CN112671714A - Access control method and system applied to tax control billing - Google Patents

Access control method and system applied to tax control billing Download PDF

Info

Publication number
CN112671714A
CN112671714A CN202011379407.1A CN202011379407A CN112671714A CN 112671714 A CN112671714 A CN 112671714A CN 202011379407 A CN202011379407 A CN 202011379407A CN 112671714 A CN112671714 A CN 112671714A
Authority
CN
China
Prior art keywords
tax control
control terminal
terminal equipment
tax
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011379407.1A
Other languages
Chinese (zh)
Other versions
CN112671714B (en
Inventor
周晚晴
靳石勇
魏贺生
洒西涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202011379407.1A priority Critical patent/CN112671714B/en
Publication of CN112671714A publication Critical patent/CN112671714A/en
Application granted granted Critical
Publication of CN112671714B publication Critical patent/CN112671714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an access control method and system applied to tax control billing, comprising the following steps: acquiring a feature code of the tax control terminal equipment to be accessed, and sending the feature code to the tax control terminal equipment to be accessed; encrypting the feature code to obtain a first primary key, and sending the primary key to a database corresponding to the tax control terminal equipment to be accessed; the tax control terminal equipment encrypts the feature code to obtain a second primary key, and when the second primary key is consistent with the stored access key of the tax control terminal equipment, the tax control terminal equipment to be accessed is determined to be allowed to be accessed; and the database corresponding to the tax control terminal equipment to be accessed encrypts the first primary key for the second time to obtain a secondary key, and when the secondary key is consistent with the stored database access key, the database corresponding to the tax control terminal equipment to be accessed is determined to be allowed to be accessed.

