CN111210287A - Tax UKey-based invoicing method and system - Google Patents
Tax UKey-based invoicing method and system Download PDFInfo
- Publication number
- CN111210287A CN111210287A CN201911369563.7A CN201911369563A CN111210287A CN 111210287 A CN111210287 A CN 111210287A CN 201911369563 A CN201911369563 A CN 201911369563A CN 111210287 A CN111210287 A CN 111210287A
- Authority
- CN
- China
- Prior art keywords
- enterprise
- personal
- ukey
- certificate
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 claims abstract description 16
- 238000012790 confirmation Methods 0.000 claims description 12
- 238000010200 validation analysis Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 2
- 239000010931 gold Substances 0.000 description 2
- 229910052737 gold Inorganic materials 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
- G06Q40/123—Tax preparation or submission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Abstract
The invention discloses an invoicing method and system based on a tax UKey, and belongs to the technical field of tax informatization. Applying for a tax UKey meeting the regulation for individuals/enterprises; confirming the personal/enterprise information through the authentication code and correlating; submitting a certificate application request; generating a cloud billing certificate; storing the cloud billing certificate to a security zone of the server; after confirming the identity of the individual/enterprise; verifying the ciphertext signature, and encrypting the ciphertext by using a component key stored by the server after the verification is passed; decrypting the ciphertext by using the tax Ukey and the component key stored by the server to obtain decryption information, and storing the decryption information in a security area of the server; receiving an invoice issuing request of an individual/enterprise, authenticating the real name of the individual/enterprise, and issuing an invoice after the authentication is passed and the signature of a cloud invoice issuing certificate. The invention solves the problems of complicated invoice issuing process, high cost and low safety.
Description
Technical Field
The invention relates to the technical field of tax informatization, in particular to a method and a system for issuing an invoice based on a tax UKey.
Background
For invoicing of medium and small enterprises, the most outstanding characteristics require convenient invoicing, low cost and good safety, but most methods are complicated in procedure, low safety and high cost for invoicing of medium and small enterprises in the market at present.
At present, tax control devices are provided with a gold tax disk, a tax control disk, a tax UKey, a tax control server and other forms, but for medium and small enterprises, the gold tax disk, the tax control disk and the tax UKey are required to be carried and used for issuing invoices, which brings great inconvenience to issuing invoices of users.
Because the drawer is inconvenient to draw out when going out, on business trip, on vacation, etc., and the tax control device is not delivered to other people in time, the development of business is influenced.
Disclosure of Invention
In order to solve the problems, the invention provides an invoicing method based on a taxation UKey, which comprises the following steps:
applying for a person/enterprise for a tax UKey which conforms to the regulation, registering personal/enterprise information in the tax UKey, and generating an authentication code according to the personal/enterprise information;
confirming the personal/enterprise information through the authentication code and correlating;
receiving a personal/enterprise certificate application request, acquiring personal/enterprise confirmation information and a digital signature, and submitting the certificate application request;
after the certificate application request is verified, generating a cloud billing certificate, encrypting the cloud billing certificate and generating a secret key;
decrypting the encrypted cloud billing certificate by using the secret key to obtain the cloud billing certificate, and storing the cloud billing certificate to a security area of the server;
receiving a personal/enterprise identity confirmation request, generating a personal/user component key after confirming the personal/enterprise identity, and storing the component key to the tax Ukey and the server at the same time;
acquiring a cipher text and a cipher text signature encrypted by using a component key stored by a tax Ukey of a person/enterprise, verifying the cipher text signature, and encrypting the cipher text by using the component key stored by a server after the verification is passed;
decrypting the ciphertext by using the tax Ukey and the component key stored by the server to obtain decryption information, and storing the decryption information in a security area of the server;
receiving an invoice issuing request of an individual/enterprise, authenticating the real name of the individual/enterprise, and issuing an invoice after the authentication is passed and the signature of a cloud invoice issuing certificate.
Optionally, the invoice request is generated using a validation code or a tax UKey.
Optionally, the decrypting information includes: the internal private key of UKey and corporate/personal information.
Optionally, the ciphertext encrypted by using the component key stored in the tax Ukey includes: the internal private key of UKey and corporate/personal information.
Optionally, the secure area of the server includes: a secure area of the server and an encryption card.
Optionally, the authentication code includes: the two-dimension code, the token code and the short message verification code.
The invention also provides an invoicing system based on the taxation UKey, which comprises the following steps:
the system comprises a receiving request module, a receiving module and a sending module, wherein the receiving request module applies for a person/enterprise to a tax UKey which conforms to the regulation, registers personal/enterprise information in the tax UKey, generates an authentication code according to the personal/enterprise information, confirms the personal/enterprise information through the authentication code, associates the personal/enterprise information, receives a certificate application request of the person/enterprise, acquires the personal/enterprise confirmation information and a digital signature, and submits the certificate application request;
the verification module is used for generating a cloud invoicing certificate after the certificate application request is verified, encrypting the cloud invoicing certificate and generating a secret key, decrypting the encrypted cloud invoicing certificate by using the secret key to obtain the cloud invoicing certificate, storing the cloud invoicing certificate in a security area of the server, receiving a personal/enterprise identity confirmation request, generating a personal/user component secret key after confirming the personal/enterprise identity, and storing the component secret key to the taxation Ukey and the server at the same time;
the encryption module is used for acquiring a ciphertext and a ciphertext signature encrypted by using the component key stored by the taxation Ukey of a person/enterprise, verifying the ciphertext signature, encrypting the ciphertext by using the component key stored by the server after the verification is passed, decrypting the ciphertext by using the taxation Ukey and the component key stored by the server, acquiring decryption information and storing the decryption information in a security area of the server;
and the invoicing module is used for receiving an invoicing request of an individual/enterprise, authenticating the individual/enterprise with a real name, and after the authentication is passed, performing invoicing after being signed by a cloud invoicing certificate.
Optionally, the invoice request is generated using a validation code or a tax UKey.
Optionally, the decrypting information includes: the internal private key of UKey and corporate/personal information.
Optionally, the ciphertext encrypted by using the component key stored in the tax Ukey includes: the internal private key of UKey and corporate/personal information.
Optionally, the secure area of the server includes: a secure area of the server and an encryption card.
Optionally, the authentication code includes: the two-dimension code, the token code and the short message verification code.
The invention can effectively reduce the dependence of invoice issuing on tax UKEY, thereby providing a possibility for solving multi-scene convenient and fast invoicing, ensuring that the invoicing of a user is no longer restricted to the scene only using UKEY, and providing more invoicing modes for the user to a great extent, thereby effectively improving the efficiency in transaction, and solving the problems of complicated invoice issuing process, high cost and low safety.
Drawings
FIG. 1 is a flow chart of a method for invoicing based on a tax UKey of the present invention;
fig. 2 is a diagram of a system for issuing an invoice based on a taxation UKey of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
The invention provides an invoicing method based on a tax UKey, which comprises the following steps as shown in figure 1:
applying for a person/enterprise for a tax UKey which conforms to the regulation, registering personal/enterprise information in the tax UKey, and generating an authentication code according to the personal/enterprise information;
an authentication code comprising: the two-dimension code, the token code and the short message verification code.
Confirming the personal/enterprise information through the authentication code and correlating;
receiving a personal/enterprise certificate application request, acquiring personal/enterprise confirmation information and a digital signature, and submitting the certificate application request;
after the certificate application request is verified, generating a cloud billing certificate, encrypting the cloud billing certificate and generating a secret key;
decrypting the encrypted cloud billing certificate by using the secret key to obtain the cloud billing certificate, and storing the cloud billing certificate to a security area of the server;
a secure area of a server comprising: a secure area of the server and an encryption card.
Receiving a personal/enterprise identity confirmation request, generating a personal/user component key after confirming the personal/enterprise identity, and storing the component key to the tax Ukey and the server at the same time;
acquiring a cipher text and a cipher text signature encrypted by using a component key stored by a tax Ukey of a person/enterprise, verifying the cipher text signature, and encrypting the cipher text by using the component key stored by a server after the verification is passed;
decrypting the ciphertext by using the tax Ukey and the component key stored by the server to obtain decryption information, and storing the decryption information in a security area of the server;
the ciphertext encrypted by using the component key stored in the tax Ukey comprises the following steps: the internal private key of UKey and corporate/personal information.
Decryption information, comprising: the internal private key of UKey and corporate/personal information.
Receiving an invoice issuing request of an individual/enterprise, authenticating the real name of the individual/enterprise, and issuing an invoice after the authentication is passed and the signature of a cloud invoice issuing certificate.
An invoice request is issued, generated using a validation code or a tax UKey.
The invention also provides an invoicing system 200 based on the taxation UKey, as shown in FIG. 2, comprising:
a request receiving module 201, which applies for a tax UKey meeting the regulations for a person/enterprise, registers the personal/enterprise information in the tax UKey, generates an authentication code according to the personal/enterprise information, confirms the personal/enterprise information through the authentication code, associates the personal/enterprise information, receives a certificate application request of the person/enterprise, and submits the certificate application request after acquiring the personal/enterprise confirmation information and a digital signature;
an authentication code comprising: the two-dimension code, the token code and the short message verification code.
The verification module 202 is used for generating a cloud invoicing certificate after the certificate application request is verified, encrypting the cloud invoicing certificate and generating a secret key, decrypting the encrypted cloud invoicing certificate by using the secret key to obtain the cloud invoicing certificate, storing the cloud invoicing certificate in a security area of the server, receiving a personal/enterprise identity confirmation request, generating a personal/user component secret key after the personal/enterprise identity is confirmed, and storing the component secret key to the tax Ukey and the server at the same time;
a secure area of a server comprising: a secure area of the server and an encryption card.
The encryption module 203 is used for acquiring the ciphertext and the ciphertext signature encrypted by using the component key stored by the taxation Ukey of the individual/enterprise, verifying the ciphertext signature, encrypting the ciphertext by using the component key stored by the server after the verification is passed, decrypting the ciphertext by using the taxation Ukey and the component key stored by the server, acquiring decryption information, and storing the decryption information in a security area of the server;
decryption information, comprising: the internal private key of UKey and corporate/personal information.
The ciphertext encrypted by using the component key stored in the tax Ukey comprises the following steps: the internal private key of UKey and corporate/personal information.
The invoicing module 204 receives an invoicing request of an individual/enterprise, authenticates the real name of the individual/enterprise, signs through a cloud invoicing certificate after the authentication is passed, and then invoices.
An invoice request is issued, generated using a validation code or a tax UKey.
The invention can effectively reduce the dependence of invoice issuing on tax UKEY, thereby providing a possibility for solving multi-scene convenient and fast invoicing, ensuring that the invoicing of a user is no longer restricted to the scene only using UKEY, and providing more invoicing modes for the user to a great extent, thereby effectively improving the efficiency in transaction, and solving the problems of complicated invoice issuing process, high cost and low safety.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.
Claims (12)
1. A method of invoicing based on a tax UKey, the method comprising:
applying for a person/enterprise for a tax UKey which conforms to the regulation, registering personal/enterprise information in the tax UKey, and generating an authentication code according to the personal/enterprise information;
confirming the personal/enterprise information through the authentication code and correlating;
receiving a personal/enterprise certificate application request, acquiring personal/enterprise confirmation information and a digital signature, and submitting the certificate application request;
after the certificate application request is verified, generating a cloud billing certificate, encrypting the cloud billing certificate and generating a secret key;
decrypting the encrypted cloud billing certificate by using the secret key to obtain the cloud billing certificate, and storing the cloud billing certificate to a security area of the server;
receiving a personal/enterprise identity confirmation request, generating a personal/user component key after confirming the personal/enterprise identity, and storing the component key to the tax Ukey and the server at the same time;
acquiring a cipher text and a cipher text signature encrypted by using a component key stored by a tax Ukey of a person/enterprise, verifying the cipher text signature, and encrypting the cipher text by using the component key stored by a server after the verification is passed;
decrypting the ciphertext by using the tax Ukey and the component key stored by the server to obtain decryption information, and storing the decryption information in a security area of the server;
receiving an invoice issuing request of an individual/enterprise, authenticating the real name of the individual/enterprise, and issuing an invoice after the authentication is passed and the signature of a cloud invoice issuing certificate.
2. The method of claim 1, the invoicing request generated using a validation code or a tax UKey.
3. The method of claim 1, the decryption information comprising: the internal private key of UKey and corporate/personal information.
4. The method of claim 1, the ciphertext encrypted using the component key stored for taxation Ukey, comprising: the internal private key of UKey and corporate/personal information.
5. The method of claim 1, the secure zone of the server, comprising: a secure area of the server and an encryption card.
6. The method of claim 1, the authentication code, comprising: the two-dimension code, the token code and the short message verification code.
7. A tax UKey-based invoicing system, the system comprising:
the system comprises a receiving request module, a receiving module and a sending module, wherein the receiving request module applies for a person/enterprise to a tax UKey which conforms to the regulation, registers personal/enterprise information in the tax UKey, generates an authentication code according to the personal/enterprise information, confirms the personal/enterprise information through the authentication code, associates the personal/enterprise information, receives a certificate application request of the person/enterprise, acquires the personal/enterprise confirmation information and a digital signature, and submits the certificate application request;
the verification module is used for generating a cloud invoicing certificate after the certificate application request is verified, encrypting the cloud invoicing certificate and generating a secret key, decrypting the encrypted cloud invoicing certificate by using the secret key to obtain the cloud invoicing certificate, storing the cloud invoicing certificate in a security area of the server, receiving a personal/enterprise identity confirmation request, generating a personal/user component secret key after confirming the personal/enterprise identity, and storing the component secret key to the taxation Ukey and the server at the same time;
the encryption module is used for acquiring a ciphertext and a ciphertext signature encrypted by using the component key stored by the taxation Ukey of a person/enterprise, verifying the ciphertext signature, encrypting the ciphertext by using the component key stored by the server after the verification is passed, decrypting the ciphertext by using the taxation Ukey and the component key stored by the server, acquiring decryption information and storing the decryption information in a security area of the server;
and the invoicing module is used for receiving an invoicing request of an individual/enterprise, authenticating the individual/enterprise with a real name, and after the authentication is passed, performing invoicing after being signed by a cloud invoicing certificate.
8. The system of claim 7, the invoicing request generated using a validation code or a tax UKey.
9. The system of claim 7, the decryption information comprising: the internal private key of UKey and corporate/personal information.
10. The system of claim 7, the ciphertext encrypted using the component key stored for taxation Ukey, comprising: the internal private key of UKey and corporate/personal information.
11. The system of claim 7, the secure zone of the server, comprising: a secure area of the server and an encryption card.
12. The system of claim 7, the authentication code, comprising: the two-dimension code, the token code and the short message verification code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911369563.7A CN111210287A (en) | 2019-12-26 | 2019-12-26 | Tax UKey-based invoicing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911369563.7A CN111210287A (en) | 2019-12-26 | 2019-12-26 | Tax UKey-based invoicing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111210287A true CN111210287A (en) | 2020-05-29 |
Family
ID=70789371
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911369563.7A Pending CN111210287A (en) | 2019-12-26 | 2019-12-26 | Tax UKey-based invoicing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111210287A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111917881A (en) * | 2020-08-05 | 2020-11-10 | 广东巴金斯科技有限公司 | Cross-border e-commerce local signing method, device, equipment and system |
CN113256360A (en) * | 2021-07-07 | 2021-08-13 | 深圳高灯计算机科技有限公司 | Invoice processing control method, device, equipment and storage medium based on Ukey cabinet |
CN113868699A (en) * | 2021-08-30 | 2021-12-31 | 苏州浪潮智能科技有限公司 | UKey-based personal information protection method and system |
CN113890871A (en) * | 2021-09-03 | 2022-01-04 | 青岛微智慧信息有限公司 | Security solution method for tax batch invoicing in docking of flexible work platform and server side thereof |
CN115037539A (en) * | 2022-06-07 | 2022-09-09 | 深圳微众信用科技股份有限公司 | Invoice inquiry method, device, equipment and storage medium based on tax control equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103870983A (en) * | 2014-02-28 | 2014-06-18 | 浪潮软件集团有限公司 | Electronic invoice safety management service system based on cloud computing and cryptographic technology |
CN103914925A (en) * | 2012-12-30 | 2014-07-09 | 航天信息股份有限公司 | Method and system for controlling offline issuing of network invoice |
CN104574176A (en) * | 2015-01-14 | 2015-04-29 | 浪潮软件集团有限公司 | USBKEY-based secure online tax declaration method |
CN204835646U (en) * | 2015-08-18 | 2015-12-02 | 武汉信安珞珈科技有限公司 | But authentication equipment of charge -discharge |
CN105631721A (en) * | 2015-12-30 | 2016-06-01 | 北京瑞宏科技有限公司 | Method and system for issuing electronic invoice based on electronic commerce cloud platform |
CN107146120A (en) * | 2017-04-25 | 2017-09-08 | 大象慧云信息技术有限公司 | The generation method and generating means of electronic invoice |
CN108717650A (en) * | 2018-06-08 | 2018-10-30 | 山东金三利信息技术有限公司 | A kind of invoice applies for self-aid system on the net |
CN109670879A (en) * | 2018-12-25 | 2019-04-23 | 航天信息股份有限公司 | A kind of distribution billing method and system |
CN109981277A (en) * | 2017-12-27 | 2019-07-05 | 航天信息股份有限公司 | A kind of couple of USBKey carries out the method and system of automatic safety authentication |
-
2019
- 2019-12-26 CN CN201911369563.7A patent/CN111210287A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103914925A (en) * | 2012-12-30 | 2014-07-09 | 航天信息股份有限公司 | Method and system for controlling offline issuing of network invoice |
CN103870983A (en) * | 2014-02-28 | 2014-06-18 | 浪潮软件集团有限公司 | Electronic invoice safety management service system based on cloud computing and cryptographic technology |
CN104574176A (en) * | 2015-01-14 | 2015-04-29 | 浪潮软件集团有限公司 | USBKEY-based secure online tax declaration method |
CN204835646U (en) * | 2015-08-18 | 2015-12-02 | 武汉信安珞珈科技有限公司 | But authentication equipment of charge -discharge |
CN105631721A (en) * | 2015-12-30 | 2016-06-01 | 北京瑞宏科技有限公司 | Method and system for issuing electronic invoice based on electronic commerce cloud platform |
CN107146120A (en) * | 2017-04-25 | 2017-09-08 | 大象慧云信息技术有限公司 | The generation method and generating means of electronic invoice |
CN109981277A (en) * | 2017-12-27 | 2019-07-05 | 航天信息股份有限公司 | A kind of couple of USBKey carries out the method and system of automatic safety authentication |
CN108717650A (en) * | 2018-06-08 | 2018-10-30 | 山东金三利信息技术有限公司 | A kind of invoice applies for self-aid system on the net |
CN109670879A (en) * | 2018-12-25 | 2019-04-23 | 航天信息股份有限公司 | A kind of distribution billing method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111917881A (en) * | 2020-08-05 | 2020-11-10 | 广东巴金斯科技有限公司 | Cross-border e-commerce local signing method, device, equipment and system |
CN111917881B (en) * | 2020-08-05 | 2022-11-15 | 广东巴金斯科技有限公司 | Cross-border e-commerce local signing method, device, equipment and system |
CN113256360A (en) * | 2021-07-07 | 2021-08-13 | 深圳高灯计算机科技有限公司 | Invoice processing control method, device, equipment and storage medium based on Ukey cabinet |
CN113868699A (en) * | 2021-08-30 | 2021-12-31 | 苏州浪潮智能科技有限公司 | UKey-based personal information protection method and system |
CN113868699B (en) * | 2021-08-30 | 2023-08-22 | 苏州浪潮智能科技有限公司 | UKey-based personal information protection method and system |
CN113890871A (en) * | 2021-09-03 | 2022-01-04 | 青岛微智慧信息有限公司 | Security solution method for tax batch invoicing in docking of flexible work platform and server side thereof |
CN115037539A (en) * | 2022-06-07 | 2022-09-09 | 深圳微众信用科技股份有限公司 | Invoice inquiry method, device, equipment and storage medium based on tax control equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11799668B2 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
US11777726B2 (en) | Methods and systems for recovering data using dynamic passwords | |
US11544367B2 (en) | Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual | |
US11743041B2 (en) | Technologies for private key recovery in distributed ledger systems | |
US11868997B2 (en) | Secure payments using a mobile wallet application | |
US20220231857A1 (en) | Hash-based data verification system | |
US11949791B2 (en) | Hash contract generation and verification system | |
CN111210287A (en) | Tax UKey-based invoicing method and system | |
WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
KR102381153B1 (en) | Encryption key management based on identity information | |
US9900148B1 (en) | System and method for encryption | |
KR20140035775A (en) | Payment method, server performing the same, storage media storing the same and system performing the same | |
CN101335754B (en) | Method for information verification using remote server | |
WO2020042508A1 (en) | Method, system and electronic device for processing claim incident based on blockchain | |
CN102693478A (en) | Trading method of bid security during bidding procedure and system thereof | |
KR101979337B1 (en) | Apparatus and method for certification | |
TWI638326B (en) | Method of prelogin preview for online bank and system thereof | |
US11671475B2 (en) | Verification of data recipient | |
WO2017107642A1 (en) | Text processing method, apparatus and system for secure input method | |
JP2002352146A (en) | Method, system and program for charging contents parts and storage medium with contents parts charging program stored therein | |
TWI677842B (en) | System for assisting a financial card holder in setting password for the first time and method thereof | |
CN110189184A (en) | A kind of electronic invoice storage method and device | |
Sowers | Architecture for Issuing DoD Mobile Derived Credentials |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200529 |