CN103839205A - Network invoice and application system thereof - Google Patents

Network invoice and application system thereof Download PDF

Info

Publication number
CN103839205A
CN103839205A CN201410080604.1A CN201410080604A CN103839205A CN 103839205 A CN103839205 A CN 103839205A CN 201410080604 A CN201410080604 A CN 201410080604A CN 103839205 A CN103839205 A CN 103839205A
Authority
CN
China
Prior art keywords
network credentials
invoice
network
copy
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410080604.1A
Other languages
Chinese (zh)
Inventor
陈文胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410080604.1A priority Critical patent/CN103839205A/en
Publication of CN103839205A publication Critical patent/CN103839205A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a technology for generation and use of a network invoice and further discloses an application system of the network invoice. By the adoption of the technology for generation and use of the network invoice, existing physical paper invoices can be replaced, paperless use and management of the invoices are achieved, and a dedicated network invoice service platform can be established to provide online service associated with the network invoice.

Description

Network credentials and application system thereof
Technical field
The present invention discloses a kind of generation and application technology of network credentials, particularly a kind of technology and application system thereof of using cloud computing technology generation and supervising the network voucher.The present invention is applicable to the service trade such as E-Government, insurance.
Technical background
Voucher is a kind of document of concrete legal effect, as invoice, property ownership certificate, purchase contract, testament etc., and these vouchers or signed and issued by power department, or signed and issued by Stakeholder.The effect of voucher is for proving a fact, as purchase invoice, commercial contract, certification of deposit, government's certification etc.The voucher generally using is at present mostly that the described fact of its word or pattern is the content that voucher recorded and proved by forming after words different on writing on paper material or printing or pattern content.Although some mail, webpage capture also can be submitted to law court as important evidence, these electronic evidences can not be widely used as voucher.
Voucher needs long-term preservation, need to show different Stakeholders to watch, for example buy the invoice, land certificate, property ownership certificate in house etc., to need the long-term important documents of preserving, need these vouchers to give bank and other financial mechanism examination if any demand for loan, in possible house prosperity transaction in future, also need constantly to show to other people.Due to the papery voucher of shape in kind, in circulation process, easily lose, damage, be difficult for preserving, therefore the use of papery voucher and protection are a contradiction.
Due to the fast development of computer technology, special network technology, most papery vouchers of providing now, capital has corresponding electronics shelves backup to exist, but papery voucher is still legal original paper, after the damage of papery voucher or losing, can apply for making up identical papery voucher, but the backup of electronics shelves can not be used as voucher.
As: the network electronic invoice occurring for 2013, nominally be to utilize network to issue invoice, the papery invoice that remains in fact to output is original paper, utilizes network to make out an invoice, and has just changed a kind of mode of making out an invoice or approach.
As: all vehicle insurance declaration forms, be all recorded in database, but all Claims Resolution cases all need to submit declaration form or its copy of papery, have left the declaration form data (electronic certificate) in database in, are not utilized.
As: all deposit certificates, have corresponding data-base recording, but after your deposit certificate is lost or damaged, you just can not be with the data-base recording enchashments of bank, you must first make up the certification of deposit of a papery, then use the certification of deposit enchashment of this part of papery.And unique foundation of making up certification of deposit is exactly the data-base recording of bank.
To sum up book, there is inconvenience in the papery voucher of material objectization in preservation and circulation process.But also not there is not substituting at present technology and the product of papery voucher, can be accepted widely and adopt.
The essence of voucher is a kind of proof, and the shape of the fact that voucher will prove and the material of voucher, voucher is irrelevant, and the content only recording with voucher is relevant.This explanation voucher is can be with material, form existence arbitrarily arbitrarily, as the mud plate letter that ancient times, West Asia was recorded with arrowhead characters.The material of voucher also can change along with the variation in epoch, and in modern times and future, with computing machine and network technology generation and management voucher, make voucher become a kind of networking, never disappear data recording, it will be a kind of irreversible development trend, as: European Union issues new value added tax instruction, promotes the application of electronic invoice; Spain issues new managing bill regulations, papery invoice and electronic invoice is put on an equal footing, and electronic invoice is defined; The State Tax Administration of China has also issued " network managing bill way " in April, 2013; Etc..
Summary of the invention
The present invention discloses a kind of generation and application technology of network credentials, refers to especially a kind of network credentials that cloud computing technology generates of applying.Network credentials of the present invention, is used as the third party's evidence that can trust, can be applied in multiple service sectors field, includes but not limited to record and the notarization etc. of network invoice, industrial and commercial registration, insurance contract management, individual testament.
Another object of the present invention is to provide a kind of implementation method based on above-mentioned network credentials.
In order to reach above-mentioned the first object, the present invention by the following technical solutions:
The network credentials the present invention relates to, its essence is a kind of reliable, believable, the proof that can not loss, its core feature has referred to and has only had a data recording, is stored in safe and reliable database as unique original paper of network credentials, is representing the outwardness of network credentials; Every part of network credentials has unique, the unduplicated network credentials coding of determining; Once network credentials generate and confirm after just can not change, and be only kept in special network credentials application system, guarantee uniqueness that network credentials makes original paper with can not lossing property.
The network credentials the present invention relates to, its associated user is under the prerequisite of obtaining the authorization, can be at any time from network credentials application system unlimited check and obtain the copy of network credentials, and prove to show to other people legal existence of this network credentials with this copy.
The network credentials copy the present invention relates to, without any pro forma restriction, can be an electronic pictures, can be note, mail or the URL link that includes network credentials content, particularly network credentials coding, also the picture of copy or content can be printed on and on paper, make papery voucher.Network credentials coding is used for guaranteeing the corresponding relation between network credentials original paper and network credentials copy.
Because being certainly first has network credentials original paper to have network credentials copy again, so any people who network credentials and copy thereof is held to suspection, under the prerequisite of obtaining the authorization, the true and false that can inquire about at any time this network credentials in network credentials application system, network credentials application system provides continual online service in 24 hours.
Network credentials provides the function of endorsement, supports related right people in network credentials, to record the right of oneself.As the article property right when network credentials indicated occurs to shift or mortgage, relevant right side may be required in and in the endorsement hurdle of network credentials, indicates corresponding property transaction or mortgage record, both can prevent that invoice from maliciously being destroyed, also can prevent that the related commodity of network credentials from repeatedly being mortgaged or transferring the possession of.
In order to reach above-mentioned the second object, the present invention by the following technical solutions:
The network credentials the present invention relates to is a kind of virtualized electronic certificate, and its original paper does not exist with physical form, but is recorded in safe database in the mode of data recording.The present invention openly proves the outwardness of network credentials by a set of network credentials application system, and overlaps application system with this and realize it as the due function of network credentials.
Fig. 1 is the Technical Architecture of network credentials application system, is designed to five-layer structure, is respectively 1. UI interbedded formation, 2. application layer, 3. data Layer, 4. database, 5. cloud platform.Wherein:
The original paper of network credentials is only kept in database master meter 4., and has the data security measures such as corresponding remote backup; What 3. data Layer was deposited is the private data view that user uses, Data View is 4. duplicate of database, be derived from database master meter, whether no matter there is the damage all can regular update, 4. the data consistent in master meter be errorless to guarantee Data View 3. of data Layer and database; 1. registered user operates in UI interbedded formation after entering network credentials application system, sends operational order, inputs relevant data or receives Query Result; From UI interbedded formation operational order 1., the corresponding function program at the Background scheduling application layer of server in 2., completes instruction task; Registered user cannot direct control data view, must be according to unified command format, and the corresponding function program of invokes application layer in 2., completes its operational order.
Database is the data layout of master meter 4., because the network credentials of different purposes is different, and the register name that can record both parties as network invoice and number of registration, concrete transaction content etc.3. data Layer is that with database difference 4. 3. data Layer is database subset 4., and all data all take database 4. as standard.3. data Layer has infinite many privately owned Data Views of user, corresponding to different login account or registered user; Data View under each account is private data, the only record record relevant to this account, and whether registered user not only can also select to open to the outside world by free operant.And 4. database is not only the set of all data recording, is also comprised all materialss for registration and Operation Log, except only a few people, strictly forbid that other people operate.
Authorization has two kinds of patterns, and the one, destiny account keeper in the time of registered juristic person's account or family account, is the group in login account and member's setting operation authority, registered user adds different groups just to have the authority of this group; This licensing mode is applicable to legal person's inner management or household internal management.The 2nd, network credentials is delivered pattern, and unique coding of network credentials is handed to the other side by application system, adds after the coding of network credentials in the other side's authority record, and the other side just can freely inquire about and use this network credentials; This licensing mode is applicable to different legal persons or person-to-person voucher transmission.
Network credentials described in this patent has changed present situation that must be using material object as voucher, and creationary use electronic data a kind of reliably, that can not loss substitutes voucher in kind.This virtualized network credentials, do not need to manufacture, print, print, not only environmentally friendly, can also make full use of the online processing of the facility affairs relevant to voucher of network, rather than must transmit voucher in kind with manpower, some repeated affairs can also be utilized application software robotization processing, expands more efficiently application system easily, and cost is low, efficiency is high.
Accompanying drawing explanation
Fig. 1. the Technical Architecture of network credentials application system
Fig. 2. the business module schematic diagram of cloud invoice application system
Fig. 3. the Account Registration flow process of cloud invoice application system
Fig. 4. user's register flow path of cloud invoice application system
Fig. 5. the flow process of making out an invoice of cloud invoice application system
Embodiment
The present embodiment provides a set of cloud invoice application system.
The invoice that the present embodiment is related and existing network invoice are distinct: existing network invoice just uses network technology to make out an invoice as instrument, and final invoice original paper remains papery invoice; And the related invoice of the present embodiment, its original paper is a data recording, the user of all invoices can only see the copy of invoice.Therefore hereinafter invoice related the present embodiment is called by " cloud invoice ".
Fig. 2 is the business module schematic diagram of cloud invoice application system, and this system is one to be enclosed within the application system of developing on cloud computing platform, builds according to five layer architectures of the present invention, forms an application system that is specifically designed to cloud invoice business.Cloud invoice application system uses following technology and work flow to realize:
1, registration management
Using before cloud invoice application system and must first registering, register and comprise two different classifications: account and user.Account and user's difference is: the representative of each account be a colony, and that user representative is individual, user just can have correspondingly operating right after must joining certain account.
Account and user can be with two kinds of identity registrations: legal person and individual.Legal person refers to through the enterprise of legal registration, group, public institution, or the government department of authorized by state; Individual is with the registration of nature person's name.Corporation account's registration adopts system of approval, relevant registration certificate must be provided when registration and register with real name, and legal person user is applied for the registration of by corporation account's keeper, and corporation account's keeper specifies in the time applying for the registration of, and is responsible for corporation account's autonomous management.The registration of personal account adopts systems for recording, and any nature person files an application and be ready to observe the standard agreement person of cloud invoice application system, can get permission registration.
Open cloud invoice except corporation account can specify legal person's user representative legal person, other account and user do not open the authority of cloud invoice, but all login account and registered user, the authority that has inquiry, manages privately owned cloud invoice.In legal person's account register, also must open a fund account, this fund account is used for settling accounts in real time tax payable.
2, rights management
Each registered user under one's name, has privately owned, to record a cloud invoice income Data View, this user cloud invoice recording in inquiry and administration view of having the right.This Data View has three fields at least: date, cloud invoice coding, check drawer.Query page in cloud invoice application system is clicked network invoice coding just can recall and show this cloud invoice.
Under corporation account and legal person's user name of obtaining the authorization, there is a Data View privately owned, that record cloud invoice issuing, this is the exclusive authority of corporation account.The cloud invoice that every portion is provided, all can be recorded in this private data view.
In login account inside, keeper is the inner member's of destiny account operating right, timeliness independently; In account, can set up group, each group comprises some members and specifies at least one keeper, being in charge of the member in group; Under each group, can also set up group, form tree-shaped management.
Between different login account, deliver the coding of cloud invoice to the other side by cloud invoice application system, cloud invoice coding is joined in the other side's Data View under one's name, the other side just obtains the authority of this part of cloud invoice of examination, also obtain the right this part of cloud invoice endorsement, but do not change the authority of cloud invoice content simultaneously.
3, information interaction and communication
Every part of cloud invoice at least relates to three Stakeholders: seller (check drawer), purchaser (drawee), revenue department (collection of tax people), may relate to multiple different Stakeholders such as bank, audit, industry and commerce in addition.
Registered user between different accounts also needs to authorize each other, and is related to complexity, and the solution of the present embodiment is the coding that sends cloud invoice to the other side, authorizes and allows this cloud invoice coding be embodied in the other side's private data view.
For example: first company sells a collection of raw material to company B, first company can output a cloud invoice as seller, and cloud invoice can automatic powder adding after outputing adds in the Data View that data draw a bill to record, and notifies Party B to receive a cloud invoice by cloud invoice application system; Whether correctly after company B has notice, checking this cloud invoice, is to click confirm otherwise click and return ticket, and after click confirmation, this cloud invoice joins data in the cloud invoice income data view under company B's account automatically.
Although two of offices of first, company B's possibility different geographical, as taxpayer, all has a responsibility for declaring dutiable goods to supervisor's revenue department.The inventory and the inventory of outputing cloud invoice of cloud invoice will monthly be received by first, company B, hand to the Tax Supervisor of our company by cloud invoice application system, cloud invoice application system can notify Tax Supervisor to receive the cloud invoice schedule that area under one's jurisdiction unit delivers, and join in the Data View of this Tax Supervisor, this Tax Supervisor has obtained the authority of the examination unit of having under its command cloud invoice thus.
Again for example: company B buys after raw material, this raw material is compressed to the apply for loan to bank, the office manager of bank requires company B that purchase invoice is provided.Company B, by the cloud invoice of this single raw material, hands to the office manager of bank by cloud invoice application system, agree to cloud invoice coding to add in its Data View under one's name, and this office manager has just obtained the authority of checking this cloud invoice.Borrow successfully as criticized, the office manager of bank has the right in the endorsement hurdle of this cloud invoice, to record the content that loan compresses, and cancels this endorsement content after repaying finishes.
Again for example: first company engages third party accounting firm to carry out year-and audit, for convenience of audit, the keeper of first corporation account opens casual user's group, and specifies corresponding authority, auditor adds after this group, has just had the authority of examination first company cloud invoice.Entry-into-force time and the out-of-service time of this casual user's group can be by account keeper's free settings.
4, the flow process of making out an invoice
Fig. 5 is the process flow diagram of making out an invoice, in cloud invoice application system, and the very strict review procedure of making out an invoice.
First being to only have the approved corporation account authority of just making out an invoice, is secondly that the cloud invoice, particularly VAT invoice of outputing need to just can come into force after the audit of cloud invoice application system, and the 3rd is make out an invoice and withhold tax payable and carry out simultaneously.
Corporation account can freely specify bill after date whether to need internal check, but this not necessarily, and especially little Wei enterprise does not have so many human resources to process this affairs.But audit is recommendations, because audit can reduce risk, reduce the loss.Cloud invoice application system provides multiple parameter options for each account, and after setting, cloud invoice application system can automatically perform this routine scrutiny program.
The inside of cloud invoice application system also has review procedure one, can go out suspicious cloud invoice by certain Rules Filtering, then by manual examination and verification aftertreatment.This screening rule is variable, can freely increase and decrease according to the requirement of revenue department, as increase and decrease blacklist member, sets and examine the total charge of cloud invoice, and whether the knockdown price that cloud invoice indicates is reasonable, etc.
According to managing bill regulation, invoice is opened after mistake, and wrong ticket can not be destroyed, can only be with corresponding red ticket offset.Before outputing red ticket offset, the drawee of wrong ticket must first abandon the signing for of wrong ticket, and with being intended to indicate " this ticket cancels " in the endorsement hurdle of cloud invoice, otherwise cannot use red ticket offset.
5, safety guarantee
For realizing the reliability of the present embodiment medium cloud invoice, the present embodiment has adopted following methods:
All network service is all used SSL technology secrecy;
The original paper of all cloud invoices all leaves in the master meter of database, and forbids except anyone operation of specifying management an ancient official title;
Database master meter operates on highly reliable cloud platform, and the support of cloud platform is backed up in realtime and remote backup, after guaranteeing that arbitrary data is impaired, and recovery that can be quick, safe, correct;
The Data View that the data of user data layer just copy from database master meter, and regular update, guarantee that the data in all users' private data view are all consistent with database master meter;
Only allow user to operate in privately owned Data View;
The billing request of VAT invoice need to just can come into force after the audit of cloud invoice application system;
The billing request that audit is passed through, can, in the unified processing of server background, write direct in database master meter;
Unless there is Special Empower, cloud invoice application system is open examination and management invoice authority only, cannot change any content that cloud invoice comprises;
Once cloud invoice is outputed and is come into force, just cannot be destroyed, opening after wrong ticket can only be with corresponding red ticket offset.
Above-described embodiment is preferably embodiment of the present invention; but embodiments of the present invention are not restricted to the described embodiments; other any do not deviate from change, the modification done under Spirit Essence of the present invention and principle, substitutes, combination, simplify; all should be equivalent substitute mode, within being included in protection scope of the present invention.

Claims (9)

1. the present invention discloses a kind of generation and application technology of network credentials, it is characterized in that referring to there is and only has a data recording, is stored in safe and reliable database as unique network credentials original paper, is representing the outwardness of network credentials.
2. network credentials claimed in claim 1, it is characterized in that changing must be using material object as voucher present situation, use a kind of electronic data that reliably, can not loss instead and substitute voucher in kind.
3. network credentials claimed in claim 1, once it is characterized in that network credentials generate and confirm after just can not change, and be only kept in special network credentials application system, guarantee network credentials as the uniqueness of original paper with can not lossing property.
4. network credentials claimed in claim 1, is characterized in that user is under the prerequisite of obtaining the authorization, can be at any time from network credentials application system unlimited inquire about and download network voucher copy, show existing of network credentials with this copy to other people.
5. network credentials claimed in claim 1, it is characterized in that network credentials is a kind of general designation, network credentials can have different titles and purposes, includes but not limited to that commercial invoice, operation license, land certificate or property ownership certificate, declaration form, driver's license, government's certification, schooling certificate, donations prove, individual testament etc.
6. network credentials claimed in claim 1, is characterized in that network credentials provides the function of endorsement, and the related right people of network enabled voucher records the right of oneself in the endorsement hurdle of network credentials.
7. network credentials copy claimed in claim 4, it is characterized in that network credentials copy does not have shape, style restriction, it can be an electronic pictures, can be note, mail or the URL link that includes network credentials content, particularly network credentials coding, also copy picture or content can be printed on and on paper, make papery voucher.
8. network credentials copy claimed in claim 4, is characterized in that being used for guaranteeing the corresponding relation between network credentials original paper and network credentials copy with unique, unduplicated network credentials coding.
9. network credentials copy claimed in claim 4, it is characterized in that certainly first having network credentials original paper to have again network credentials copy, so any people who network credentials and copy thereof is held to suspection, under the prerequisite of obtaining the authorization, can in network credentials application system, inquire about at any time the true and false of this network credentials.
CN201410080604.1A 2014-03-06 2014-03-06 Network invoice and application system thereof Pending CN103839205A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410080604.1A CN103839205A (en) 2014-03-06 2014-03-06 Network invoice and application system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410080604.1A CN103839205A (en) 2014-03-06 2014-03-06 Network invoice and application system thereof

Publications (1)

Publication Number Publication Date
CN103839205A true CN103839205A (en) 2014-06-04

Family

ID=50802677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410080604.1A Pending CN103839205A (en) 2014-03-06 2014-03-06 Network invoice and application system thereof

Country Status (1)

Country Link
CN (1) CN103839205A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697660A (en) * 2017-10-19 2019-04-30 航天信息股份有限公司 A kind of method and system that enterprise's income invoice data are carried out to tax based on electronics bottom account platform
CN112651815A (en) * 2020-12-17 2021-04-13 航天信息股份有限公司企业服务分公司 Tax sharing platform

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697660A (en) * 2017-10-19 2019-04-30 航天信息股份有限公司 A kind of method and system that enterprise's income invoice data are carried out to tax based on electronics bottom account platform
CN112651815A (en) * 2020-12-17 2021-04-13 航天信息股份有限公司企业服务分公司 Tax sharing platform

Similar Documents

Publication Publication Date Title
Brandon The blockchain: The future of business information systems
Peters et al. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money
Cheng et al. Using blockchain to improve data management in the public sector
Ainsworth et al. Blockchain (distributed ledger technology) solves VAT fraud
CN107993047B (en) Policy sales commission rights and interests management method based on block chain
CN107636662A (en) Web content certification
US20220229883A1 (en) System and method for protecting, managing and monetizing creative works using blockchain
US20150095243A1 (en) Online-id-handling computer system and method
Shahaab et al. Public service operational efficiency and blockchain–A case study of Companies House, UK
GB2600543A (en) Compliance mechanisms in blockchain networks
KR20210120249A (en) Transaction methods and systems that utilize based of block-chain technology to trade creative assets such as works of art using smart contracts and to track them to implement creator's resale royalty Right in a transparent and fair manner
Manifavas et al. Blockchain in supply chain management
Zhang Challenges and strategies of promoting cloud accounting
Fabrizio et al. Invoice discounting: A blockchain-based approach
CA3191019A1 (en) Distributed ledger technology for asset-backed securities
Gollapalli et al. Land registration system using block-chain
CN103839205A (en) Network invoice and application system thereof
CN111008891A (en) Circulated electronic external-made original certificate, system and terminal
Feng et al. Can the issue of invoice reimbursement in China be solved completely through the integration of blockchain and IoT technology?
US20220122073A1 (en) System architecture for enabling distributed temporary control of discrete units of an asset
Setiya et al. Citizen e-governance using blockchain
Larikova et al. IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN THE SYSTEM OF ACCOUNTING AND ANALYTICAL SUPPORT FOR THE PUBLIC SECTOR.
CN111080380B (en) Electronic external original certificate, system, platform and terminal
Amin et al. A Study on Blockchain Technology Implementation in the Logistics Sector of Pakistan
Gong et al. The Design of Case-involved Property Transfer System Based on Blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Chen Wensheng

Document name: Notification of Publication of the Application for Invention

WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140604

WD01 Invention patent application deemed withdrawn after publication