Description

Access control method and system applied to tax control billing
Technical Field
The invention relates to the technical field of tax affairs, in particular to an access control method and system applied to tax control invoicing.
Background
With the increase of the industries covered by the tax control business and the increase of the user scale of the invoicing software, the degree of the invoicing software to be paid is higher and higher; driven by benefits, lawless persons violently crack invoicing software through technical means to carry out virtual invoicing so as to achieve the purpose of tax evasion, and therefore the safety of the tax control invoicing system becomes very important. A traditional mode that a plurality of terminal devices share one secret key is used by a tax control billing terminal, and the mode has great potential safety hazards.
Patent No. CN201310640810.9 provides a solution for using a server to store a transmission key and a working key and send a random key and a sending key to a terminal, thereby solving the security problem of sharing one key by multiple terminals. However, all the keys are stored in the same database, and if the database is cracked, all the keys are leaked, and the true purpose of one secret per machine is not achieved. Patent No. CN201911326382.6 is a one-secret method implemented for a special storage medium, in which a terminal first generates a random number as a root key to be stored in a register, a server performs two interactions with the terminal to obtain two random numbers, compares the two random numbers, and if the two random numbers are the same, successfully binds the key. And clearing the root key after the data in the register is attacked. Although this scheme solves the problem that multiple terminals share the same key, it requires a specific storage medium to store data, and is not scalable.
Therefore, in order to ensure the security of the tax control billing system, a one-machine-one-secret solution with soft and hard combination and multiple security levels is needed.
Disclosure of Invention
The invention provides an access control method and system applied to tax control billing, and aims to solve the problem of how to improve the independence and the safety of tax control terminal equipment.
In order to solve the above-mentioned problems, according to an aspect of the present invention, there is provided an access control method applied to tax-controlled invoicing, the method including:
acquiring a feature code of the tax control terminal equipment to be accessed, and sending the feature code to the tax control terminal equipment to be accessed;
encrypting the feature code to obtain a first primary key, and sending the primary key to a database corresponding to the tax control terminal equipment to be accessed;
the tax control terminal equipment encrypts the feature code to obtain a second primary key, and when the second primary key is consistent with the stored access key of the tax control terminal equipment, the tax control terminal equipment to be accessed is determined to be allowed to be accessed;
and the database corresponding to the tax control terminal equipment to be accessed encrypts the first primary key for the second time to obtain a secondary key, and when the secondary key is consistent with the stored database access key, the database corresponding to the tax control terminal equipment to be accessed is determined to be allowed to be accessed.
Preferably, the tax control terminal device includes: a gold tax disk, a tax control disk or a tax Ukey.
Preferably, wherein the method further comprises:
the tax control terminal equipment generates and stores an access key of the tax control terminal equipment in advance according to the feature code;
the tax control billing software reads the feature code of the tax control terminal equipment for initialization, and generates account set information, wherein the account set information comprises a database corresponding to the tax control billing software;
and the database generates and stores a database access key in advance according to the feature code.
Preferably, the encryption method includes: MD5 encryption, SHA encryption, and hash encryption.
Preferably, the feature code of the tax control terminal device to be accessed is acquired by receiving a user request sent by a user directly or through an assembly message.
According to another aspect of the invention, there is provided an access control system for tax-controlled invoicing, the system comprising:
the characteristic code acquisition unit is used for acquiring the characteristic code of the tax control terminal equipment to be accessed and sending the characteristic code to the tax control terminal equipment to be accessed;
the characteristic code encryption unit is used for encrypting the characteristic code to obtain a first primary key and sending the primary key to a database corresponding to the tax control terminal equipment to be accessed;
the access control unit of the tax control terminal equipment is used for encrypting the feature code by the tax control terminal equipment to obtain a second primary key, and determining that the tax control terminal equipment to be accessed is allowed to be accessed when the second primary key is compared with the stored access key of the tax control terminal equipment;
and the database access control unit is used for carrying out secondary encryption on the first primary key by using the database corresponding to the tax control terminal equipment to be accessed so as to obtain a secondary key, and determining that the database corresponding to the tax control terminal equipment to be accessed is allowed to be accessed when the secondary key is compared with the stored database access key consistently.
Preferably, the tax control terminal device includes: a gold tax disk, a tax control disk or a tax Ukey.
Preferably, wherein the system further comprises:
the access control unit of the tax control terminal equipment is used for enabling the tax control terminal equipment to generate and store an access key of the tax control terminal equipment in advance according to the feature code;
the system comprises an initialization unit, a receiving unit and a processing unit, wherein the initialization unit is used for reading a feature code of tax control terminal equipment by tax control billing software for initialization and generating account set information, and the account set information comprises a database corresponding to the tax control billing software;
and the database access control unit is used for enabling the database to generate and store a database access key in advance according to the feature code.
