Method for generating electronic invoice and interactively using based on communication network

An electronic invoice and communication network technology, applied in the application field of network security technology, can solve the problems of inconvenient data collection and reuse, high cost of paper invoices, lagging invoice transmission, etc., to save invoice costs, facilitate real-time monitoring, and be difficult to forge and the effect of cracking

Inactive Publication Date: 2007-08-15
NANJING UNIV
View PDF0 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of the high cost of paper invoices, the existence of forgery and false invoices, the difficulty of monitoring, the lagging phenomenon of invoice transmission, and the inconvenience of data collection and reuse, the existing network security technolog

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating electronic invoice and interactively using based on communication network
  • Method for generating electronic invoice and interactively using based on communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] The generation process of online electronic invoice is as follows: (see Figure 1)

[0009] In the first step, the issuer of the electronic invoice obtains the private key KR used by the issuer for digital signature and the digital certificate used by the recipient for encryption.

[0010] The issuer of the electronic invoice must obtain the private key string KR used to sign the invoice data and the corresponding digital certificate Certificate used to identify the holder before issuing the invoice. The digital certificate contains the public key string KP used to verify the signature of the private key. Digital certificates are generally issued by an authoritative certificate authority (CA) to prove the identity of the certificate holder to a third party. Digital certificates can be downloaded from the download address provided by the certificate authority, or obtained by other means. The private key can be obtained by the issuer using a key generation device (such a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to one electro invoice generation and interacting use method based on communication network, wherein, the invoice is for internet transmission electron invoice with similar content to paper invoice with generation process of symmetric and asymmetric code technique; the invoice has connection internet function process device; user can interact with other internet terminal and electron invoice process device; processing electron invoice buying, issuing, canceling, discounting, storing and inquire steps; processing data interacting to national tax department or business ERP system, bank and customs.

Description

technical field [0001] The invention relates to a method for generating and interactively using an electronic invoice based on a communication network. It belongs to the application field of network security technology Background technique [0002] The generation and interaction method of electronic invoices on the Internet is based on the security framework - public key infrastructure (PKI). Public Key Infrastructure (PKI) is the most feasible and effective way to solve information security problems in a large open network environment. PKI is a system that uses public key technology and digital certificates to ensure system information security and is responsible for verifying the identity of digital certificate holders. PKI adopts the trust mechanism that each participant trusts the same CA (certification center), and the CA checks and verifies the identity of each participant. Through public key infrastructure (PKI), the two parties to the transaction (possibly between...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q50/00G06Q50/26
Inventor 黄皓许峰崔隽高晓春
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products