CN114331652A - Artificial intelligence accounting method and system for providing finance and tax service - Google Patents

Artificial intelligence accounting method and system for providing finance and tax service Download PDF

Info

Publication number
CN114331652A
CN114331652A CN202111613023.6A CN202111613023A CN114331652A CN 114331652 A CN114331652 A CN 114331652A CN 202111613023 A CN202111613023 A CN 202111613023A CN 114331652 A CN114331652 A CN 114331652A
Authority
CN
China
Prior art keywords
verification
signature information
account
bookkeeper
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111613023.6A
Other languages
Chinese (zh)
Inventor
徐素钏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Xiulai Intelligent Technology Co ltd
Original Assignee
Hefei Xiulai Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Xiulai Intelligent Technology Co ltd filed Critical Hefei Xiulai Intelligent Technology Co ltd
Priority to CN202111613023.6A priority Critical patent/CN114331652A/en
Publication of CN114331652A publication Critical patent/CN114331652A/en
Withdrawn legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to the field of finance and tax service, and discloses an artificial intelligent accounting method for providing finance and tax service, which comprises the following steps: acquiring a login account, wherein the login account comprises pinyin of an bookkeeper; obtaining verification data of the bookkeeper, wherein the verification data comprises a public key and a verification address of the bookkeeper; judging whether the public key is matched with the pinyin or not; if the public key is successfully matched with the pinyin, entering a verification address; extracting signature information of a bookkeeping book of a bookkeeper in the verification address; sending the signature information to an account-keeping person for verification; and if the verification is successful, obtaining the private key of the account-keeping person, wherein the private key is used for inputting a password bar of the login interface. This application has solved among the prior art if account book login password is revealed at will, influences the technical problem of the security of account book, has realized that the login process has carried out twice and has verified to verify the basis for the second time and realize the page login based on account booker's book keeping, with the security that improves the account book, reduce and cause loss of property to individual or company.

Description

Artificial intelligence accounting method and system for providing finance and tax service
Technical Field
The application relates to the field of finance and tax services, in particular to an artificial intelligence accounting method and system for providing finance and tax services.
Background
The accounting is to record all economic services generated by an enterprise and public institution or a personal family on an account book by using a certain accounting method; the method is characterized in that according to original vouchers and bookkeeping vouchers which are checked to be correct, and accounting subjects specified by a national unified accounting system are used, and a compound bookkeeping method is used for sequentially and classically registering economic businesses in an account book. However, with the continuous development and expansion of the technology of the internet of things and the market scale thereof, more and more merchants and enterprises use the internet of things to carry out intelligent billing, and the traditional manual hand-written billing method is replaced.
However, by using the intelligent accounting method, any person can log in the login interface of the accounting book, but the account book of the person or the company is a private article, and if the login password of the account book is randomly leaked, the security of the account book is affected, certain loss is caused to the property of the person or the company, and the market economy is damaged.
Disclosure of Invention
The embodiment of the application provides the artificial intelligence accounting method and system for providing the finance and tax service, solves the technical problem that in the prior art, if the account book login password is randomly revealed, the safety of the account book is affected, and realizes page login according to the signature information of the account book of an accounting person, so that the safety of the account book is improved, and property loss of individuals or companies is reduced.
The embodiment of the application provides an artificial intelligence accounting method for providing finance and tax service, which comprises the following steps: acquiring a login account, wherein the login account comprises pinyin of an bookkeeper; acquiring verification data of the account-keeping person, wherein the verification data comprises a public key and a verification address of the account-keeping person; judging whether the public key is matched with the pinyin or not; if the public key is successfully matched with the pinyin, entering the verification address; extracting signature information of an account book of the account-keeping person in the verification address; sending the signature information to the accountant for verification; and if the verification is successful, obtaining the private key of the bookkeeper, wherein the private key is used for inputting a password bar of a login interface.
Further, if the public key and the pinyin are failed to be matched, a verification result is sent to the bookkeeper, so that the bookkeeper can resend verification data.
Further, the sending the signature information to the biller for verification includes: acquiring a length value and a timestamp of the signature information; comparing whether the length value of the signature information accords with a preset length value; comparing whether the timestamp of the signature information accords with a preset timestamp; and if the length value of the signature information accords with a preset length value and the timestamp of the signature information accords with a preset timestamp, the verification is determined to be successful.
Further, the public key and the private key are both generated by an encryption chip at the service end of the account-keeping person after the login account number is obtained.
Further, the public key and the private key are generated in an offline state.
The application also provides an artificial intelligence accounting system for providing finance and tax service, accounting system includes: the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is configured to acquire a login account, and the login account comprises pinyin of an bookkeeper; a second acquisition unit configured to acquire verification data of the bookkeeper, the verification data including a public key and a verification address of the bookkeeper; a judging unit configured to judge whether the public key matches the pinyin; the entering unit is configured to enter the verification address if the public key is successfully matched with the pinyin; an extracting unit configured to extract signature information of an account book of the account taker in the verification address; a verification unit configured to send the signature information to the biller for verification; the third obtaining unit is configured to obtain a private key of the bookkeeper if the verification is successful, wherein the private key is used for inputting a password bar of a login interface; and the sending unit is configured to send a verification result to the bookkeeper if the public key and the pinyin are failed to be matched, so that the bookkeeper resends verification data.
Further, the authentication unit includes: an obtaining subunit configured to obtain a length value and a timestamp of the signature information; the first comparison subunit is configured to compare whether the length value of the signature information conforms to a preset length value; a second comparison subunit configured to compare whether the timestamp of the signature information conforms to a preset timestamp; and the identification subunit is configured to identify that the verification is successful if the length value of the signature information conforms to a preset length value and the timestamp of the signature information conforms to a preset timestamp.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
1. because the verification is carried out twice and the second verification basis is based on the bookkeeping book of the bookkeeping person, the safety of the login process is improved, the login process is carried out according to real-time data provided by the bookkeeping person, the safety of the bookkeeping book is improved, and property loss to individuals or companies can be reduced.
2. The public key and the private key are obtained by adopting an encryption algorithm, and are used for serving the login process, so that the security of the login process can be improved, and the public key and the private key are generated in an off-line state and are generated in the off-line state, so that the network attack of an on-line network on the generation process can be reduced, the information leakage is reduced, and the security of the information is improved.
Drawings
FIG. 1 is a flow chart of an artificial intelligence billing method in an embodiment of the present application;
FIG. 2 is a flow chart illustrating verification of signature information in an embodiment of the present application;
FIG. 3 is a block diagram of an artificial intelligence billing system in an embodiment of the present application;
fig. 4 is a structural diagram of an authentication unit in the embodiment of the present application.
Detailed Description
The embodiment of the application discloses an artificial intelligence accounting method and system for providing finance and tax service, and solves the technical problem that in the prior art, if an account book login password is randomly revealed, the safety of the account book is affected.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
the embodiment of the application discloses an artificial intelligence accounting method for providing finance and tax service, which comprises the steps of obtaining a login account number, then obtaining verification data of an accounting person, judging whether a public key is matched with pinyin of the accounting person, entering a verification address if the public key is matched with the pinyin successfully, then extracting signature information of an accounting book of the accounting person in the verification address, sending the signature information to the accounting person for verification, obtaining a private key of the accounting person if the public key is matched with the pinyin successfully, inputting a password column of a login interface by the private key, achieving twice verification in a login process, and achieving page login based on the accounting book of the accounting person on the basis of second verification so as to improve the safety of the accounting book and reduce property loss of individuals or companies.
In order to make the above-mentioned basic method of the embodiments of the present application more comprehensible, specific embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example one
Fig. 1 is a diagram illustrating an artificial intelligence accounting method for providing a fiscal service in an embodiment of the present application, which is described in detail below with reference to specific steps.
And S11, acquiring the login account.
In a specific implementation, the login account includes the pinyin of the bookkeeper, which may be an individual or a company, and thus, the login account may also include the pinyin of the name of the individual or the pinyin of the name of the company.
In the specific implementation, the pinyin of the bookkeeper can exist in both upper case and lower case, and a certain letter in the pinyin can be set as upper case or lower case arbitrarily, so that countless pinyin arrangement combinations can be realized, and the login safety of the bookkeeper is further improved.
And S12, acquiring the verification data of the biller.
In a specific implementation, the verification data includes the public key and verification address of the biller. The public key and the private key are a key pair obtained through an algorithm, namely a public key and a private key, wherein one of the public key and the private key is published to the outside and is called a public key, and the other private key is reserved and is called a private key. The authentication address may be a preset web address.
In specific implementation, the public key and the private key are both generated by an encryption chip at a server of an account-keeping person after the login account number is obtained, so that the account-keeping person can generate the public key and the private key in real time when the account-keeping person logs in, and different public keys and private keys generated by the encryption chip of the account-keeping person in real time are ensured during each login.
In specific implementation, the public key and the private key can adopt a symmetric encryption algorithm, and the encryption and decryption of the symmetric encryption algorithm are the same key, so that if the security of the symmetric encryption algorithm is to be ensured, the key is kept secret and can only be known by a user and cannot be disclosed to the outside.
In specific implementation, the public key and the private key are generated in an off-line state, and the public key and the private key are generated in the off-line state, so that network attack on an on-line network in a generation process can be reduced, information leakage is reduced, and the safety of the information is improved.
And S13, judging whether the public key is matched with the pinyin.
In a specific implementation, when the bookkeeper generates a public-private key pair, the public key can carry the pinyin of the bookkeeper, so as to verify whether the pinyin input by the login user matches the pinyin on the public key generated by the bookkeeper.
And S14, if the public key is successfully matched with the pinyin, entering into a verification address.
In a specific implementation, if the login user successfully logs in by using the pinyin and the public key of the account-keeping person, a verification address is obtained, and the login user can enter the verification address to perform the next verification.
And S15, if the matching between the public key and the pinyin fails, sending a verification result to the bookkeeper.
In a specific implementation, if the matching between the public key and the pinyin fails, the verification result may be sent to the mobile terminal of the bookkeeper, and at this time, the bookkeeper knows that the verification fails, so the bookkeeper may resend the verification data.
In specific implementation, because the bookkeeper can receive the information of the matching failure at any time, when the bookkeeper is not authorized, and after the illegal person logs in, if the login fails for the first time, the bookkeeper can immediately know that the own bookkeeper is logging in, so that quick response can be performed, and the safety of the bookkeeper is improved.
And S16, extracting signature information of the bookkeeping book of the bookkeeping in the verification address.
In a specific implementation, the registrant can extract partial edge information in the bookkeeping book of the bookkeeping person from the verification address, wherein the partial edge information can contain signature information in the bookkeeping book of the bookkeeping person.
In the concrete implementation, the signature information in the account book comprises the length value and the timestamp of the signature information, the length value and the timestamp are generated when the account book is initially established, in addition, the length value and the timestamp of the signature information can be stored at the mobile terminal of an account keeper, and when the account keeper needs to verify, the length value and the timestamp of the signature information can be rapidly extracted, so that the verification can be conveniently carried out, the verification efficiency can be improved, and the time cost is reduced.
And S17, sending the signature information to the accountant for verification.
In a specific implementation, as shown in fig. 2, verification may be performed with reference to the following steps.
S171, acquiring a length value and a time stamp of the signature information;
in a specific implementation, the signature information may be a string of codes, and thus each signature information has its own length value.
In a specific implementation, the timestamp of the signature information may be a trusted timestamp, and the trusted timestamp is an electronic certificate issued by the federated trusted timestamp service center and is used for proving that the content of the electronic data file remains intact and unmodified after the electronic data file applies for the trusted timestamp. The issuance of the trusted timestamp access approval book marks that the standardized application of the trusted timestamp in the field of archives has started, and plays a role in preventing the electronic archives and the digital copy contents of the archives from being tampered and guaranteeing legal certificates of the archives.
S172, comparing whether the length value of the signature information accords with a preset length value;
in a specific implementation, the preset length value is a length value known by an biller when the signature information is initially generated.
S173, comparing whether the time stamp of the signature information accords with a preset time stamp;
in a specific implementation, the preset timestamp is a preset timestamp known by the biller when the signature information is initially generated.
S714, if the length value of the signature information accords with the preset length value and the timestamp of the signature information accords with the preset timestamp, the verification is determined to be successful.
And S18, if the verification is successful, acquiring the private key of the account-keeping person.
In a specific implementation, if the signature information is successfully verified by the bookkeeper, the bookkeeper can send the private key to the logger, and the logger can use the private key to input a password bar of the login interface and enter the bookkeeper of the bookkeeper.
In summary, when logging in the account book, the verification data of the bookkeeper is obtained firstly, then the public key and the pinyin are matched, after the matching is successful, the signature information of the account book of the bookkeeper can be obtained, then the signature information is verified, and after the verification is successful, the account book can be formally entered, so that the verification is performed twice in the logging process, and the verification basis is based on the account book of the bookkeeper, so that the security of the logging process is improved, and the real-time data provided by the bookkeeper is used in the whole logging process, so that the security of the account book is improved, and the property loss of individuals or companies can be reduced.
In order to make the embodiment of the present application better understood and realized by those skilled in the art, an artificial intelligence accounting system for providing fiscal services is described below with reference to fig. 3.
Example two
Referring to fig. 3, an embodiment of the present application provides an artificial intelligence accounting system for providing a fiscal service, where the accounting system includes:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is configured to acquire a login account, and the login account comprises pinyin of an bookkeeper;
a second acquisition unit configured to acquire verification data of the bookkeeper, the verification data including a public key and a verification address of the bookkeeper;
a judging unit configured to judge whether the public key matches the pinyin;
a sending unit, configured to send a verification result to the bookkeeper if the public key and the pinyin are failed to match, so that the bookkeeper resends verification data;
the entering unit is configured to enter the verification address if the public key is successfully matched with the pinyin;
an extracting unit configured to extract signature information of an account book of the account taker in the verification address;
a verification unit configured to send the signature information to the biller for verification;
and the third obtaining unit is configured to obtain a private key of the bookkeeper if the verification is successful, wherein the private key is used for inputting a password bar of a login interface.
In specific implementation, the public key and the private key are both generated by an encryption chip at a server of the account-keeping person after acquiring a login account number, and the public key and the private key are generated in an off-line state.
In a specific implementation, as shown in fig. 4, the verification unit includes:
an obtaining subunit configured to obtain a length value and a timestamp of the signature information;
the first comparison subunit is configured to compare whether the length value of the signature information conforms to a preset length value;
a second comparison subunit configured to compare whether the timestamp of the signature information conforms to a preset timestamp;
and the identification subunit is configured to identify that the verification is successful if the length value of the signature information conforms to a preset length value and the timestamp of the signature information conforms to a preset timestamp.
Various changes and specific implementations of the artificial intelligence accounting method for providing the fiscal service in the first embodiment are also applicable to the artificial intelligence accounting system for providing the fiscal service in the second embodiment, and through the foregoing detailed description of the artificial intelligence accounting method for providing the fiscal service, those skilled in the art can clearly know the artificial intelligence accounting system for providing the fiscal service in the second embodiment, so for the sake of brevity of the description, details are not described here.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (8)

1. An artificial intelligence accounting method for providing finance and tax service is characterized by comprising the following steps:
acquiring a login account, wherein the login account comprises pinyin of an bookkeeper;
acquiring verification data of the account-keeping person, wherein the verification data comprises a public key and a verification address of the account-keeping person;
judging whether the public key is matched with the pinyin or not;
if the public key is successfully matched with the pinyin, entering the verification address;
extracting signature information of an account book of the account-keeping person in the verification address;
sending the signature information to the accountant for verification;
and if the verification is successful, obtaining the private key of the bookkeeper, wherein the private key is used for inputting a password bar of a login interface.
2. The artificial intelligence accounting method for providing finance and tax service as claimed in claim 1, wherein if the matching of the public key and the pinyin fails, a verification result is sent to the accounting person, so that the accounting person resends the verification data.
3. The artificial intelligence accounting method for providing finance and tax service as claimed in claim 1, wherein said sending said signature information to said accounting person for verification comprises:
acquiring a length value and a timestamp of the signature information;
comparing whether the length value of the signature information accords with a preset length value;
comparing whether the timestamp of the signature information accords with a preset timestamp;
and if the length value of the signature information accords with a preset length value and the timestamp of the signature information accords with a preset timestamp, the verification is determined to be successful.
4. The artificial intelligence accounting method for providing finance and tax service as claimed in claim 1, wherein said public key and said private key are both generated by an encryption chip at the service end of said accounting person after obtaining the login account number.
5. The artificial intelligence billing method for providing fiscal services according to claim 4, wherein the public key and the private key are generated in an offline state.
6. An artificial intelligence accounting system for providing finance and tax services, the accounting system comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is configured to acquire a login account, and the login account comprises pinyin of an bookkeeper;
a second acquisition unit configured to acquire verification data of the bookkeeper, the verification data including a public key and a verification address of the bookkeeper;
a judging unit configured to judge whether the public key matches the pinyin;
the entering unit is configured to enter the verification address if the public key is successfully matched with the pinyin;
an extracting unit configured to extract signature information of an account book of the account taker in the verification address;
a verification unit configured to send the signature information to the biller for verification;
and the third obtaining unit is configured to obtain a private key of the bookkeeper if the verification is successful, wherein the private key is used for inputting a password bar of a login interface.
7. The artificial intelligence accounting system for providing finance and tax service as claimed in claim 6, wherein said accounting system further comprises: and the sending unit is configured to send a verification result to the bookkeeper if the public key and the pinyin are failed to be matched, so that the bookkeeper resends verification data.
8. The artificial intelligence accounting system for providing finance and tax service as claimed in claim 6, wherein said verification unit comprises:
an obtaining subunit configured to obtain a length value and a timestamp of the signature information;
the first comparison subunit is configured to compare whether the length value of the signature information conforms to a preset length value;
a second comparison subunit configured to compare whether the timestamp of the signature information conforms to a preset timestamp;
and the identification subunit is configured to identify that the verification is successful if the length value of the signature information conforms to a preset length value and the timestamp of the signature information conforms to a preset timestamp.
CN202111613023.6A 2021-12-27 2021-12-27 Artificial intelligence accounting method and system for providing finance and tax service Withdrawn CN114331652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111613023.6A CN114331652A (en) 2021-12-27 2021-12-27 Artificial intelligence accounting method and system for providing finance and tax service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111613023.6A CN114331652A (en) 2021-12-27 2021-12-27 Artificial intelligence accounting method and system for providing finance and tax service

Publications (1)

Publication Number Publication Date
CN114331652A true CN114331652A (en) 2022-04-12

Family

ID=81013234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111613023.6A Withdrawn CN114331652A (en) 2021-12-27 2021-12-27 Artificial intelligence accounting method and system for providing finance and tax service

Country Status (1)

Country Link
CN (1) CN114331652A (en)

Similar Documents

Publication Publication Date Title
US11186111B1 (en) Digitally encoded seal for document verification
US10341123B2 (en) User identification management system and method
CN108876332B (en) Block chain safe transaction method and device based on biometric feature mark authentication
KR101934444B1 (en) A Managing Method Of The Integrity Data of Documents Or Securities
CN110674523A (en) Method for confirming electronic contract signer by combining digital signature with handwritten signature
US7606768B2 (en) Voice signature with strong binding
CN106934624B (en) Method for using witness fingerprint block chain at input front end
EP3543891B1 (en) A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
Nguyen et al. CVSS: a blockchainized certificate verifying support system
CN114662132A (en) Block chain-based electronic seal monitoring method, device, equipment and medium
KR19980070017A (en) How to check encryption key for chip card
Chaniago et al. Electronic document authenticity verification of diploma and transcript using smart contract on Ethereum blockchain
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
CN108540447A (en) A kind of certification authentication method and system based on block chain
CN114329634A (en) Anti-counterfeiting method for electronic signature document
CN113849797A (en) Method, device, equipment and storage medium for repairing data security vulnerability
KR101876672B1 (en) Digital signature method using block chain and system performing the same
WO2018219425A1 (en) Method for validating and/or authenticating online curriculum vitae using blockchain distributed ledger technology
CN110826034B (en) File signature method and device, electronic equipment and readable storage medium
CN111480316A (en) Method and apparatus for generating and verifying passwords
CN114331652A (en) Artificial intelligence accounting method and system for providing finance and tax service
CN113515781B (en) Electronic insurance letter verification method and device
CN111260528B (en) Real estate information verification method based on asymmetric algorithm
Ivanov et al. A hybrid document formation technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220412

WW01 Invention patent application withdrawn after publication