CN112214798A - Billing encryption method and device, electronic equipment and storage medium - Google Patents

Billing encryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112214798A
CN112214798A CN202011242106.4A CN202011242106A CN112214798A CN 112214798 A CN112214798 A CN 112214798A CN 202011242106 A CN202011242106 A CN 202011242106A CN 112214798 A CN112214798 A CN 112214798A
Authority
CN
China
Prior art keywords
encryption method
taxpayer
public key
invoicing
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011242106.4A
Other languages
Chinese (zh)
Inventor
王永敬
黄新华
刘健
王明
刘力夫
田德飞
柳阁文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202011242106.4A priority Critical patent/CN112214798A/en
Publication of CN112214798A publication Critical patent/CN112214798A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The embodiment of the disclosure discloses a billing encryption method and device, electronic equipment and a storage medium. The billing encryption method comprises the following steps: selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer; after the second encryption method is selected, the taxpayer uploads a public key to a designated server; and the taxpayer configures a private key corresponding to the public key into an invoicing program. The bill is encrypted by adopting the encryption method selected by the taxpayer, and when the taxpayer does not select the encryption method of the tax bureau, the public key and the private key are uploaded by the taxpayer, so that the aims of improving the encryption security and the use enthusiasm of the taxpayer are fulfilled.

Description

Billing encryption method and device, electronic equipment and storage medium
Technical Field
The disclosure belongs to the technical field of invoice encryption, and particularly relates to an invoice encryption method, an invoice encryption device, electronic equipment and a storage medium.
Background
At present, due to the transformation cost of enterprise informatization or the distrust of taxpayers on the encryption security of the tax bureau, many taxpayer enterprises can reduce the tax enthusiasm because the tax bureau enforces the use of secret keys provided by the tax bureau for encryption communication. If some high-technology outsiders do not trust the security of the tax bureau communication enough, the competitors are afraid of intercepting and cracking their data. Namely, the existing invoice encryption has the problems of low security and low use enthusiasm of taxpayers.
Disclosure of Invention
In view of this, the embodiments of the present disclosure provide an invoice encryption method, apparatus, electronic device and storage medium, which at least solve the problems in the prior art that the security of invoice encryption and the use enthusiasm of taxpayers are not high.
In a first aspect, an embodiment of the present disclosure provides an invoicing encryption method, including:
selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer;
after the second encryption method is selected, the taxpayer uploads a public key to a designated server;
and the taxpayer configures a private key corresponding to the public key into an invoicing program.
Optionally, after the first encryption method is selected, the designated server generates a public key and a corresponding private key,
the private key is configured into the invoicing program.
Optionally, the designated server is a tax bureau server;
the taxpayer uploads the public key to the designated server, and the method comprises the following steps:
uploading a first certificate containing a public key to a designated server;
the designated server obtains the public key from the first certificate.
Optionally, the certificate is a cer format file, a crt format file, and/or a der format file.
Optionally, the uploading the public key to the designated server by the taxpayer includes:
and uploading the public key by calling an external interface provided by a specified server.
Optionally, the configuring, by the taxpayer, the private key corresponding to the public key to the invoicing program includes:
the taxpayer uploads a second certificate containing the private key to an invoicing program;
the billing program obtains the private key from the second certificate.
Optionally, the second certificate is a pfx format, jks format and/or p12 format file.
In a second aspect, an embodiment of the present disclosure further provides an invoicing encryption apparatus, including:
a selection module: the first encryption method and/or the second encryption method are/is selected in response to a selection instruction of the taxpayer;
a transmission module: when the second encryption method is selected, uploading a public key to a designated server;
a configuration module: the system is used for configuring a private key corresponding to the public key into an invoicing program.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, where the electronic device includes:
a memory storing executable instructions;
a processor executing the executable instructions in the memory to implement the ticketing encryption method of any of the first aspects.
In a fourth aspect, this disclosed embodiment also provides a computer-readable storage medium, which stores a computer program that, when executed by a processor, implements the billing encryption method of any one of the first aspects.
The method adopts the encryption method selected by the taxpayer to encrypt the bill, and when the taxpayer does not select the encryption method of the tax bureau, the public key and the private key are uploaded by the taxpayer, so that the aims of improving the encryption security and the use enthusiasm of the taxpayer are fulfilled.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in greater detail exemplary embodiments thereof with reference to the attached drawings, in which like reference numerals generally represent like parts throughout.
FIG. 1 shows a flow diagram of an invoicing encryption method of one embodiment of the present disclosure;
fig. 2 shows a schematic structural diagram of an invoicing encryption apparatus of one embodiment of the present disclosure;
fig. 3 shows a flow chart of a taxpayer selection encryption method of one embodiment of the present disclosure.
Detailed Description
Preferred embodiments of the present disclosure will be described in more detail below. While the following describes preferred embodiments of the present disclosure, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein.
As shown in fig. 1, an invoicing encryption method includes:
step S101: selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer;
the first encryption method is to encrypt by adopting a public key and a private key of a tax bureau, and the second encryption method is to generate the public key and the private key for a taxpayer.
Step S102: after the second encryption method is selected, the taxpayer uploads a public key to a designated server;
the designated server is a server of the tax bureau or a server designated by the tax bureau.
Step S103: and the taxpayer configures a private key corresponding to the public key into an invoicing program.
Optionally, after the first encryption method is selected, the designated server generates a public key and a corresponding private key,
the private key is configured into the invoicing program.
Optionally, the designated server is a tax bureau server;
the taxpayer uploads the public key to the designated server, and the method comprises the following steps:
uploading a first certificate containing a public key to a designated server;
the designated server obtains the public key from the first certificate.
Optionally, the certificate is a cer format file, a crt format file, and/or a der format file.
Optionally, the uploading the public key to the designated server by the taxpayer includes:
and uploading the public key by calling an external interface provided by a specified server.
Optionally, the configuring, by the taxpayer, the private key corresponding to the public key to the invoicing program includes:
the taxpayer uploads a second certificate containing the private key to an invoicing program;
the billing program obtains the private key from the second certificate.
Optionally, the second certificate is a pfx format, jks format and/or p12 format file.
As shown in fig. 2, an invoice encryption apparatus includes:
a selection module: the first encryption method and/or the second encryption method are/is selected in response to a selection instruction of the taxpayer;
a transmission module: when the second encryption method is selected, uploading a public key to a designated server;
a configuration module: the system is used for configuring a private key corresponding to the public key into an invoicing program.
In this embodiment, the taxpayer can select whether to use the private key provided by the tax bureau for data encryption, and can flexibly configure the private key of the taxpayer to perform encryption communication without using the private key of the tax bureau, as shown in the flow of fig. 3, the flow is as follows:
1. firstly, the taxpayer determines whether to use a secret key provided by a tax bureau, if the secret key provided by the tax bureau is determined to be used, the tax bureau server generates a pair of asymmetric secret keys (including a public key and a private key), stores the public key in the tax bureau server, and then issues the private key to invoicing software of the taxpayer (the invoicing software comprises all non-webpage-version taxpayer-side invoicing software such as PC invoicing software, cash dispenser invoicing software, proxy invoicing software, and the like, and the subsequent invoicing software in the embodiment refers to the same).
2. If the taxpayer decides not to use the secret key provided by the tax bureau, the public key is firstly uploaded to the tax bureau server in two modes, namely, the certificate is uploaded through a webpage end (the format of the certificate is generally cer/crt/der, and no password is needed), and the public key is uploaded through an external interface provided by the tax bureau. The taxpayer public key is received and stored by the tax office server through the two modes.
3. The taxpayer then proceeds to configure the private key corresponding to the public key into the billing software (program), i.e. upload the certificate to the billing software, the certificate format is generally pfx jks/. p12, and requires a password. The billing software then stores this private key locally.
4. And finally, the tax bureau server and the taxpayer terminal billing software can carry out encryption and decryption communication through the respectively stored public key and the private key.
This embodiment allows the tax bureau to provide more encryption options for the taxpayer. The following effects can be achieved:
1. and customizing the security level, the taxpayer can select whether to use the key provided by the tax bureau or select other third party keys with higher security level according to the security level requirement of the taxpayer.
2. The improvement cost of partial tax paying enterprise systems is reduced, because the informatization of some tax paying enterprises is formed and own encryption methods are provided, the improvement cost is higher if encryption and decryption communication is carried out by using a private key of a tax bureau, and the enterprises can use the private keys to carry out encryption and decryption by the scheme, so that the improvement amount of the existing information systems is reduced.
3. The security responsibility born by the tax bureau is reduced, if the taxpayer chooses to use the private key of the taxpayer to encrypt and decrypt, the part of the security responsibility is born by the taxpayer, and thus the security responsibility born by the tax bureau is reduced.
4. The enthusiasm of the taxpayers is improved, and due to the fact that more selectivity exists in the encryption mode, the enthusiasm of the taxpayers is improved to a certain extent, enterprises can use the certificates trusted by the enterprises to conduct encryption communication, and therefore worry about safety is eliminated.
An embodiment of the present disclosure provides an electronic device comprising a memory and a processor,
a memory storing executable instructions;
and the processor runs the executable instructions in the memory to realize the billing encryption method.
The memory is to store non-transitory computer readable instructions. In particular, the memory may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, Random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, Read Only Memory (ROM), hard disk, flash memory, etc.
The processor may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device to perform desired functions. In one embodiment of the disclosure, the processor is configured to execute the computer readable instructions stored in the memory.
Those skilled in the art should understand that, in order to solve the technical problem of how to obtain a good user experience, the present embodiment may also include well-known structures such as a communication bus, an interface, and the like, and these well-known structures should also be included in the protection scope of the present disclosure.
For the detailed description of the present embodiment, reference may be made to the corresponding descriptions in the foregoing embodiments, which are not repeated herein.
The disclosed embodiments provide a computer-readable storage medium storing a computer program that, when executed by a processor, implements an invoicing encryption method.
A computer-readable storage medium according to an embodiment of the present disclosure has non-transitory computer-readable instructions stored thereon. The non-transitory computer readable instructions, when executed by a processor, perform all or a portion of the steps of the methods of the embodiments of the disclosure previously described.
The computer-readable storage media include, but are not limited to: optical storage media (e.g., CD-ROMs and DVDs), magneto-optical storage media (e.g., MOs), magnetic storage media (e.g., magnetic tapes or removable disks), media with built-in rewritable non-volatile memory (e.g., memory cards), and media with built-in ROMs (e.g., ROM cartridges).
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments.

Claims (10)

1. An invoicing encryption method, comprising:
selecting the first encryption method and/or the second encryption method in response to a selection instruction of the taxpayer;
after the second encryption method is selected, the taxpayer uploads a public key to a designated server;
and the taxpayer configures a private key corresponding to the public key into an invoicing program.
2. The billing encryption method according to claim 1,
when the first encryption method is selected, designating the server to generate a public key and a corresponding private key,
the private key is configured into the invoicing program.
3. The billing encryption method according to claim 1 or 2,
the designated server is a tax bureau server;
the taxpayer uploads the public key to the designated server, and the method comprises the following steps:
uploading a first certificate containing a public key to a designated server;
the designated server obtains the public key from the first certificate.
4. A billing encryption method according to claim 3, characterized in that the certificate is a cer format, crt format and/or der format file.
5. The billing encryption method of claim 1, wherein the taxpayer uploading the public key to the designated server comprises:
and uploading the public key by calling an external interface provided by a specified server.
6. The invoicing encryption method of claim 1, wherein the taxpayer configures a private key corresponding to the public key into an invoicing program, comprising:
the taxpayer uploads a second certificate containing the private key to an invoicing program;
the billing program obtains the private key from the second certificate.
7. The billing encryption method of claim 6, wherein the second certificate is a pfx format, jks format and/or p12 format file.
8. An apparatus for encrypting invoices, comprising:
a selection module: the first encryption method and/or the second encryption method are/is selected in response to a selection instruction of the taxpayer;
a transmission module: when the second encryption method is selected, uploading a public key to a designated server;
a configuration module: the system is used for configuring a private key corresponding to the public key into an invoicing program.
9. An electronic device, characterized in that the electronic device comprises:
a memory storing executable instructions;
a processor executing the executable instructions in the memory to implement the ticketing encryption method of any of claims 1-8.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the invoicing encryption method of any one of claims 1-8.
CN202011242106.4A 2020-11-09 2020-11-09 Billing encryption method and device, electronic equipment and storage medium Pending CN112214798A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011242106.4A CN112214798A (en) 2020-11-09 2020-11-09 Billing encryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011242106.4A CN112214798A (en) 2020-11-09 2020-11-09 Billing encryption method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112214798A true CN112214798A (en) 2021-01-12

Family

ID=74058415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011242106.4A Pending CN112214798A (en) 2020-11-09 2020-11-09 Billing encryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112214798A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479412A (en) * 2010-11-26 2012-05-30 航天信息股份有限公司 Processing method and system of network invoicing data as well as tax control device and handling server
CN202404689U (en) * 2011-11-30 2012-08-29 航天信息股份有限公司 Fiscal control device
CN202600870U (en) * 2011-12-01 2012-12-12 航天信息股份有限公司 Fiscal apparatus based on fingerprint authentication
CN103927679A (en) * 2014-03-31 2014-07-16 浪潮软件集团有限公司 Electronic invoice signature and verification method
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN108830600A (en) * 2018-06-19 2018-11-16 方欣科技有限公司 A kind of electronic invoice system and implementation method based on block chain
CN111178989A (en) * 2019-12-05 2020-05-19 航天信息股份有限公司 Method and system for positioning taxpayer invoicing position

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479412A (en) * 2010-11-26 2012-05-30 航天信息股份有限公司 Processing method and system of network invoicing data as well as tax control device and handling server
CN202404689U (en) * 2011-11-30 2012-08-29 航天信息股份有限公司 Fiscal control device
CN202600870U (en) * 2011-12-01 2012-12-12 航天信息股份有限公司 Fiscal apparatus based on fingerprint authentication
CN103927679A (en) * 2014-03-31 2014-07-16 浪潮软件集团有限公司 Electronic invoice signature and verification method
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN108830600A (en) * 2018-06-19 2018-11-16 方欣科技有限公司 A kind of electronic invoice system and implementation method based on block chain
CN111178989A (en) * 2019-12-05 2020-05-19 航天信息股份有限公司 Method and system for positioning taxpayer invoicing position

Similar Documents

Publication Publication Date Title
US11030338B2 (en) Selectively wiping a remote device
US11341092B2 (en) Method and system for applying data retention policies in a computing platform
US10609031B2 (en) Private consolidated cloud service architecture
JP6082166B2 (en) Multiple permission data security and access
JP2017174452A (en) Provision of enterprise application store
US20130263233A1 (en) Data access and control
US8307408B2 (en) System and method for file processing and file processing program
US9305146B2 (en) License management device, license management system, license management method, and program
US20190068568A1 (en) Distributed profile and key management
EP2689367B1 (en) Data protection using distributed security key
US20190065725A1 (en) Distributed profile and key management
CN112214798A (en) Billing encryption method and device, electronic equipment and storage medium
EP2940621B1 (en) Apparatus, system, and method for controlling encryption and decryption with respect to a key
US20170187531A1 (en) Providing encrypted personal data to applications based on established policies for release of the personal data
JP6778033B2 (en) Take-out file simple encryption system and take-out file simple encryption program
US10277565B2 (en) Enterprise service bus logging
US20230229816A1 (en) Enabling Secure Debug Logging
US20240048380A1 (en) Cryptography-as-a-Service
Pillai et al. Security for Cross-Tenant Access Control in Cloud Computing
CN114418657A (en) Method for acquiring billing data, electronic device and medium
CN114003336A (en) Method, device, equipment and medium for encrypting virtual machine in cloud platform
WO2022136559A1 (en) Data security methods
AU2021347175A1 (en) Encrypted file control
CN113946838A (en) Data sharing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination