Invoice authenticity inquiry method and system

A technology of invoice authenticity and query method, applied in the field of computer networks, can solve problems such as database deadlock, prolonged query request return time, query performance degradation, etc., and achieve the effect of overcoming performance degradation, improving query performance and query speed.

Inactive Publication Date: 2015-05-06
SHENZHEN HUACHENGFENG DATA TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the database in this architecture uses a traditional relational database. Once the number of invoice queries reaches a certain critical value, the query performance will drop sharply, and the return time of each query request will be greatly extended.
Although the system performance can be improved by increasing the configuration of the underlying hardware and the distributed database, the performance improvement is not obvious, and the server and database maintenance costs are relatively high
When large-scale data is queried concurrently, it is easy to cause database deadlock, seriously affecting query efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invoice authenticity inquiry method and system
  • Invoice authenticity inquiry method and system
  • Invoice authenticity inquiry method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] The method provided by the invention is applied as figure 1 shown in the application environment. The terminal 102 is connected to the server cluster 106 through the network 104 . Wherein, a NoSQL (Not Only SQL, non-relational database) database running on the server cluster 106 . Invoice information data is stored in the database. The user generates an invoice authenticity inquiry request through information such as the invoice code, invoice number, and invoice verification code input on the invoice authenticity inquiry page on the terminal 102 . Terminals include, but are not limited t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an invoice authenticity inquiry method, which comprises the following steps of receiving an invoice authenticity inquiry request; converting the inquiry request to be NoSQL (Not Only Structured Query Language) database inquiry language, and inquiring in a preset NoSQL database; returning an inquiry result and analyzing the inquiry result to be information corresponding to the inquiry request; judging whether the analyzed information is empty or not; if yes, confirming an invoice as a fake invoice. By adopting the method, the authenticity of the invoice can be quickly and efficiently judged when large-scale data is inquired parallely. In addition, the invention also provides an invoice authenticity inquiry system.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a method and system for inquiring about the authenticity of an invoice. Background technique [0002] The tax industry is an important guarantee industry for national fiscal revenue. With the sustained and rapid development of my country's national economy in recent years, the role of tax information construction in macro-control of the national economy has become more and more important. In recent years, the relevant laws and regulations of the tax industry have been promulgated one after another, which put forward higher requirements for the standardization and strategic planning of tax information construction. The traditional tax system is developed based on the J2EE standard multi-layer distributed architecture, which has the advantages of high security, strong scalability, and easy maintenance. However, the database in this architecture uses a traditional relatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/258
Inventor 顾正李潘峰董朝军官辉
Owner SHENZHEN HUACHENGFENG DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products