Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for processing short ciphertext signature of invoice

A short cipher text, management system technology, applied in electronic digital data processing, invoicing/invoicing, instruments, etc., can solve the problem of complex invoice signature processing, achieve the effect of strong identity authentication, and ensure the effect of security

Active Publication Date: 2018-07-10
AEROSPACE INFORMATION
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The length of the digital signature of the SM2 algorithm and the SM9 algorithm for the message exceeds 54 bytes, and cannot be printed normally in the signature area
[0005] Therefore, a short ciphertext signature technology with simpler operations is needed to solve the complex problem of invoice signature processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing short ciphertext signature of invoice
  • Method and system for processing short ciphertext signature of invoice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0048]Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that the terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for processing short ciphertext signature of an invoice. The method comprises: through a tax-control device, generating a public key and a private key for a user, andstoring the private key in the tax-control device; through a safe channel, sending the public key to a tax invoice management system and storing the public key in the tax invoice management system, sothat the tax invoice management system performs verification operation on invoice information; the tax-control device using the private key, and based on parameters of a BN curve domestic cryptographic SM9 algorithm, the parameters not exceeding 256 bits, to perform signature processing on invoice information; and an invoice verifying party downloading the public key through the tax invoice management system, and using the public key to verify the invoice data information. The short signature method can satisfy requirement of length of a current invoice password region.

Description

technical field [0001] The invention relates to the field of encryption, and more particularly relates to a processing method and system for performing short ciphertext signatures on invoices. Background technique [0002] Invoice encryption is the key technology for invoice anti-counterfeiting. The anti-counterfeiting of value-added tax invoices mainly depends on the password area on it. The identification number, billing date, amount and tax amount are processed through signature to obtain a set of data, which is printed on the password area of ​​the invoice. When verifying the invoice, the characters in the signature area are decrypted and compared with the plaintext information of the invoice. If the comparison is passed, it indicates that the invoice is genuine, otherwise it is a fake invoice. [0003] The signature of the invoice is currently displayed in characters, and there are currently two main versions of the signature displayed in characters. The first version...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06Q30/04
CPCG06F21/602G06Q30/04
Inventor 张庆胜宁红宙王绍刚王千喜
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products