Preferably, the encryption method includes: MD5 encryption, SHA encryption, and hash encryption.
Preferably, the feature code of the tax control terminal device to be accessed is acquired by receiving a user request sent by a user directly or through an assembly message.
The invention provides an access control method and system applied to tax control billing, wherein based on that each tax control terminal device comprises a feature code, the feature codes of different tax control terminal devices are different, the feature codes of the devices are encrypted to be used as a secret key for accessing tax control final end devices, so that the independence and the safety of each tax control terminal are ensured, and the one-machine one-secret function is realized; and generating a corresponding database for each tax control terminal device, encrypting the characteristic codes of the tax control terminal devices to generate keys, and storing the keys in the tax control terminal devices and the databases respectively, so that soft-hard combination and multi-security-level encryption are realized, and the security of the tax control billing system is greatly improved.
Drawings
A more complete understanding of exemplary embodiments of the present invention may be had by reference to the following drawings in which:
FIG. 1 is a flow diagram of an access control method 100 applied to tax-controlled invoicing, according to an embodiment of the invention;
FIG. 2 is a block diagram of an access control system architecture for tax-controlled invoicing applications, according to an embodiment of the present invention;
FIG. 3 is a flow chart of an access control method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an access control system 400 for tax-controlled invoicing according to an embodiment of the invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 is a flow chart of an access control method 100 applied to tax-controlled invoicing according to an embodiment of the invention. As shown in fig. 1, in the access control method applied to tax control invoicing provided by the embodiment of the present invention, based on that each tax control terminal device includes a feature code, and the feature codes of different types of tax control terminal devices are different, the feature code of the device is encrypted to serve as a secret key for accessing the tax control terminal device, so that the independence and the security of each tax control terminal are ensured, and a one-machine-one-secret function is realized; and generating a corresponding database for each tax control terminal device, encrypting the characteristic codes of the tax control terminal devices to generate keys, and storing the keys in the tax control terminal devices and the databases respectively, so that soft-hard combination and multi-security-level encryption are realized, and the security of the tax control billing system is greatly improved. The access control method 100 applied to tax-control invoicing provided by the embodiment of the invention starts from step 101, and obtains the feature code of the tax-control terminal device to be accessed in step 101, and sends the feature code to the tax-control terminal device to be accessed.
Preferably, the tax control terminal device includes: a gold tax disk, a tax control disk or a tax Ukey.
Preferably, the feature code of the tax control terminal device to be accessed is acquired by receiving a user request sent by a user directly or through an assembly message.
In step 102, the feature code is encrypted to obtain a first primary key, and the primary key is sent to a database corresponding to the tax control terminal device to be accessed.
In step 103, the fiscal terminal device encrypts the feature code to obtain a second primary key, and determines to allow access to the fiscal terminal device to be accessed when the second primary key is consistent with the stored access key of the fiscal terminal device.
In step 104, the database corresponding to the tax control terminal device to be accessed performs secondary encryption on the first primary key to obtain a secondary key, and when the secondary key is consistent with the stored database access key, it is determined that the database corresponding to the tax control terminal device to be accessed is allowed to be accessed.
Preferably, wherein the method further comprises:
the tax control terminal equipment generates and stores an access key of the tax control terminal equipment in advance according to the feature code;
the tax control billing software reads the feature code of the tax control terminal equipment for initialization, and generates account set information, wherein the account set information comprises a database corresponding to the tax control billing software;
and the database generates and stores a database access key in advance according to the feature code.
Preferably, the encryption method includes: MD5 encryption, SHA encryption, and hash encryption.
Fig. 2 is a block diagram of an access control system architecture for tax-controlled invoicing applications, according to an embodiment of the invention. As shown in fig. 2, the access control system includes: the system comprises value-added tax invoice tax control billing software, tax control terminal equipment and a database. The value-added tax invoice tax control billing software is a software system for value-added tax invoice billing, invoice information storage and invoice information acquisition. The user uses the tax control billing software to generate a user request through direct operation or assembly message, the tax control billing software encrypts the user request according to the corresponding characteristic code of the tax control terminal equipment to generate a primary key, sends the primary key to a database corresponding to the tax control terminal equipment, and sends the characteristic code of the tax control terminal equipment to the tax control terminal equipment so as to access the database and the tax control terminal equipment. The tax control terminal device is used for storing invoice information, tax control device information, user enterprise information and the like, the tax control terminal device carries out internal encryption processing on the received feature codes, if the encrypted secret key is the same as the password stored by the terminal device, access of tax control billing software is allowed, and otherwise, access is not allowed. The tax control terminal equipment can be a gold tax disk, a tax control disk or a tax Ukey. The database corresponds to the tax control terminal device one by one, a drive layer of the database carries out secondary encryption processing on the received feature codes to obtain a secondary key, if the secondary key is the same as a password stored in the database, the database can be accessed, otherwise, the access is not allowed.
The invention aims to provide a one-secret solution with multiple security levels for a tax control billing system. Each user corresponds to one terminal device, each terminal device corresponds to one database, and each group of terminal devices and the databases respectively store keys generated by corresponding terminal device feature codes. And the tax control billing software generates a secret key according to the characteristic code and respectively accesses the database and the terminal equipment according to the secret key. The method realizes the independence between different terminal devices, does not affect other terminal devices after the key of one terminal device is cracked, and greatly ensures the safety of the tax control billing system.
Fig. 3 is a flowchart of an access control method according to an embodiment of the present invention. As shown in fig. 3, the access control method includes:
s1, the tax control terminal device generates a key R1 according to the feature code and stores the key R1 in the device;
s2, operating tax control billing software, and inputting a user name and a password and an equipment password;
s3, the tax control billing system reads the characteristic code of the tax control terminal device for initialization, and generates account set information, wherein the account set information comprises a corresponding database;
s4, the drive of the database encrypts according to the feature code of the tax control terminal equipment to generate a key R2, and stores the key R2 in the database;
s5, the user sends a user request through the tax control billing software or the assembly message, and the user request contains the feature code of the corresponding tax control terminal equipment;
s6, tax control billing sends the feature code in the user request to the tax control terminal equipment, the feature code in the request is encrypted to generate a first primary key, and the first primary key is sent to the database;
s7, the tax control terminal device carries out internal encryption processing on the received feature code, acquires a second key K1 and compares the key K1 with the password R1 stored in the tax control terminal device, if the matching is successful, the access is allowed, otherwise, the access is not allowed;
and S8, the drive layer of the database carries out secondary encryption on the received first primary key to obtain a secondary key K2, the secondary key K2 is compared with the key R2 stored in the database, if the matching is successful, the access is allowed, otherwise, the access is not allowed.
The invention provides a software and hardware combined one-machine one-secret solution with multiple security levels aiming at the problem of potential safety hazard caused by the fact that the tax control terminal equipment and the database share one secret key in the tax control billing system, and the safety of the tax control billing system is greatly improved by accessing the tax control terminal equipment and the database through the secret key generated by encrypting the characteristic code of the tax control terminal equipment.
Fig. 4 is a schematic diagram of an access control system 400 for tax-controlled invoicing according to an embodiment of the invention. As shown in fig. 4, an access control system 400 applied to tax-controlled invoicing according to an embodiment of the present invention includes: a feature code acquisition unit 401, a feature code encryption unit 402, a tax control terminal device access control unit 403, and a database access control unit 404.
Preferably, the feature code obtaining unit 401 is configured to obtain a feature code of a to-be-accessed tax control terminal device, and send the feature code to the to-be-accessed tax control terminal device.
Preferably, the tax control terminal device includes: a gold tax disk, a tax control disk or a tax Ukey.
Preferably, the feature code of the tax control terminal device to be accessed is acquired by receiving a user request sent by a user directly or through an assembly message.
Preferably, the feature code encryption unit 402 is configured to encrypt the feature code to obtain a first primary key, and send the first primary key to a database corresponding to the fiscal terminal device to be accessed.
Preferably, the access control unit 403 of the fiscal terminal device is configured to encrypt the feature code by the fiscal terminal device to obtain a second primary key, and determine that the fiscal terminal device to be accessed is allowed to be accessed when the second primary key is consistent with the stored access key of the fiscal terminal device.
Preferably, the database access control unit 404 is configured to perform secondary encryption on the first primary key by using the database corresponding to the tax control terminal device to be accessed, so as to obtain a secondary key, and determine that the database corresponding to the tax control terminal device to be accessed is allowed to be accessed when the secondary key is consistent with the stored database access key.
Preferably, wherein the system further comprises:
the access control unit of the tax control terminal equipment is used for enabling the tax control terminal equipment to generate and store an access key of the tax control terminal equipment in advance according to the feature code;
the system comprises an initialization unit, a receiving unit and a processing unit, wherein the initialization unit is used for reading a feature code of tax control terminal equipment by tax control billing software for initialization and generating account set information, and the account set information comprises a database corresponding to the tax control billing software;
and the database access control unit is used for enabling the database to generate and store a database access key in advance according to the feature code.
Preferably, the encryption method includes: MD5 encryption, SHA encryption, and hash encryption.
The access control system 400 applied to tax-controlled invoicing according to the embodiment of the present invention corresponds to the access control method 100 applied to tax-controlled invoicing according to another embodiment of the present invention, and is not described herein again.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [ device, component, etc ]" are to be interpreted openly as referring to at least one instance of said device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (10)

1. An access control method for tax-controlled invoicing, the method comprising:
acquiring a feature code of the tax control terminal equipment to be accessed, and sending the feature code to the tax control terminal equipment to be accessed;
encrypting the feature code to obtain a first primary key, and sending the primary key to a database corresponding to the tax control terminal equipment to be accessed;
the tax control terminal equipment encrypts the feature code to obtain a second primary key, and when the second primary key is consistent with the stored access key of the tax control terminal equipment, the tax control terminal equipment to be accessed is determined to be allowed to be accessed;
and the database corresponding to the tax control terminal equipment to be accessed encrypts the first primary key for the second time to obtain a secondary key, and when the secondary key is consistent with the stored database access key, the database corresponding to the tax control terminal equipment to be accessed is determined to be allowed to be accessed.
2. The method of claim 1, wherein the tax-controlled terminal device comprises: a gold tax disk, a tax control disk or a tax Ukey.
3. The method of claim 1, further comprising:
the tax control terminal equipment generates and stores an access key of the tax control terminal equipment in advance according to the feature code;
the tax control billing software reads the feature code of the tax control terminal equipment for initialization, and generates account set information, wherein the account set information comprises a database corresponding to the tax control billing software;
and the database generates and stores a database access key in advance according to the feature code.
4. The method of claim 1, wherein the encryption scheme comprises: MD5 encryption, SHA encryption, and hash encryption.
5. The method according to claim 1, characterized in that the signature of the fiscal terminal device to be accessed is obtained by receiving a user request sent directly by the user or sent by means of an assembly message.
6. An access control system for tax-controlled invoicing, the system comprising:
the characteristic code acquisition unit is used for acquiring the characteristic code of the tax control terminal equipment to be accessed and sending the characteristic code to the tax control terminal equipment to be accessed;
the characteristic code encryption unit is used for encrypting the characteristic code to obtain a first primary key and sending the primary key to a database corresponding to the tax control terminal equipment to be accessed;
the access control unit of the tax control terminal equipment is used for encrypting the feature code by the tax control terminal equipment to obtain a second primary key, and determining that the tax control terminal equipment to be accessed is allowed to be accessed when the second primary key is compared with the stored access key of the tax control terminal equipment;
and the database access control unit is used for carrying out secondary encryption on the first primary key by using the database corresponding to the tax control terminal equipment to be accessed so as to obtain a secondary key, and determining that the database corresponding to the tax control terminal equipment to be accessed is allowed to be accessed when the secondary key is compared with the stored database access key consistently.
7. The system of claim 6, wherein the tax control terminal device comprises: a gold tax disk, a tax control disk or a tax Ukey.
8. The system of claim 6, further comprising:
the access control unit of the tax control terminal equipment is used for enabling the tax control terminal equipment to generate and store an access key of the tax control terminal equipment in advance according to the feature code;
the system comprises an initialization unit, a receiving unit and a processing unit, wherein the initialization unit is used for reading a feature code of tax control terminal equipment by tax control billing software for initialization and generating account set information, and the account set information comprises a database corresponding to the tax control billing software;
and the database access control unit is used for enabling the database to generate and store a database access key in advance according to the feature code.
9. The system of claim 6, wherein the encryption scheme comprises: MD5 encryption, SHA encryption, and hash encryption.
10. The system according to claim 6, wherein the signature code of the fiscal terminal device to be accessed is obtained by receiving a user request sent directly by the user or sent by the assembly message.
CN202011379407.1A 2020-11-30 2020-11-30 Access control method and system applied to tax control billing Active CN112671714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011379407.1A CN112671714B (en) 2020-11-30 2020-11-30 Access control method and system applied to tax control billing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011379407.1A CN112671714B (en) 2020-11-30 2020-11-30 Access control method and system applied to tax control billing

Publications (2)

Publication Number Publication Date
CN112671714A true CN112671714A (en) 2021-04-16
CN112671714B CN112671714B (en) 2023-01-10

Family

ID=75403035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011379407.1A Active CN112671714B (en) 2020-11-30 2020-11-30 Access control method and system applied to tax control billing

Country Status (1)

Country Link
CN (1) CN112671714B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1374607A (en) * 2001-03-08 2002-10-16 深圳市金大陆通信技术有限公司 Value added tax invoice making, confirming and checking method and its information management system
CN1489097A (en) * 2002-11-25 2004-04-14 华旭金卡股份有限公司 Value-added tax (general taxpayer) information management system
CN106097027A (en) * 2016-06-13 2016-11-09 浪潮软件集团有限公司 Tax control disk remote invoicing system and implementation method thereof
US20160351080A1 (en) * 2012-12-31 2016-12-01 Piyush Bhatnagar System, Design and Process for Secure Documents Credentials Management Using Out-of-Band Authentication
CN111614686A (en) * 2020-05-26 2020-09-01 牛津(海南)区块链研究院有限公司 Key management method, controller and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1374607A (en) * 2001-03-08 2002-10-16 深圳市金大陆通信技术有限公司 Value added tax invoice making, confirming and checking method and its information management system
CN1489097A (en) * 2002-11-25 2004-04-14 华旭金卡股份有限公司 Value-added tax (general taxpayer) information management system
US20160351080A1 (en) * 2012-12-31 2016-12-01 Piyush Bhatnagar System, Design and Process for Secure Documents Credentials Management Using Out-of-Band Authentication
CN106097027A (en) * 2016-06-13 2016-11-09 浪潮软件集团有限公司 Tax control disk remote invoicing system and implementation method thereof
CN111614686A (en) * 2020-05-26 2020-09-01 牛津(海南)区块链研究院有限公司 Key management method, controller and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王飞: "银行代理财政非税收入系统的设计和开发", 《中国金融电脑》 *

Also Published As

Publication number Publication date
CN112671714B (en) 2023-01-10

Similar Documents

Publication Publication Date Title
CN111783075B (en) Authority management method, device and medium based on secret key and electronic equipment
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
EP2301185B1 (en) Format-preserving cryptographic systems
US9208491B2 (en) Format-preserving cryptographic systems
CN100545852C (en) Verification System and authentication method
US11488134B2 (en) Format-preserving cryptographic systems
CN117579281A (en) Method and system for ownership verification using blockchain
US20080082836A1 (en) Method and apparatus for data protection
CN106506159A (en) Encryption method and equipment for key safety
US8601553B1 (en) Techniques of imposing access control policies
US10885516B2 (en) Secure validation using hardware security modules
CN114186264A (en) Data random encryption and decryption method, device and system
CN112738051A (en) Data information encryption method, system and computer readable storage medium
CN1371059A (en) Data releasing system
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN114372242A (en) Ciphertext data processing method, authority management server and decryption server
CN108650214B (en) Dynamic page encryption anti-unauthorized method and device
CN114422143A (en) Artificial intelligence based dynamic data encryption method, device, equipment and medium
CN1599313A (en) Password dynamic enciphering inputmethod of public emipering mode
GB2479074A (en) A key server selects policy rules to apply to a key request based on an identifier included in the request
CN109547404B (en) Data acquisition method and server
CN112671714B (en) Access control method and system applied to tax control billing
US20230107805A1 (en) Security System
JPWO2011058629A1 (en) Information management system
CN112580003B (en) Permission control method and server based on BS architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant