loan acceptance limit | |
CN111899107B (en) | Scientific and technological service transaction method based on block chain intelligent contract | |
CN110969521A (en) | Loan method, loan device, loan server and loan storage medium | |
JP2005243036A (en) | Method and system for service provider to control exposure to non-payment by service user | |
CN115050450A (en) | Method and device for processing medicine purchasing request | |
US10255442B2 (en) | Controlled publication of sensitive content | |
CN110992034A (en) | Supply chain transaction privacy protection system and method based on block chain and related equipment | |
CN113126996A (en) | Code auditing method, device and system | |
CN116739596A (en) | Blockchain-based transaction supervision method, device, equipment, medium and product | |
CN118797722A (en) | Online course contract signing method and device | |
CN110599176A (en) | Data processing method and device based on block chain, storage medium and node equipment | |
CN113159768B (en) | Transaction certificate storage method, device and equipment | |
CN110796436B (en) | Process management system, method, device and readable medium for shared office | |
CN109460651A (en) | The login method and device of billing system | |
US20240340353A1 (en) | Methods and systems for user data management | |
CN118211799A (en) | Service management method, device and first terminal | |
CN114021206A (en) | Financing leasing method and device, block chain equipment and storage medium | |
CN116938472A (en) | Digital certificate processing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination |