CN112214798A - Billing encryption method and device, electronic equipment and storage medium - Google Patents
Billing encryption method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112214798A CN112214798A CN202011242106.4A CN202011242106A CN112214798A CN 112214798 A CN112214798 A CN 112214798A CN 202011242106 A CN202011242106 A CN 202011242106A CN 112214798 A CN112214798 A CN 112214798A
- Authority
- CN
- China
- Prior art keywords
- encryption method
- taxpayer
- public key
- invoicing
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The embodiment of the disclosure discloses a billing encryption method and device, electronic equipment and a storage medium. The billing encryption method comprises the following steps: selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer; after the second encryption method is selected, the taxpayer uploads a public key to a designated server; and the taxpayer configures a private key corresponding to the public key into an invoicing program. The bill is encrypted by adopting the encryption method selected by the taxpayer, and when the taxpayer does not select the encryption method of the tax bureau, the public key and the private key are uploaded by the taxpayer, so that the aims of improving the encryption security and the use enthusiasm of the taxpayer are fulfilled.
Description
Technical Field
The disclosure belongs to the technical field of invoice encryption, and particularly relates to an invoice encryption method, an invoice encryption device, electronic equipment and a storage medium.
Background
At present, due to the transformation cost of enterprise informatization or the distrust of taxpayers on the encryption security of the tax bureau, many taxpayer enterprises can reduce the tax enthusiasm because the tax bureau enforces the use of secret keys provided by the tax bureau for encryption communication. If some high-technology outsiders do not trust the security of the tax bureau communication enough, the competitors are afraid of intercepting and cracking their data. Namely, the existing invoice encryption has the problems of low security and low use enthusiasm of taxpayers.
Disclosure of Invention
In view of this, the embodiments of the present disclosure provide an invoice encryption method, apparatus, electronic device and storage medium, which at least solve the problems in the prior art that the security of invoice encryption and the use enthusiasm of taxpayers are not high.
In a first aspect, an embodiment of the present disclosure provides an invoicing encryption method, including:
selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer;
after the second encryption method is selected, the taxpayer uploads a public key to a designated server;
and the taxpayer configures a private key corresponding to the public key into an invoicing program.
Optionally, after the first encryption method is selected, the designated server generates a public key and a corresponding private key,
the private key is configured into the invoicing program.
Optionally, the designated server is a tax bureau server;
the taxpayer uploads the public key to the designated server, and the method comprises the following steps:
uploading a first certificate containing a public key to a designated server;
the designated server obtains the public key from the first certificate.
Optionally, the certificate is a cer format file, a crt format file, and/or a der format file.
Optionally, the uploading the public key to the designated server by the taxpayer includes:
and uploading the public key by calling an external interface provided by a specified server.
Optionally, the configuring, by the taxpayer, the private key corresponding to the public key to the invoicing program includes:
the taxpayer uploads a second certificate containing the private key to an invoicing program;
the billing program obtains the private key from the second certificate.
Optionally, the second certificate is a pfx format, jks format and/or p12 format file.
In a second aspect, an embodiment of the present disclosure further provides an invoicing encryption apparatus, including:
a selection module: the first encryption method and/or the second encryption method are/is selected in response to a selection instruction of the taxpayer;
a transmission module: when the second encryption method is selected, uploading a public key to a designated server;
a configuration module: the system is used for configuring a private key corresponding to the public key into an invoicing program.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, where the electronic device includes:
a memory storing executable instructions;
a processor executing the executable instructions in the memory to implement the ticketing encryption method of any of the first aspects.
In a fourth aspect, this disclosed embodiment also provides a computer-readable storage medium, which stores a computer program that, when executed by a processor, implements the billing encryption method of any one of the first aspects.
The method adopts the encryption method selected by the taxpayer to encrypt the bill, and when the taxpayer does not select the encryption method of the tax bureau, the public key and the private key are uploaded by the taxpayer, so that the aims of improving the encryption security and the use enthusiasm of the taxpayer are fulfilled.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in greater detail exemplary embodiments thereof with reference to the attached drawings, in which like reference numerals generally represent like parts throughout.
FIG. 1 shows a flow diagram of an invoicing encryption method of one embodiment of the present disclosure;
fig. 2 shows a schematic structural diagram of an invoicing encryption apparatus of one embodiment of the present disclosure;
fig. 3 shows a flow chart of a taxpayer selection encryption method of one embodiment of the present disclosure.
Detailed Description
Preferred embodiments of the present disclosure will be described in more detail below. While the following describes preferred embodiments of the present disclosure, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein.
As shown in fig. 1, an invoicing encryption method includes:
step S101: selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer;
the first encryption method is to encrypt by adopting a public key and a private key of a tax bureau, and the second encryption method is to generate the public key and the private key for a taxpayer.
Step S102: after the second encryption method is selected, the taxpayer uploads a public key to a designated server;
the designated server is a server of the tax bureau or a server designated by the tax bureau.
Step S103: and the taxpayer configures a private key corresponding to the public key into an invoicing program.
Optionally, after the first encryption method is selected, the designated server generates a public key and a corresponding private key,
the private key is configured into the invoicing program.
Optionally, the designated server is a tax bureau server;
the taxpayer uploads the public key to the designated server, and the method comprises the following steps:
uploading a first certificate containing a public key to a designated server;
the designated server obtains the public key from the first certificate.
Optionally, the certificate is a cer format file, a crt format file, and/or a der format file.
Optionally, the uploading the public key to the designated server by the taxpayer includes:
and uploading the public key by calling an external interface provided by a specified server.
Optionally, the configuring, by the taxpayer, the private key corresponding to the public key to the invoicing program includes:
the taxpayer uploads a second certificate containing the private key to an invoicing program;
the billing program obtains the private key from the second certificate.
Optionally, the second certificate is a pfx format, jks format and/or p12 format file.
As shown in fig. 2, an invoice encryption apparatus includes:
a selection module: the first encryption method and/or the second encryption method are/is selected in response to a selection instruction of the taxpayer;
a transmission module: when the second encryption method is selected, uploading a public key to a designated server;
a configuration module: the system is used for configuring a private key corresponding to the public key into an invoicing program.
In this embodiment, the taxpayer can select whether to use the private key provided by the tax bureau for data encryption, and can flexibly configure the private key of the taxpayer to perform encryption communication without using the private key of the tax bureau, as shown in the flow of fig. 3, the flow is as follows:
1. firstly, the taxpayer determines whether to use a secret key provided by a tax bureau, if the secret key provided by the tax bureau is determined to be used, the tax bureau server generates a pair of asymmetric secret keys (including a public key and a private key), stores the public key in the tax bureau server, and then issues the private key to invoicing software of the taxpayer (the invoicing software comprises all non-webpage-version taxpayer-side invoicing software such as PC invoicing software, cash dispenser invoicing software, proxy invoicing software, and the like, and the subsequent invoicing software in the embodiment refers to the same).
2. If the taxpayer decides not to use the secret key provided by the tax bureau, the public key is firstly uploaded to the tax bureau server in two modes, namely, the certificate is uploaded through a webpage end (the format of the certificate is generally cer/crt/der, and no password is needed), and the public key is uploaded through an external interface provided by the tax bureau. The taxpayer public key is received and stored by the tax office server through the two modes.
3. The taxpayer then proceeds to configure the private key corresponding to the public key into the billing software (program), i.e. upload the certificate to the billing software, the certificate format is generally pfx jks/. p12, and requires a password. The billing software then stores this private key locally.
4. And finally, the tax bureau server and the taxpayer terminal billing software can carry out encryption and decryption communication through the respectively stored public key and the private key.
This embodiment allows the tax bureau to provide more encryption options for the taxpayer. The following effects can be achieved:
1. and customizing the security level, the taxpayer can select whether to use the key provided by the tax bureau or select other third party keys with higher security level according to the security level requirement of the taxpayer.
2. The improvement cost of partial tax paying enterprise systems is reduced, because the informatization of some tax paying enterprises is formed and own encryption methods are provided, the improvement cost is higher if encryption and decryption communication is carried out by using a private key of a tax bureau, and the enterprises can use the private keys to carry out encryption and decryption by the scheme, so that the improvement amount of the existing information systems is reduced.
3. The security responsibility born by the tax bureau is reduced, if the taxpayer chooses to use the private key of the taxpayer to encrypt and decrypt, the part of the security responsibility is born by the taxpayer, and thus the security responsibility born by the tax bureau is reduced.
4. The enthusiasm of the taxpayers is improved, and due to the fact that more selectivity exists in the encryption mode, the enthusiasm of the taxpayers is improved to a certain extent, enterprises can use the certificates trusted by the enterprises to conduct encryption communication, and therefore worry about safety is eliminated.
An embodiment of the present disclosure provides an electronic device comprising a memory and a processor,
a memory storing executable instructions;
and the processor runs the executable instructions in the memory to realize the billing encryption method.
The memory is to store non-transitory computer readable instructions. In particular, the memory may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, Random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, Read Only Memory (ROM), hard disk, flash memory, etc.
The processor may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device to perform desired functions. In one embodiment of the disclosure, the processor is configured to execute the computer readable instructions stored in the memory.
Those skilled in the art should understand that, in order to solve the technical problem of how to obtain a good user experience, the present embodiment may also include well-known structures such as a communication bus, an interface, and the like, and these well-known structures should also be included in the protection scope of the present disclosure.
For the detailed description of the present embodiment, reference may be made to the corresponding descriptions in the foregoing embodiments, which are not repeated herein.
The disclosed embodiments provide a computer-readable storage medium storing a computer program that, when executed by a processor, implements an invoicing encryption method.
A computer-readable storage medium according to an embodiment of the present disclosure has non-transitory computer-readable instructions stored thereon. The non-transitory computer readable instructions, when executed by a processor, perform all or a portion of the steps of the methods of the embodiments of the disclosure previously described.
The computer-readable storage media include, but are not limited to: optical storage media (e.g., CD-ROMs and DVDs), magneto-optical storage media (e.g., MOs), magnetic storage media (e.g., magnetic tapes or removable disks), media with built-in rewritable non-volatile memory (e.g., memory cards), and media with built-in ROMs (e.g., ROM cartridges).
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments.
Claims (10)
1. An invoicing encryption method, comprising:
selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer;
after the second encryption method is selected, the taxpayer uploads a public key to a designated server;
and the taxpayer configures a private key corresponding to the public key into an invoicing program.
2. The billing encryption method according to claim 1,
when the first encryption method is selected, designating the server to generate a public key and a corresponding private key,
the private key is configured into the invoicing program.
3. The billing encryption method according to claim 1 or 2,
the designated server is a tax bureau server;
the taxpayer uploads the public key to the designated server, and the method comprises the following steps:
uploading a first certificate containing a public key to a designated server;
the designated server obtains the public key from the first certificate.
4. A billing encryption method according to claim 3, characterized in that the certificate is a cer format, crt format and/or der format file.
5. The billing encryption method of claim 1, wherein the taxpayer uploading the public key to the designated server comprises:
and uploading the public key by calling an external interface provided by a specified server.
6. The invoicing encryption method of claim 1, wherein the taxpayer configures a private key corresponding to the public key into an invoicing program, comprising:
the taxpayer uploads a second certificate containing the private key to an invoicing program;
the billing program obtains the private key from the second certificate.
7. The billing encryption method of claim 6, wherein the second certificate is a pfx format, jks format and/or p12 format file.
8. An apparatus for encrypting invoices, comprising:
a selection module: the first encryption method and/or the second encryption method are/is selected in response to a selection instruction of the taxpayer;
a transmission module: when the second encryption method is selected, uploading a public key to a designated server;
a configuration module: the system is used for configuring a private key corresponding to the public key into an invoicing program.
9. An electronic device, characterized in that the electronic device comprises:
a memory storing executable instructions;
a processor executing the executable instructions in the memory to implement the ticketing encryption method of any of claims 1-8.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the invoicing encryption method of any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011242106.4A CN112214798A (en) | 2020-11-09 | 2020-11-09 | Billing encryption method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011242106.4A CN112214798A (en) | 2020-11-09 | 2020-11-09 | Billing encryption method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112214798A true CN112214798A (en) | 2021-01-12 |
Family
ID=74058415
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011242106.4A Pending CN112214798A (en) | 2020-11-09 | 2020-11-09 | Billing encryption method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112214798A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102479412A (en) * | 2010-11-26 | 2012-05-30 | 航天信息股份有限公司 | Processing method and system of network invoicing data as well as tax control device and handling server |
CN202404689U (en) * | 2011-11-30 | 2012-08-29 | 航天信息股份有限公司 | Fiscal control device |
CN202600870U (en) * | 2011-12-01 | 2012-12-12 | 航天信息股份有限公司 | Fiscal apparatus based on fingerprint authentication |
CN103927679A (en) * | 2014-03-31 | 2014-07-16 | 浪潮软件集团有限公司 | Electronic invoice signature and verification method |
CN105635049A (en) * | 2014-10-29 | 2016-06-01 | 航天信息股份有限公司 | Anti-counterfeit tax control method and device based on client identifier password |
CN108830600A (en) * | 2018-06-19 | 2018-11-16 | 方欣科技有限公司 | A kind of electronic invoice system and implementation method based on block chain |
CN111178989A (en) * | 2019-12-05 | 2020-05-19 | 航天信息股份有限公司 | Method and system for positioning taxpayer invoicing position |
-
2020
- 2020-11-09 CN CN202011242106.4A patent/CN112214798A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102479412A (en) * | 2010-11-26 | 2012-05-30 | 航天信息股份有限公司 | Processing method and system of network invoicing data as well as tax control device and handling server |
CN202404689U (en) * | 2011-11-30 | 2012-08-29 | 航天信息股份有限公司 | Fiscal control device |
CN202600870U (en) * | 2011-12-01 | 2012-12-12 | 航天信息股份有限公司 | Fiscal apparatus based on fingerprint authentication |
CN103927679A (en) * | 2014-03-31 | 2014-07-16 | 浪潮软件集团有限公司 | Electronic invoice signature and verification method |
CN105635049A (en) * | 2014-10-29 | 2016-06-01 | 航天信息股份有限公司 | Anti-counterfeit tax control method and device based on client identifier password |
CN108830600A (en) * | 2018-06-19 | 2018-11-16 | 方欣科技有限公司 | A kind of electronic invoice system and implementation method based on block chain |
CN111178989A (en) * | 2019-12-05 | 2020-05-19 | 航天信息股份有限公司 | Method and system for positioning taxpayer invoicing position |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11030338B2 (en) | Selectively wiping a remote device | |
US11341092B2 (en) | Method and system for applying data retention policies in a computing platform | |
US10609031B2 (en) | Private consolidated cloud service architecture | |
JP6082166B2 (en) | Multiple permission data security and access | |
JP2017174452A (en) | Provision of enterprise application store | |
US20130263233A1 (en) | Data access and control | |
US8307408B2 (en) | System and method for file processing and file processing program | |
US9305146B2 (en) | License management device, license management system, license management method, and program | |
US20190068568A1 (en) | Distributed profile and key management | |
EP2689367B1 (en) | Data protection using distributed security key | |
US20190065725A1 (en) | Distributed profile and key management | |
CN112214798A (en) | Billing encryption method and device, electronic equipment and storage medium | |
EP2940621B1 (en) | Apparatus, system, and method for controlling encryption and decryption with respect to a key | |
US20170187531A1 (en) | Providing encrypted personal data to applications based on established policies for release of the personal data | |
JP6778033B2 (en) | Take-out file simple encryption system and take-out file simple encryption program | |
US10277565B2 (en) | Enterprise service bus logging | |
US20230229816A1 (en) | Enabling Secure Debug Logging | |
US20240048380A1 (en) | Cryptography-as-a-Service | |
Pillai et al. | Security for Cross-Tenant Access Control in Cloud Computing | |
CN114418657A (en) | Method for acquiring billing data, electronic device and medium | |
CN114003336A (en) | Method, device, equipment and medium for encrypting virtual machine in cloud platform | |
WO2022136559A1 (en) | Data security methods | |
AU2021347175A1 (en) | Encrypted file control | |
CN113946838A (en) | Data sharing method and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |