Nothing Special   »   [go: up one dir, main page]

CN103530932A - System and method for real-time invoice authenticity verifying - Google Patents

System and method for real-time invoice authenticity verifying Download PDF

Info

Publication number
CN103530932A
CN103530932A CN201210228845.7A CN201210228845A CN103530932A CN 103530932 A CN103530932 A CN 103530932A CN 201210228845 A CN201210228845 A CN 201210228845A CN 103530932 A CN103530932 A CN 103530932A
Authority
CN
China
Prior art keywords
invoice
information
server
output module
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210228845.7A
Other languages
Chinese (zh)
Other versions
CN103530932B (en
Inventor
陈江宁
甘景全
宋颖
车德欣
马雁
袁冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201210228845.7A priority Critical patent/CN103530932B/en
Publication of CN103530932A publication Critical patent/CN103530932A/en
Application granted granted Critical
Publication of CN103530932B publication Critical patent/CN103530932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Facsimile Transmission Control (AREA)

Abstract

The invention relates to a system and method for real-time invoice authenticity verifying. The system comprises scanners, information acquisition output modules, a server and decryption machines. Each enterprise sets a scanner and an information acquisition output module connected with the scanner; the server is respectively connected with the more than two decryption machines; the information acquisition output models are respectively connected with the server; the information acquisition output modules control the scanners to scan invoices, identify invoice images and combine invoice plaintexts and invoice ciphertexts into invoice data information for sending to the server; the server selects an idle decryption machine as a specified decryption machine for decrypting the invoice ciphertexts, determines whether invoice decryption information and the invoice plaintexts are the same, and if it is determined that the invoice decryption information and the invoice plaintexts are the same, sending the information that the invoices are true invoices to the information acquisition output modules for outputting, otherwise, sending the information that the invoices are false invoices to the information acquisition output modules for outputting. By using the system and method provided by the invention, the invoice authenticity verifying efficiency and the utilization efficiency of the decryption machines can be improved.

Description

System and method for verifying authenticity of invoice in real time
Technical Field
The invention relates to the technical field of invoice anti-counterfeiting, in particular to a system and a method for verifying the authenticity of an invoice in real time.
Background
The anti-counterfeiting of the invoice is of particular significance to national tax. At present, the anti-counterfeiting technology of the invoice is generally carried out in an electronic form so as to improve the working efficiency of tax authorities and tax payment units.
Fig. 1 is a diagram showing a conventional system for verifying the authenticity of an invoice. As shown in fig. 1, the information acquisition and output module 102 disposed in each enterprise can control the scanner 101 connected thereto to scan the invoice, and after receiving the invoice image sent by the scanner 101, the information acquisition and output module 102 can identify the invoice image, send the obtained data such as invoice plaintext, invoice ciphertext, and the like to the cache 103 of the tax bureau, and read the information of invoice authenticity from the cache 103 after a specified time interval. The server 104 of the tax bureau periodically reads the data in the cache 103 in batch, sequentially selects the decryptors 105 according to the number to decrypt the received invoice ciphertext, compares the decrypted invoice information with the invoice plaintext, judges whether the decrypted invoice information and the invoice plaintext are the same, if so, sends the information that the invoice is a true invoice to the cache 103, otherwise, sends the information that the invoice is a false invoice to the cache 103.
The prior art has the problem that both the invoice authenticity verification efficiency and the decryption machine utilization efficiency are relatively low, because the server 104 periodically reads data from the cache 103 in batches, and the decryption machine 105 is also scheduled according to the rule that the serial number is from small to large or from large to small, so that the time for each information acquisition and output module 102 to inquire the invoice authenticity information from the cache 103 cannot be determined in advance, and the invoice authenticity information can be obtained only after waiting for a specified time interval (the time interval is usually the maximum period for processing a batch of data by the server 104), which undoubtedly reduces the invoice authenticity verification efficiency of the system. In addition, if the decryption machine 105 currently selected by the server 104 (referred to as the current decryption machine) does not finish the processing work, even if other decryption machines 105 are idle, the server 104 waits for the current decryption machine to finish the work, and then sends the invoice ciphertext to be processed to the current decryption machine for decryption, so that the invoice authenticity verification efficiency in the prior art is further reduced, and meanwhile, the utilization efficiency of the decryption machine is low.
Disclosure of Invention
The invention aims to provide a system and a method for verifying the authenticity of an invoice in real time, which can improve the invoice authenticity verification efficiency and the utilization efficiency of a decryption machine.
The technical scheme for solving the technical problems is as follows: a system for verifying the authenticity of an invoice in real time, the system comprising: the system comprises a scanner, an information acquisition and output module, a server and a decryption machine; wherein,
each enterprise needing to verify the authenticity of the invoice is internally provided with a scanner and an information acquisition and output module connected with the scanner;
the server and more than two decryption machines are arranged in the tax bureau, and the server is respectively connected with each decryption machine;
each information acquisition output module is respectively connected with the server;
the information acquisition output module controls a scanner connected with the information acquisition output module to scan the invoice, identifies the obtained invoice image, and combines the invoice plaintext and the invoice ciphertext obtained by identification into invoice data information to be sent to the server; the server selects a decryption machine in an idle state as an appointed decryption machine to decrypt the invoice ciphertext in the received invoice data information; and the server judges whether invoice decryption information obtained by decryption is the same as the invoice plaintext, if so, the information that the invoice corresponding to the invoice data information is a true invoice is sent to the information acquisition and output module for output, and if not, the information that the invoice corresponding to the invoice data information is a false invoice is sent to the information acquisition and output module for output.
The invention has the beneficial effects that: in the invention, the information acquisition and output module controls the scanner connected with the information acquisition and output module to scan the invoice, the invoice plaintext and the invoice ciphertext can be combined into invoice data information to be directly sent to the server after the obtained invoice image is identified, the server can select an idle decryption machine in real time to decrypt the invoice ciphertext so as to judge the authenticity of the invoice, and after the judgment is finished, the server can send the authenticity information of the invoice to the information acquisition and output module in real time for output. Therefore, by utilizing the technology provided by the invention, all the steps from the invoice scanning to the invoice true and false information obtaining of each enterprise are carried out in real time, compared with the situation that the invoice true and false information can only be obtained after waiting for a period of time in the prior art, the invention greatly improves the invoice true and false verification efficiency, meanwhile, the server selects an idle decryption machine in real time for decryption processing, compared with the situation that the decryption machines are used in turn according to the serial numbers of the decryption machines in the prior art, the utilization efficiency of the decryption machines in the invention is greatly improved, and the invoice true and false verification efficiency is further improved.
On the basis of the technical scheme, the invention can be further improved as follows:
further, the server comprises a firewall, an acceptance server, a gatekeeper and a processing server which are connected in sequence;
the firewall is respectively connected with each information acquisition output module and is used for preventing illegal invasion;
the acceptance server forwards the invoice data information passing through the firewall to the gatekeeper;
the processing server is connected with each decryption machine respectively and is used for selecting one decryption machine in an idle state as an appointed decryption machine to decrypt invoice ciphertext in invoice data information passing through the network gate, judging whether the invoice decryption information decrypted by the appointed decryption machine is the same as invoice plaintext, if so, sending the information of the invoice corresponding to the invoice data information as a true invoice to the information acquisition and output module through the network gate, the acceptance server and the firewall in sequence for output, and if not, sending the information of the invoice corresponding to the invoice data information as a false invoice to the information acquisition and output module through the network gate, the acceptance server and the firewall in sequence for output.
The processing server is used for receiving and storing the invoice decryption information sent by the processing server when the processing server judges that the invoice decryption information is the same as the invoice plaintext.
Further, the information acquisition output module is also used for judging whether the invoice image scanned by the scanner meets an invoice rule, if so, the invoice plaintext and the invoice ciphertext obtained by identification are combined into invoice data information and sent to the server, otherwise, the invoice image is deleted, and the scanner connected with the invoice image is controlled to scan the invoice again.
Further, the information acquisition output module is also used for encrypting invoice data information formed by combining the invoice plaintext and the invoice ciphertext and sending the obtained encrypted invoice data information to the server;
the server is also used for decrypting the received encrypted invoice data information.
Further, the information acquisition output module is also used for compressing invoice data information formed by combining the invoice plaintext and the invoice ciphertext and sending the obtained compressed invoice data information to the server;
the server is also used for decompressing the received compressed invoice data information.
In addition, the invention also provides a method for verifying the authenticity of the invoice in real time, which is based on the system; the method comprises the following steps:
step 1: the information acquisition output module controls a scanner connected with the information acquisition output module to scan the invoice, identifies the obtained invoice image, and combines the invoice plaintext and the invoice ciphertext obtained by identification into invoice data information to be sent to the server;
step 2: the server selects a decryption machine in an idle state as an appointed decryption machine to decrypt the invoice ciphertext in the received invoice data information;
and step 3: and the server judges whether invoice decryption information obtained by decryption is the same as the invoice plaintext, if so, the information that the invoice corresponding to the invoice data information is a true invoice is sent to the information acquisition and output module for output, and if not, the information that the invoice corresponding to the invoice data information is a false invoice is sent to the information acquisition and output module for output.
Further, in step 3, the server further sends the invoice decryption information to a memory for storage when judging that the invoice decryption information obtained by decryption is the same as the invoice plaintext.
Further, in step 1, after the information acquisition and output module identifies the invoice image, before the invoice plaintext and the invoice ciphertext obtained by identification are combined into invoice data information and sent to the server, it is further determined whether the invoice image meets an invoice rule, if so, the invoice plaintext and the invoice ciphertext obtained by identification are combined into the invoice data information and sent to the server, otherwise, the invoice image is deleted, and the scanner connected with the invoice image is controlled to scan the invoice again.
Further, the invoices are N invoices, and N is a positive integer not less than 2;
in the step 1, the information acquisition output module controls the scanner connected with the information acquisition output module to scan the invoice, and the method for identifying the obtained invoice image comprises the following steps:
the information acquisition output module controls a scanner connected with the information acquisition output module to scan the first invoice;
from the second invoice serving as the current invoice to the Nth invoice serving as the current invoice, the information acquisition and output module controls the scanner to scan the current invoice and simultaneously identifies an invoice image of the previous invoice sent by the scanner;
and the information acquisition and output module identifies the invoice image of the Nth invoice sent by the scanner.
Drawings
FIG. 1 is a block diagram of a conventional system for verifying the authenticity of an invoice;
FIG. 2 is a block diagram of a system for verifying the authenticity of an invoice in real time according to the present invention;
fig. 3 is a flow chart of a method for verifying the authenticity of an invoice in real time according to the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
Fig. 2 is a block diagram of a system for verifying the authenticity of an invoice in real time according to the present invention. As shown in fig. 2, the system includes: the system comprises a scanner 201, an information acquisition output module 202, a server 203 and a decryption machine 204; wherein,
each enterprise needing to verify the authenticity of the invoice is provided with a scanner 201 and an information acquisition and output module 202 connected with the scanner 201, the scanner 201 and the information acquisition and output module 202 arranged in the same enterprise can be regarded as one-to-one correspondence, and the information acquisition and output module 202 can control the work of the scanner 201 connected with the information acquisition and output module 202.
The server 203 and more than two decryptors 204 are arranged in the tax bureau, all the decryptors 204 can be regarded as a decryption unit, the server 203 is respectively connected with each decryptor 204, and can send an invoice ciphertext to any decryptor in the decryption unit for decryption.
Each information collection output module 202 is connected to the server 203, and the connection relationship may be a wired connection or a wireless connection.
In this way, in the present invention, the information acquisition output module 202 can control the scanner 201 connected thereto to scan the invoice, and can also identify the invoice image scanned by the scanner 201, and further combine the invoice plaintext and invoice ciphertext obtained by identification into invoice data information to be sent to the server 203. Here, the invoice plaintext and the invoice ciphertext are both components of the invoice image, and are identified from the invoice image by the information acquisition output module 202. The recognition function of the invoice image by the information collection output module 202 can be realized by an OCR recognition module. In addition, in order to perform preliminary judgment on the quality of the invoice image, the information acquisition and output module 202 may further have a function of prejudging the invoice image, that is, the information acquisition and output module 202 may be further configured to judge whether the invoice image scanned by the scanner 201 meets an invoice rule, if so, combine the invoice plaintext and the invoice ciphertext obtained by the identification into the invoice data information and send the invoice data information to the server 203, otherwise, delete the invoice image, control the scanner 201 connected to the invoice image to scan the invoice again, further identify the invoice image obtained by the rescanning, and only when the invoice image scanned by the scanner 201 meets the invoice rule, the information acquisition and output module 202 combines the plaintext invoice and the invoice ciphertext obtained by the identification into the invoice data information and send the invoice data information to the server 203.
The invoice rule may be a format of an invoice cryptograph, a format of an invoice code, a format of an invoice number, a format of an invoice date, a format of a tax acceptance number of a buyer (or a seller), a format of an invoice amount and a tax amount, and the like, and one embodiment of the invoice rule is as follows:
1) the invoice ciphertext is from the character set '0123456789 + -/< >' and is 84 characters in length, or from the character set '0123456789 ABCDEF' and is 436 bytes in length;
2) the invoice code is from a character set '0123456789', has the length of 10 characters, has the 5 th to 6 th digits representing the year, does not need to be later than the current year, has the 7 th digits being any number between 1 and 4, and has the 8 th to 10 th digits being 140 or 170;
3) the invoice number is from a character set '0123456789' and is 8 characters in length;
4) the invoicing date is from a character set of '0123456789', is 8 characters in length and is not later than the current time;
5) the tax number of the buyer (or seller) is from the character set "0123456789 ABCDEFGJKLMNPQRSTUVWXY", the length is 15 characters, and the requirement of the regulation on the taxpayer identification number is met;
6) the invoice amount and the tax amount are from a character set ' 0123456789 ' - ', meet the format requirements of the amount by regulations, and meet the tax rate range of 4% -17%.
Of course, the invoice rules may also be in other forms, which are not described in detail herein.
After receiving the invoice data information sent by the information acquisition and output module 202, the server 203 may select a decryption machine 204 in an idle state as an appointed decryption machine to decrypt the invoice ciphertext in the received invoice data information. After decryption, the formulated decryption machine sends the decrypted invoice decryption information to the server 203, the server 203 further judges whether the decrypted invoice decryption information is the same as the invoice plaintext, if so, the invoice is a true invoice, the server 203 sends the information that the invoice corresponding to the invoice data information is the true invoice to the information acquisition and output module 202 for output, otherwise, the invoice is a false invoice, and the server 203 sends the information that the invoice corresponding to the invoice data information is the false invoice to the information acquisition and output module 202 for output, so that the authenticity verification process of the invoice is completed.
In the invention, the information acquisition and output module controls the scanner connected with the information acquisition and output module to scan the invoice, the invoice plaintext and the invoice ciphertext can be combined into invoice data information to be directly sent to the server after the obtained invoice image is identified, the server can select an idle decryption machine in real time to decrypt the invoice ciphertext so as to judge the authenticity of the invoice, and after the judgment is finished, the server can send the authenticity information of the invoice to the information acquisition and output module in real time for output. Therefore, by utilizing the technology provided by the invention, all the steps from the invoice scanning to the invoice true and false information obtaining of each enterprise are carried out in real time, compared with the situation that the invoice true and false information can only be obtained after waiting for a period of time in the prior art, the invention greatly improves the invoice true and false verification efficiency, meanwhile, the server selects an idle decryption machine in real time for decryption processing, compared with the situation that the decryption machines are used in turn according to the serial numbers of the decryption machines in the prior art, the utilization efficiency of the decryption machines in the invention is greatly improved, and the invoice true and false verification efficiency is further improved.
As shown in fig. 2, the server 203 may include a firewall 2031, a reception server 2032, a gatekeeper 2033, and a processing server 2034, which are connected in sequence. In fig. 2, a firewall 2031 is connected to each information acquisition and output module 202, and the firewall 2031 is used for preventing illegal intrusion, which is the same as the firewall provided in the prior art. The acceptance server 2032 forwards the invoice data information passed through the firewall 2031 to the gatekeeper 2033, which is called a security isolation gatekeeper, and is a network security device that is capable of cutting link layer connections between networks on a circuit by dedicated hardware having a plurality of control functions and performing appropriate security application data exchange between networks. The processing server 2034 is connected to each decryption machine 204, and is configured to select one decryption machine 204 in an idle state as an appointed decryption machine to decrypt an invoice ciphertext in the invoice data information passing through the gatekeeper 2033, after the appointed decryption machine transmits the invoice decryption information obtained by decrypting the invoice ciphertext to the processing server 2034, the processing server 2034 determines whether the invoice decryption information obtained by decrypting the invoice decryption information by the appointed decryption machine is the same as the invoice plaintext, if so, the invoice corresponding to the invoice data information is a true invoice, the processing server 2034 transmits the information of the invoice corresponding to the invoice data information as the true invoice to the information acquisition and output module 202 sequentially passing through the gatekeeper 2033, the acceptance server 2032 and the firewall 2031 for output, otherwise, the invoice corresponding to the invoice data information is a false invoice, and the processing server 2034 transmits the information of the invoice corresponding to the invoice data information as the false invoice sequentially passing through the gatekeeper 2033, the receiving server 2032 and the network gate 2034, The acceptance server 2032 and the firewall 2031 are sent to the information collection and output module 202 for output. Of course, no matter the processing server 2034 sends out the message that the invoice corresponding to the invoice data information is a true invoice or sends out the message that the invoice is a false invoice, the information acquisition and output module 202 to which the message is sent is determined according to the source of the invoice data information, so that the wrong sending of the message is avoided.
As shown in fig. 2, the system may further include a memory 205 connected to the processing server 2034, where the memory 205 is configured to receive and store the invoice decryption information sent from the processing server 2034 for long-term storage when the processing server 2034 determines that the invoice decryption information is identical to the invoice plaintext.
In the invention, the information acquisition output module 202 can also be used for encrypting invoice data information formed by combining the invoice plaintext and the invoice ciphertext and sending the obtained encrypted invoice data information to the server 203, which is obvious and can greatly improve the safety of data transmission. In this way, the server 203 is further configured to decrypt the received encrypted invoice data information, thereby obtaining a plaintext of the invoice data information, and further process the plaintext.
In addition, the information acquisition output module 202 can also be used for compressing invoice data information formed by combining invoice plaintext and invoice ciphertext and sending the obtained compressed invoice data information to the server 203, so that the data transmission speed can be increased, and the invoice authenticity verification efficiency of the invention can be indirectly improved. Thus, the server 203 is also used to decompress the received compressed invoice data information.
Of course, the information collection output module 202 may encrypt the invoice data information first, and then compress the encrypted invoice data information obtained by encryption, so as to improve the security and speed of data transmission at the same time.
The invention also provides a method for verifying the authenticity of the invoice in real time, which is based on the system for verifying the authenticity of the invoice in real time. Fig. 3 is a flow chart of the method, as shown in fig. 3, the method includes:
step 1: the information acquisition output module controls a scanner connected with the information acquisition output module to scan the invoice, identifies the obtained invoice image, and combines the invoice plaintext and the invoice ciphertext obtained by identification into invoice data information to be sent to the server.
In the step, the information acquisition output module can control a scanner connected with the information acquisition output module to scan, and the scanner sends the scanned invoice image to the information acquisition output module to identify the invoice image.
Here, the recognition of the invoice image by the information collection output module can be realized by using an OCR recognition module.
In the step, after the information acquisition and output module identifies the invoice image, before the invoice plaintext and the invoice ciphertext obtained by identification are combined into invoice data information and sent to the server, whether the invoice image accords with an invoice rule can be judged, if yes, the invoice plaintext and the invoice ciphertext obtained by identification are combined into the invoice data information and sent to the server, otherwise, the information acquisition and output module can delete the invoice image, a scanner connected with the information acquisition and output module is controlled to scan the invoice again, the obtained invoice image is further identified, and only under the condition that the invoice image accords with the invoice rule, the information acquisition and output module combines the invoice plaintext and the invoice ciphertext obtained by identification into the invoice data information and sends the invoice data information to the server.
Step 2: the server selects a decryption machine in an idle state as a designated decryption machine to decrypt the invoice ciphertext in the received invoice data information.
In this step, the method for selecting the decryption machines in the idle state by the server may be to randomly select one decryption machine as the designated decryption machine, or to select one decryption machine in the idle state as the designated decryption machine according to the size of the number, for example, when the number of the decryption machines in the idle state is not less than two, the server selects the decryption machine in the idle state with the smallest number as the designated decryption machine to perform the decryption task on the current invoice ciphertext. Of course, the server may also select one decryption machine in an idle state as the designated decryption machine according to other methods, which are not described herein again.
The server in the step can select one decryption machine in the idle state in real time to execute the decryption task after receiving the invoice data information, so that the invoice cryptograph can be processed in time as long as one decryption machine is in the idle state, and the invoice cryptograph cannot be in a waiting state as the prior art possibly, so that the utilization efficiency of the decryption machine is improved, and the invoice authenticity verification efficiency of the invention is further improved.
And step 3: and the server judges whether the invoice decryption information obtained by decryption is the same as the invoice plaintext, if so, the information that the invoice corresponding to the invoice data information is a true invoice is sent to the information acquisition and output module for output, and if not, the information that the invoice corresponding to the invoice data information is a false invoice is sent to the information acquisition and output module for output.
In the step, the server can also send the invoice decryption information to the memory for storage when judging that the invoice decryption information obtained by decryption is the same as the invoice plaintext.
In the present invention, the number of invoices scanned by one enterprise at the same time may be more than one, for example, the invoices may be N invoices, where N is a positive integer not less than 2. Then
In step 1, the information acquisition output module controls the scanner connected with the information acquisition output module to scan the invoice, and the method for identifying the obtained invoice image comprises the following steps:
step 1-1: the information acquisition output module controls a scanner connected with the information acquisition output module to scan the first invoice;
step 1-2: from the second invoice as the current invoice to the Nth invoice as the current invoice, the information acquisition and output module controls the scanner to scan the current invoice and simultaneously identifies the invoice image of the previous invoice sent by the scanner;
step 1-3: and the information acquisition and output module identifies the invoice image of the Nth invoice sent by the scanner.
The step 1-2 is a loop step, when the nth invoice is used as the current invoice, the information acquisition output module controls the scanner to scan the nth invoice, and simultaneously identifies the invoice image of the (N-1) th invoice sent by the scanner, after the step is finished, only the invoice image of the nth invoice is not identified, so that the step 1-3 is executed to identify the invoice image of the nth invoice to complete the identification task of the invoice image.
In practical applications, the above steps 1-1 to 1-3 can be implemented by multithreading.
The information acquisition output module can combine the invoice plaintext and invoice ciphertext of the N invoices into an invoice data information data packet at one time and send the invoice data information packet to the server after the invoice images of the N invoices are completely identified, and can also combine the invoice plaintext and invoice ciphertext of the invoice into invoice data information to send the invoice data information to the server after the identification of one invoice image is completed.
It should be noted that the invention does not exclude the active query of the information acquisition and output module on the invoice authenticity information, that is, after the information acquisition and output module sends the invoice data information to the server, the invention can actively send the query request of the invoice authenticity information to the server, and does not need to passively wait for the server to send the invoice authenticity information back.
It can be seen that the present invention has the following advantages:
(1) in the invention, the information acquisition and output module controls the scanner connected with the information acquisition and output module to scan the invoice, the invoice plaintext and the invoice ciphertext can be combined into invoice data information to be directly sent to the server after the obtained invoice image is identified, the server can select an idle decryption machine in real time to decrypt the invoice ciphertext so as to judge the authenticity of the invoice, and after the judgment is finished, the server can send the authenticity information of the invoice to the information acquisition and output module in real time for output. Therefore, by utilizing the technology provided by the invention, all the steps from the invoice scanning to the invoice true and false information obtaining of each enterprise are carried out in real time, compared with the situation that the invoice true and false information can only be obtained after waiting for a period of time in the prior art, the invention greatly improves the invoice true and false verification efficiency, meanwhile, the server selects an idle decryption machine in real time for decryption processing, compared with the situation that the decryption machines are used in turn according to the serial numbers of the decryption machines in the prior art, the utilization efficiency of the decryption machines in the invention is greatly improved, and the invoice true and false verification efficiency is further improved.
(2) In the invention, the information acquisition and output module can encrypt and compress invoice data information combined by the invoice plaintext and the invoice ciphertext, thereby improving the safety and speed of data transmission and indirectly improving the invoice authenticity verification efficiency of the invention.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. A system for verifying the authenticity of an invoice in real time, the system comprising: the system comprises a scanner, an information acquisition and output module, a server and a decryption machine; wherein,
each enterprise needing to verify the authenticity of the invoice is internally provided with a scanner and an information acquisition and output module connected with the scanner;
the server and more than two decryption machines are arranged in the tax bureau, and the server is respectively connected with each decryption machine;
each information acquisition output module is respectively connected with the server;
the information acquisition output module controls a scanner connected with the information acquisition output module to scan the invoice, identifies the obtained invoice image, and combines the invoice plaintext and the invoice ciphertext obtained by identification into invoice data information to be sent to the server; the server selects a decryption machine in an idle state as an appointed decryption machine to decrypt the invoice ciphertext in the received invoice data information; and the server judges whether invoice decryption information obtained by decryption is the same as the invoice plaintext, if so, the information that the invoice corresponding to the invoice data information is a true invoice is sent to the information acquisition and output module for output, and if not, the information that the invoice corresponding to the invoice data information is a false invoice is sent to the information acquisition and output module for output.
2. The system of claim 1, wherein the server comprises a firewall, a reception server, a gatekeeper and a processing server which are connected in sequence;
the firewall is respectively connected with each information acquisition output module and is used for preventing illegal invasion;
the acceptance server forwards the invoice data information passing through the firewall to the gatekeeper;
the processing server is connected with each decryption machine respectively and is used for selecting one decryption machine in an idle state as an appointed decryption machine to decrypt invoice ciphertext in invoice data information passing through the network gate, judging whether the invoice decryption information decrypted by the appointed decryption machine is the same as invoice plaintext, if so, sending the information of the invoice corresponding to the invoice data information as a true invoice to the information acquisition and output module through the network gate, the acceptance server and the firewall in sequence for output, and if not, sending the information of the invoice corresponding to the invoice data information as a false invoice to the information acquisition and output module through the network gate, the acceptance server and the firewall in sequence for output.
3. The system according to claim 2, further comprising a memory connected to the processing server for receiving and storing the invoice decryption information sent from the processing server when the processing server determines that the invoice decryption information is identical to the invoice plaintext.
4. The system according to claim 1, wherein the information acquisition output module is further configured to determine whether the invoice image scanned by the scanner meets an invoice rule, if yes, combine the invoice plaintext and invoice ciphertext obtained through identification into invoice data information, and send the invoice data information to the server, otherwise, delete the invoice image, and control the scanner connected thereto to scan the invoice again.
5. The system according to claim 1, wherein the information acquisition output module is further configured to encrypt invoice data information that is a combination of the invoice plaintext and the invoice ciphertext, and send the obtained encrypted invoice data information to the server;
the server is also used for decrypting the received encrypted invoice data information.
6. The system according to claim 1, wherein the information acquisition output module is further configured to compress invoice data information that is a combination of the invoice plaintext and the invoice ciphertext, and send the obtained compressed invoice data information to the server;
the server is also used for decompressing the received compressed invoice data information.
7. A method for verifying the authenticity of an invoice in real time, the method being based on the system of claim 1; the method is characterized by comprising the following steps:
step 1: the information acquisition output module controls a scanner connected with the information acquisition output module to scan the invoice, identifies the obtained invoice image, and combines the invoice plaintext and the invoice ciphertext obtained by identification into invoice data information to be sent to the server;
step 2: the server selects a decryption machine in an idle state as an appointed decryption machine to decrypt the invoice ciphertext in the received invoice data information;
and step 3: and the server judges whether invoice decryption information obtained by decryption is the same as the invoice plaintext, if so, the information that the invoice corresponding to the invoice data information is a true invoice is sent to the information acquisition and output module for output, and if not, the information that the invoice corresponding to the invoice data information is a false invoice is sent to the information acquisition and output module for output.
8. The method according to claim 7, wherein in step 3, the server further sends the invoice decryption information to a memory for storage when judging that the invoice decryption information obtained by decryption is the same as the invoice plaintext.
9. The method according to claim 7, wherein in step 1, after the information acquisition and output module identifies the invoice image, before the invoice image obtained by identification is combined into invoice data information and sent to a server, the information acquisition and output module further determines whether the invoice image meets an invoice rule, if so, the invoice image obtained by identification is combined into the invoice data information and sent to the server, otherwise, the invoice image is deleted, and a scanner connected with the invoice image is controlled to scan the invoice again.
10. The method according to claim 7, wherein the invoice is N invoices, N being a positive integer not less than 2;
in the step 1, the information acquisition output module controls the scanner connected with the information acquisition output module to scan the invoice, and the method for identifying the obtained invoice image comprises the following steps:
the information acquisition output module controls a scanner connected with the information acquisition output module to scan the first invoice;
from the second invoice serving as the current invoice to the Nth invoice serving as the current invoice, the information acquisition and output module controls the scanner to scan the current invoice and simultaneously identifies an invoice image of the previous invoice sent by the scanner;
and the information acquisition and output module identifies the invoice image of the Nth invoice sent by the scanner.
CN201210228845.7A 2012-07-02 2012-07-02 A kind of system and method for the true and false of real-time verification invoice Active CN103530932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210228845.7A CN103530932B (en) 2012-07-02 2012-07-02 A kind of system and method for the true and false of real-time verification invoice

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210228845.7A CN103530932B (en) 2012-07-02 2012-07-02 A kind of system and method for the true and false of real-time verification invoice

Publications (2)

Publication Number Publication Date
CN103530932A true CN103530932A (en) 2014-01-22
CN103530932B CN103530932B (en) 2016-01-13

Family

ID=49932909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210228845.7A Active CN103530932B (en) 2012-07-02 2012-07-02 A kind of system and method for the true and false of real-time verification invoice

Country Status (1)

Country Link
CN (1) CN103530932B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530929A (en) * 2012-07-02 2014-01-22 航天信息股份有限公司 Method for scheduling decryption machines
CN104299312A (en) * 2014-11-11 2015-01-21 重庆远见信息产业集团有限公司 Invoice verification method
CN104299311A (en) * 2014-10-16 2015-01-21 浪潮软件集团有限公司 Method for self-service invoice verification through two-dimensional code
CN106228675A (en) * 2016-07-22 2016-12-14 金蝶软件(中国)有限公司 The method and apparatus identifying true from false of bills
CN106302699A (en) * 2016-08-11 2017-01-04 广州慧睿思通信息科技有限公司 A kind of method processing many deciphering machines PC end task of decryption
CN107729058A (en) * 2017-10-20 2018-02-23 四川长虹电器股份有限公司 A kind of method of automatic parsing VAT invoice recognition result
CN109887153A (en) * 2019-02-03 2019-06-14 国信电子票据平台信息服务有限公司 A kind of property tax processing method and processing system
CN110288755A (en) * 2019-05-21 2019-09-27 平安银行股份有限公司 The invoice method of inspection, server and storage medium based on text identification
CN111105548A (en) * 2019-12-13 2020-05-05 远光软件股份有限公司 Batch checking device and method for value-added tax special invoices
CN113420084A (en) * 2021-06-07 2021-09-21 广东辰宜信息科技有限公司 Block chain system

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS57111691A (en) * 1980-12-27 1982-07-12 Fujitsu Ltd System for discriminating truth or falsehood of ticket
CN1107990A (en) * 1995-01-26 1995-09-06 中国航天工业总公司 Anti-fake biller, identifier and their anbi-fake, identifying method
JPH09183287A (en) * 1995-12-28 1997-07-15 Nippon Kayaku Co Ltd Article and method for examining genuineness of article
WO1998016034A1 (en) * 1996-10-10 1998-04-16 Protocall Technologies, Inc. Secured electronic information delivery system having a three-tier structure
JP2001051951A (en) * 1999-08-16 2001-02-23 Nippon Telegr & Teleph Corp <Ntt> System and method for distributing electronic data, recipient terminal for electronic data and program recording medium for the recipient terminal
JP2001222734A (en) * 2000-02-14 2001-08-17 Sports Station:Kk Merchandise recognition card and its authenticating method
CN1369850A (en) * 2002-02-22 2002-09-18 何长杰 Receipt discriminating system and method
CN1374607A (en) * 2001-03-08 2002-10-16 深圳市金大陆通信技术有限公司 Value added tax invoice making, confirming and checking method and its information management system
CN1417710A (en) * 2001-11-10 2003-05-14 付振洲 Commodity, Bill and certificate anti-fake method and system and special transceiver
JP2003187292A (en) * 2001-12-14 2003-07-04 Printing Bureau Ministry Of Finance Method and system for certifying print, and print in which identification information and visible information are padded
CN1567340A (en) * 2003-06-23 2005-01-19 中国科学院研究生院 False proof bill, false proof method of bill and system thereof
US20050038756A1 (en) * 2000-05-24 2005-02-17 Nagel Robert H. System and method for production and authentication of original documents
CN1588843A (en) * 2004-09-15 2005-03-02 华南理工大学 Forming and verifying system and method for bill anti-fake code
CN1848144A (en) * 2005-04-12 2006-10-18 盐城市小康企业发展有限公司 Electronic bill management system and electronic bill management device thereof
CN1967601A (en) * 2005-11-18 2007-05-23 珠海金联安警用技术研究发展中心有限公司 Automatic bill identifying and processing system based on bill map and system thereof
CN101101660A (en) * 2006-07-05 2008-01-09 航天信息股份有限公司 Bill false-proof method and its system
CN201222274Y (en) * 2008-02-03 2009-04-15 湖南涣清信息技术有限责任公司 Portable invoice identifier
CN101751712A (en) * 2008-11-27 2010-06-23 航天信息股份有限公司 Centralized invoice authentification system and authentification method
CN101819703A (en) * 2010-04-16 2010-09-01 北京汉信码科技有限公司 Terminal equipment special for online invoice verification and verification method thereof
CN102289770A (en) * 2010-06-19 2011-12-21 梁军 Online real-time anti-counterfeit and tax-control method for special value added tax (VAT) invoices
CN102479412A (en) * 2010-11-26 2012-05-30 航天信息股份有限公司 Method and system for processing network billing data, tax control device and acceptance server

