Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A processing method and system for performing short ciphertext signatures on invoices

A short cipher text, management system technology, applied in electronic digital data processing, invoicing/invoicing, instruments, etc., can solve the problem of complex invoice signature processing, achieve strong identity authentication effect, and ensure the effect of security

Active Publication Date: 2022-03-04
AEROSPACE INFORMATION
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The length of the digital signature of the SM2 algorithm and the SM9 algorithm for the message exceeds 54 bytes, and cannot be printed normally in the signature area
[0005] Therefore, a short ciphertext signature technology with simpler operations is needed to solve the complex problem of invoice signature processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A processing method and system for performing short ciphertext signatures on invoices
  • A processing method and system for performing short ciphertext signatures on invoices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0048]Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or overl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a processing method for performing short ciphertext signatures on invoices, the method comprising: generating a public key and a private key for a user through a tax control device, and storing the private key in the tax control device In; the public key is sent to the tax invoice management system through a secure channel and stored in the tax invoice management system, so that the tax invoice management system can verify the invoice information; the tax control device uses the private key and based on The national secret SM9 algorithm parameters of the BN curve not exceeding 256 bits sign the invoice information; and the invoice verifier downloads the public key through the tax invoice management system, and uses the public key to verify the invoice data information. The short signature method of the present invention can meet the requirement of the printing length of the password area of ​​the current invoice.

Description

technical field [0001] The invention relates to the field of encryption, and more particularly relates to a processing method and system for performing short ciphertext signatures on invoices. Background technique [0002] Invoice encryption is the key technology for invoice anti-counterfeiting. The anti-counterfeiting of value-added tax invoices mainly depends on the password area on it. The identification number, billing date, amount and tax amount are processed through signature to obtain a set of data, which is printed on the password area of ​​the invoice. When verifying the invoice, the characters in the signature area are decrypted and compared with the plaintext information of the invoice. If the comparison is passed, it indicates that the invoice is genuine, otherwise it is a fake invoice. [0003] The signature of the invoice is currently displayed in characters, and there are currently two main versions of the signature displayed in characters. The first version...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06Q30/04
CPCG06F21/602G06Q30/04
Inventor 张庆胜宁红宙王绍刚王千喜
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products