Highlight feature | PC+mobile dual verification of true intention, enhancing the credibility of signed documents

Qiyuesuo
2024-07-16 13:38:27

Mobile devices such as smartphones are often carried around due to their convenience. Faced with signing scenarios such as business trips and at customer sites, users can initiate signing anytime and anywhere through the contract lock app and mini program on their phones and iPads; The advantage of the PC side is that it can handle more complex and large amounts of work. After logging in to the contract lock website or downloading the client on the PC side, electronic signatures can be used. The functions of contract lock batch initiation, batch import, batch management, etc. help organizations save a lot of repetitive work. Due to the low portability of the PC end, important business data may be leaked in non monitored areas due to account fraud, theft, and even risks such as operation denial and mutual shirking of responsibility. In order to enhance the security of electronic signatures on the PC side, Contract Lock combines the advantages of both PC and mobile devices. During the PC signing process, it introduces the "Mobile Device Verification" step, which re verifies the true intention through the mobile device, strengthens the identity and authenticity of the signing subject, and ensures operational security. How to activate it specifically? Step 1: 

Open the "Mobile Device Verification" function in the personal center, where you can bind a unique mobile device (such as a phone or iPad)

Step 2: Use the mobile app to log in to the contract lock account, use the "Scan" function, scan the code to complete the binding, and after binding, each time you sign, you need to scan the code with your phone for authorization. As the foundation builder of digital trustworthiness, the contract lock electronic signature system insists on providing users with a“ Trusted Digital Identity Service; By collaborating with authoritative CA institutions and utilizing trusted digital certificates and identity authentication, a digital trusted identity certificate is issued for each virtual account ID. Simultaneously combining multiple methods of verifying genuine intentions to ensure the accuracy of the system; Initiate, approve, sign, view, download, edit” All operations are supported by real identities and are based on genuine intentions, ensuring the authenticity and trustworthiness of electronic signatures and data in various digital systems. Ensure that every step of the operation is safe and trustworthy, prevent denial and shirking of responsibility afterwards, and establish a real and trustworthy digital environment.