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS57111691A (en) * 1980-12-27 1982-07-12 Fujitsu Ltd System for discriminating truth or falsehood of ticket
CN1107990A (en) * 1995-01-26 1995-09-06 中国航天工业总公司 Anti-fake biller, identifier and their anbi-fake, identifying method
JPH09183287A (en) * 1995-12-28 1997-07-15 Nippon Kayaku Co Ltd Article and method for examining genuineness of article
WO1998016034A1 (en) * 1996-10-10 1998-04-16 Protocall Technologies, Inc. Secured electronic information delivery system having a three-tier structure
JP2001051951A (en) * 1999-08-16 2001-02-23 Nippon Telegr & Teleph Corp <Ntt> System and method for distributing electronic data, recipient terminal for electronic data and program recording medium for the recipient terminal
JP2001222734A (en) * 2000-02-14 2001-08-17 Sports Station:Kk Merchandise recognition card and its authenticating method
US20050038756A1 (en) * 2000-05-24 2005-02-17 Nagel Robert H. System and method for production and authentication of original documents
CN1374607A (en) * 2001-03-08 2002-10-16 深圳市金大陆通信技术有限公司 Value added tax invoice making, confirming and checking method and its information management system
CN1417710A (en) * 2001-11-10 2003-05-14 付振洲 Commodity, Bill and certificate anti-fake method and system and special transceiver
JP2003187292A (en) * 2001-12-14 2003-07-04 Printing Bureau Ministry Of Finance Method and system for certifying print, and print in which identification information and visible information are padded
CN1369850A (en) * 2002-02-22 2002-09-18 何长杰 Receipt discriminating system and method
CN1567340A (en) * 2003-06-23 2005-01-19 中国科学院研究生院 False proof bill, false proof method of bill and system thereof
CN1588843A (en) * 2004-09-15 2005-03-02 华南理工大学 Forming and verifying system and method for bill anti-fake code
CN1848144A (en) * 2005-04-12 2006-10-18 盐城市小康企业发展有限公司 Electronic bill management system and electronic bill management device thereof
CN1967601A (en) * 2005-11-18 2007-05-23 珠海金联安警用技术研究发展中心有限公司 Automatic bill identifying and processing system based on bill map and system thereof
CN101101660A (en) * 2006-07-05 2008-01-09 航天信息股份有限公司 Bill false-proof method and its system
CN201222274Y (en) * 2008-02-03 2009-04-15 湖南涣清信息技术有限责任公司 Portable invoice identifier
CN101751712A (en) * 2008-11-27 2010-06-23 航天信息股份有限公司 Centralized invoice authentification system and authentification method
CN101819703A (en) * 2010-04-16 2010-09-01 北京汉信码科技有限公司 Terminal equipment special for online invoice verification and verification method thereof
CN102289770A (en) * 2010-06-19 2011-12-21 梁军 Online real-time anti-counterfeit and tax-control method for special value added tax (VAT) invoices
CN102479412A (en) * 2010-11-26 2012-05-30 航天信息股份有限公司 Method and system for processing network billing data, tax control device and acceptance server

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530929A (en) * 2012-07-02 2014-01-22 航天信息股份有限公司 Method for scheduling decryption machines
CN103530929B (en) * 2012-07-02 2015-11-18 航天信息股份有限公司 A kind of method of dispatching deciphering machine
CN104299311A (en) * 2014-10-16 2015-01-21 浪潮软件集团有限公司 Method for self-service invoice verification through two-dimensional code
CN104299312A (en) * 2014-11-11 2015-01-21 重庆远见信息产业集团有限公司 Invoice verification method
CN106228675A (en) * 2016-07-22 2016-12-14 金蝶软件(中国)有限公司 The method and apparatus identifying true from false of bills
CN106302699B (en) * 2016-08-11 2019-12-27 广州慧睿思通信息科技有限公司 Method for processing decryption tasks of PC (personal computer) ends of multiple decryptors
CN106302699A (en) * 2016-08-11 2017-01-04 广州慧睿思通信息科技有限公司 A kind of method processing many deciphering machines PC end task of decryption
CN107729058A (en) * 2017-10-20 2018-02-23 四川长虹电器股份有限公司 A kind of method of automatic parsing VAT invoice recognition result
CN109887153A (en) * 2019-02-03 2019-06-14 国信电子票据平台信息服务有限公司 A kind of property tax processing method and processing system
CN110288755A (en) * 2019-05-21 2019-09-27 平安银行股份有限公司 The invoice method of inspection, server and storage medium based on text identification
CN111105548A (en) * 2019-12-13 2020-05-05 远光软件股份有限公司 Batch checking device and method for value-added tax special invoices
CN113420084A (en) * 2021-06-07 2021-09-21 广东辰宜信息科技有限公司 Block chain system
CN113420084B (en) * 2021-06-07 2023-09-26 广东辰宜信息科技有限公司 Block chain system

Also Published As

Publication number Publication date
CN103530932B (en) 2016-01-13

Similar Documents

Publication Publication Date Title
CN103530932B (en) A kind of system and method for the true and false of real-time verification invoice
CN1134161C (en) Method for providing a secure communication between two devices and application of this method
CN104765999B (en) Method, terminal and server for processing user resource information
JP4813006B2 (en) Secure packet-based data broadcasting architecture
CN112150147A (en) Data security storage system based on block chain
CN110062382B (en) Identity verification method, client, relay equipment and server
CN103532711A (en) Encryption data transmission based real-time invoice authentication method and system
CN109151508B (en) Video encryption method
CN102724207A (en) Method and device for transmitting/processing service request, client end and service end
CN109005027B (en) Random data encryption and decryption method, device and system
CN102956005A (en) Anti-counterfeiting method, anti-counterfeiting system and packaging structure
CN113542428B (en) Vehicle data uploading method and device, vehicle, system and storage medium
CN113630407A (en) Method and system for enhancing transmission security of MQTT protocol by using symmetric cryptographic technology
CN110401673B (en) Method and device for safely transmitting data between networks
CN102055580A (en) Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN109802974A (en) A kind of unidirectional safe transmission method of data based on public key cryptography
CN107294704B (en) Password generation method, password execution method and terminal
CN111415252A (en) Privacy transaction processing method and device based on block chain
CN112738037B (en) Data encryption communication method
CN107104888B (en) Safe instant messaging method
CN103530929B (en) A kind of method of dispatching deciphering machine
CN115426627B (en) Industrial Internet of things data acquisition box based on 5G network
CN115913783A (en) Data encryption and decryption method and device based on Soc chip
CN115085926A (en) Data acquisition method and system based on block chain and Internet of things data aggregation gateway
CN115168918A (en) Method, transceiving equipment and system for realizing data secure transmission based on Hash algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant