A construction method of electronic invoice security middleware based on cloud computing technology

An electronic invoice and cloud computing technology, applied in billing/billing, etc., can solve problems such as failure to meet business needs, affect system promotion and customer satisfaction, and lag in electronic invoices

Active Publication Date: 2017-07-14
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the peak period of business, the business requests of its security support system increased sharply, and the pressure on the system increased, and it was overwhelmed; while in the low period of business, due to the sharp decrease in business requests of its security support system, a large number of computing resources of the system were idle again, resulting in waste of resources;
[0004] B. For the business distribution model where e-invoice users are scattered and small, the traditional security support system cannot provide effective support due to the lack of necessary flexibility: for the vast majority of taxpayers whose business is scattered, what is needed is a single-threaded online / Offline security services; for a small number of taxpayers with concentrated business, multi-threaded security services are needed
The modular construction method of the traditional security architecture system cannot meet such flexible and changeable business needs;
[0005] C. Under the traditional security architecture system, the coupling degree between systems is very high, resulting in very complicated implementation and maintenance, and hot maintenance is impossible
[0006] The existence of these problems has caused the delay in the promotion process of electronic invoices, which has seriously affected system promotion and customer satisfaction, and has become a bottleneck restricting the rapid development of electronic invoices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A construction method of electronic invoice security middleware based on cloud computing technology
  • A construction method of electronic invoice security middleware based on cloud computing technology
  • A construction method of electronic invoice security middleware based on cloud computing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The method of the present invention is described in detail below with reference to the accompanying drawings.

[0025] A method for constructing electronic invoice security middleware based on cloud computing technology is to use cloud computing technology to construct security middleware cloud security services, including cloud certificate database service, cloud directory service LDAP, cloud certificate status query service OCSP, cloud security equipment Management services, cloud signature and verification services, cloud encryption and decryption services, cloud identity authentication services, etc.; through resource scheduling services in cloud computing technology, signature and verification services, encryption and decryption services that have business peaks and valleys , identity authentication service to balance computing resources; through cloud security device management services, cloud security KEY devices and security server devices are issued and managed....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an electronic invoice safety middleware configuring method based on the cloud computing technology. The electronic invoice safety middleware configuring method includes steps of using the cloud computing technology to configure cloud safety services of safety middleware, issuing and managing cloud safety KEY devices and safety server devices, and balancing computing resources of service modules with service peaks and valleys via resource dispatching services in the cloud computing technology; filling certificates and algorithms to the cloud safety KEY devices by the special communication protocol, issuing API (application program interface) ports to the outside through the devices and providing offline, movable and single-thread safety services for electronic invoice users; synchronizing certificates for the cloud safety server devices by standard directory services LDAP and certificate status query services (OCSP online certificate status protocol) and providing multithread safety services based on the local area network for the electronic invoice users. Cloud safety services, cloud KEY devices and cloud safety server devices can jointly form a cloud safety middleware configuring method.

Description

technical field [0001] The invention relates to the field of financial tax control, in particular to a method for constructing electronic invoice security middleware based on cloud computing technology. Background technique [0002] At present, electronic invoices have become an inevitable trend of national invoice reform due to their advantages of low cost, ease of use, and ease of maintenance. However, the security support system based on the traditional architecture has continuously exposed the unbalanced distribution of computing resources in the process of system construction. , Repeated investment in construction, high degree of system coupling, etc., even unable to meet the user's large decentralized and small centralized business distribution model, for example: [0003] A. Since the electronic invoice system is a transactional business system, there are situations in which business peaks and troughs continue to change. During the peak period of business, the busin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/04
Inventor 徐兵兵王永军于治楼
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products