CN110874790A - Certificate association management method and device - Google Patents

Certificate association management method and device Download PDF

Info

Publication number
CN110874790A
CN110874790A CN201911100452.6A CN201911100452A CN110874790A CN 110874790 A CN110874790 A CN 110874790A CN 201911100452 A CN201911100452 A CN 201911100452A CN 110874790 A CN110874790 A CN 110874790A
Authority
CN
China
Prior art keywords
certificate
credential
information
association
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911100452.6A
Other languages
Chinese (zh)
Inventor
周颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wanghai Kangxin Beijing Technology Co Ltd
Original Assignee
Wanghai Kangxin Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wanghai Kangxin Beijing Technology Co Ltd filed Critical Wanghai Kangxin Beijing Technology Co Ltd
Priority to CN201911100452.6A priority Critical patent/CN110874790A/en
Publication of CN110874790A publication Critical patent/CN110874790A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a certificate association management method and a device, wherein the method comprises the following steps: recording the certificate information, the associated identification and the associated information of each certificate, wherein the certificate information comprises the certificate identification of each certificate, and when the associated identification is the first identification, the associated information comprises the certificate identification of each certificate associated with each certificate; when a voucher viewing request is input from the outside, corresponding vouchers are determined from the recorded vouchers, and voucher information and associated identifications of the vouchers are displayed; when an associated information viewing request aiming at any certificate with the associated identifier as a first identifier is input externally, displaying first associated information of the certificate; when an association canceling request aiming at any target certificate mark is input externally, updating the first association information to ensure that the first association information does not include the target certificate mark; the credential revocation status for the first credential and the credential having the target credential identification is changed from a completed state to a to-be-completed state. Therefore, the scheme can solve the problem of certificate association errors.

Description

Certificate association management method and device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a credential association management method and apparatus.
Background
In the financial management process, for each project, an original certificate to be verified is first generated. As the project progresses, based on the generated original credentials, other credentials may also be generated, each associated with the original credentials, via user on-demand operations.
Currently, one original credential may be associated with multiple other credentials based on user operations. Based on the association relationship between the certificates, the related staff can perform certificate verification and other processes.
However, when establishing the association relationship of the certificate, if the association is wrong due to an artificial error operation, the reversible operation cannot be performed.
Disclosure of Invention
The invention provides a certificate association management method and device, which can solve the problem of certificate association errors.
In order to achieve the purpose, the invention is realized by the following technical scheme:
in one aspect, the present invention provides a credential association management method, including:
recording credential information, association identification and association information of at least one credential, wherein the credential information includes a credential identification of the credential, and when the association identification is a first identification, the association information includes a credential identification of each credential associated with the credential;
receiving a voucher viewing request input from the outside;
determining, from the at least one credential, respective credentials corresponding to the credential viewing request;
displaying the determined voucher information and the associated identification of each voucher;
receiving an externally input association information viewing request aiming at any one of the displayed first certificates, wherein the association identifier of the first certificate is the first identifier;
displaying first associated information of the first certificate according to the associated information viewing request;
receiving an externally input disassociation request aiming at any target certificate identifier in the displayed first association information;
updating the recorded first association information according to the association canceling request, so that the first association information does not include the target certificate identification;
and changing the certificate verification state aiming at the first certificate and the target certificate from a completion state to a to-be-completed state, wherein the certificate identification of the target certificate is the target certificate identification.
Further, after the updating the first associated information of the record, further comprising: and judging whether the at least one certificate comprises the target certificate, if so, updating the recorded associated information of the target certificate, so that the associated information of the target certificate does not comprise the certificate identifier of the first certificate.
Further, the method further comprises: recording a credential attribute of the at least one credential;
and after the updating of the recorded first association information, further comprising:
receiving an externally input request for deleting the target certificate identification;
judging whether the at least one certificate comprises the target certificate or not according to the certificate deleting request, if so, continuing the current process;
and judging whether the certificate attribute of the target certificate is the original certificate, if so, displaying prompt information for prompting that the original certificate is forbidden to be deleted, and ending the current process, otherwise, deleting the recorded target certificate.
Further, the method further comprises: recording a credential attribute of the at least one credential;
showing the determined certificate attribute of each certificate;
receiving a certificate generation request which is input externally and aims at any one second certificate displayed, wherein the certificate attribute of the second certificate is an original certificate;
receiving externally input information required for credential generation of the credential generation request;
generating required information according to the certificate, and generating and recording certificate information of a third certificate;
recording the certificate attribute of the third certificate as a non-original certificate, recording the association identifier of the third certificate as the first identifier, and recording the association information of the third certificate as the certificate identifier of the second certificate;
updating the recorded associated information of the second certificate, so that the associated information of the second certificate comprises a certificate identifier of the third certificate;
recording a credential revocation status for the second credential and the third credential as a completion status.
Further, the method further comprises: recording a credential type of the at least one credential;
the changing the credential revocation status for the first credential and the target credential from a completion status to a to-do status comprises:
determining a credential type for the first credential and the target credential;
when the determined certificate type is the current verification, the certificate verification state of the first certificate and the target certificate is changed from verified verification to non-verified verification;
when the determined certificate type is the pre-submission, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the pre-submission to the pre-submission;
and when the determined certificate type is to be shared, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the sharing to the sharing.
In another aspect, the present invention provides a credential association management apparatus, including:
the recording unit is used for recording the certificate information, the association identifier and the association information of at least one certificate, wherein the certificate information comprises the certificate identifier of the certificate, and when the association identifier is a first identifier, the association information comprises the certificate identifier of each certificate associated with the certificate;
the receiving unit is used for receiving a voucher viewing request input from the outside; receiving an externally input association information viewing request aiming at any one of the displayed first certificates, wherein the association identifier of the first certificate is the first identifier; receiving an externally input disassociation request aiming at any target certificate identifier in the displayed first association information;
a processing unit, configured to determine, from the at least one credential, respective credentials corresponding to the credential viewing request; displaying the determined voucher information and the associated identification of each voucher; displaying first associated information of the first certificate according to the associated information viewing request; updating the recorded first association information according to the association canceling request, so that the first association information does not include the target certificate identification; and changing the certificate verification state aiming at the first certificate and the target certificate from a completion state to a to-be-completed state, wherein the certificate identification of the target certificate is the target certificate identification.
Further, the processing unit is further configured to determine whether the at least one credential includes the target credential, and if so, update the recorded association information of the target credential, so that the association information of the target credential does not include the credential identifier of the first credential.
Further, the recording unit is further configured to record a credential attribute of the at least one credential;
the receiving unit is further used for receiving a deletion certificate request aiming at the target certificate identification, which is input externally;
the processing unit is further configured to determine, according to the request for deleting a credential, whether the at least one credential includes the target credential, if so, determine whether a credential attribute of the target credential is an original credential, if so, display a prompt message for prompting the original credential to prohibit deletion, and end the process, and if not, delete the recorded target credential.
Further, the recording unit is further configured to record a credential attribute of the at least one credential;
the receiving unit is further configured to receive a credential generation request for any one of the displayed second credentials, the credential attribute of the second credentials being an original credential, the request being input from outside; receiving externally input information required for credential generation of the credential generation request;
the processing unit is further used for displaying the determined certificate attribute of each certificate; generating required information according to the certificate, and generating and recording certificate information of a third certificate; recording the certificate attribute of the third certificate as a non-original certificate, recording the association identifier of the third certificate as the first identifier, and recording the association information of the third certificate as the certificate identifier of the second certificate; updating the recorded associated information of the second certificate, so that the associated information of the second certificate comprises a certificate identifier of the third certificate; recording a credential revocation status for the second credential and the third credential as a completion status.
Further, the recording unit is further configured to record a credential type of the at least one credential;
the processing unit is further configured to determine a credential type of the first credential and the target credential; when the determined certificate type is the current verification, the certificate verification state of the first certificate and the target certificate is changed from verified verification to non-verified verification; when the determined certificate type is the pre-submission, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the pre-submission to the pre-submission; and when the determined certificate type is to be shared, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the sharing to the sharing.
The invention provides a certificate association management method and a device, wherein the method comprises the following steps: recording the certificate information, the associated identification and the associated information of each certificate, wherein the certificate information comprises the certificate identification of each certificate, and when the associated identification is the first identification, the associated information comprises the certificate identification of each certificate associated with each certificate; when a voucher viewing request is input from the outside, corresponding vouchers are determined from the recorded vouchers, and voucher information and associated identifications of the vouchers are displayed; when an associated information viewing request aiming at any certificate with the associated identifier as a first identifier is input externally, displaying first associated information of the certificate; when an association canceling request aiming at any target certificate mark is input externally, updating the first association information to ensure that the first association information does not include the target certificate mark; the credential revocation status for the first credential and the credential having the target credential identification is changed from a completed state to a to-be-completed state. Therefore, the invention can solve the problem of certificate association error.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a credential association management method according to an embodiment of the present invention;
FIG. 2 is a flowchart of another credential association management method provided by an embodiment of the invention;
fig. 3 is a schematic diagram of a credential association management device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a credential association management method, which may include the following steps:
step 101: recording the credential information, the association identifier and the association information of at least one credential, wherein the credential information includes the credential identifier of the credential, and when the association identifier is the first identifier, the association information includes the credential identifier of each credential associated with the credential.
Step 102: and receiving a credential viewing request input externally.
Step 103: determining, from the at least one credential, respective credentials corresponding to the credential viewing request.
Step 104: and displaying the determined voucher information and the associated identification of each voucher.
Step 105: and receiving an externally input association information viewing request aiming at any one of the displayed first certificates, wherein the association identifier of the first certificate is the first identifier.
Step 106: and displaying the first associated information of the first certificate according to the associated information viewing request.
Step 107: and receiving an externally input disassociation request aiming at any target certificate identifier in the first association information.
Step 108: and updating the recorded first association information according to the disassociation request, so that the first association information does not include the target certificate identification.
Step 109: and changing the certificate verification state aiming at the first certificate and the target certificate from a completion state to a to-be-completed state, wherein the certificate identification of the target certificate is the target certificate identification.
The certificate association management method provided by the embodiment of the invention comprises the following steps: recording the certificate information, the associated identification and the associated information of each certificate, wherein the certificate information comprises the certificate identification of each certificate, and when the associated identification is the first identification, the associated information comprises the certificate identification of each certificate associated with each certificate; when a voucher viewing request is input from the outside, corresponding vouchers are determined from the recorded vouchers, and voucher information and associated identifications of the vouchers are displayed; when an associated information viewing request aiming at any certificate with the associated identifier as a first identifier is input externally, displaying first associated information of the certificate; when an association canceling request aiming at any target certificate mark is input externally, updating the first association information to ensure that the first association information does not include the target certificate mark; the credential revocation status for the first credential and the credential having the target credential identification is changed from a completed state to a to-be-completed state. Therefore, the embodiment of the invention can solve the problem of certificate association error.
In detail, the credential information of a credential may include the credential content and the credential identification of the credential. The credential identification is used by the system to quickly distinguish or locate different credentials, the credential content can facilitate the user to quickly learn the origin relationship of the credentials, and the like.
For example, the credential identifier may be a combination of words, letters, and numbers, and has a unique identification function. The credential content may include: the voucher date, the number of accessories of the voucher, the digest of the voucher, financial accounting, budget accounting, billing person, auditor, bookkeeper, error proofing information, whether to mark, time difference. Wherein, the financial accounting and the budget accounting both comprise debit amount and credit amount; whether the content of such an item is tagged or untagged; the content of the item of time difference may be of the revenue and expenditure class or of the non-revenue and expenditure class.
In detail, the association identifier is used for identifying the association condition of the certificate and other certificates. For example, when a credential is associated with another credential, the associated identifier of the credential is the first identifier, such as yes. If the association flag is yes, the association information is not null, and may be, for example, a credential flag of another credential associated with the credential. Otherwise, when the credential is not associated with other credentials, the association identifier of the credential is not the first identifier, such as no. If the association flag is negative, the credential may not be associated with other credentials, so the association information may be null.
Some or all of which may be accessed by the user as desired for the credentials recorded by the system. As such, the user may issue a credential viewing request, such as viewing a particular date of a credential, viewing a particular type of credential, and so forth. Therefore, the voucher viewing request usually carries one or more request items, and based on the request items, the system can screen out each voucher corresponding to the voucher viewing request from all the recorded vouchers to serve as the voucher to be displayed.
After the certificates to be displayed are determined, the certificate information and the associated identification of each determined certificate can be displayed through a front-end display interface.
By displaying the association identifier, the user can intuitively know whether each displayed certificate is associated with other certificates. According to the association identifier, the user can view the association information of the certificates associated with other certificates according to the need.
For example, according to the display content, the user can see that the association identifier of the credential a is yes, so that the user can click on the association identifier to issue an association information query request for the credential a to request to view the association information of the credential a.
In an embodiment of the present invention, when the values of the association identifiers are different, the presentation manner of the association identifiers may be different. For example, when the association identifier is yes, the association identifier may be a hyperlink with a specific color, so that the user can visually distinguish different association identifiers, and the hyperlink can be directly clicked to send out an association information viewing request for the corresponding credential. Therefore, the hyperlink can be connected to the associated information of the certificate, and when the user clicks the hyperlink, the system can display the connected associated information by using a new window on the display interface. Otherwise, when the association identifier is negative, the association identifier may be displayed in other colors, and the display is "no".
Assuming that the certificate a is associated with the certificate B, the system may present the association information of the certificate a, and the presented content may include at least the certificate identifier of the certificate B. Of course, in other embodiments of the present invention, the displayed content of the associated information may also include other items, such as the voucher date of the voucher, etc.
If the association between the certificate A and the certificate B is wrong, the user can select the certificate identifier of the displayed certificate B and send out an association canceling request. For example, a button for canceling the association function may be displayed on the display interface, and when the user selects the credential identifier of the credential B and clicks the button, the system may regard that the user requests to cancel the association relationship between the credential a and the credential B. Thus, the system can cancel the association relationship between the credential a and the credential B, and specifically, can clear the credential identifier of the credential B in the association information of the credential a.
Correspondingly, after the system updates the associated information of the certificate a, it can be determined whether the associated information is empty, if so, the associated identifier of the certificate a is further updated, and if not, the associated identifier of the certificate a is changed to be not, otherwise, the associated identifier of the certificate a does not need to be updated.
In general, two certificates are associated to each other, which usually means that a worker has checked and sold the two certificates, so that if the association relationship is cancelled, the states of checking and selling the certificates of the two certificates can be rolled back, and the states are changed from the completion state to the to-be-completed state, so as to maintain the consistency of various information.
Therefore, when the worker mistakenly associates the two certificates due to a mistake or other reasons, the association relationship can be withdrawn to restore the condition before association, and the subsequent normal operation is not influenced.
Based on the above, by looking at the associated information of the certificate a, after canceling the record of the certificate identifier of the certificate B in the associated information, the association relationship between the two is released, so to maintain the information consistency, the associated information of the certificate B is usually updated so as not to include the certificate identifier of the certificate a.
Considering that the credential a operated by the user is a credential recorded by the system in advance, and the credential verification and cancellation usually involve both parties of verification and cancellation, such as a buyer and a seller, there may be a case where the system does not record the credential B and the credential B is recorded by other systems. Thus, to update the associated information of the credential B, it can be determined whether the credential is recorded.
Based on this problem, in an embodiment of the present invention, after the updating the first association information of the record, the method further includes: and judging whether the at least one certificate comprises the target certificate, if so, updating the recorded associated information of the target certificate, so that the associated information of the target certificate does not comprise the certificate identifier of the first certificate.
Based on the above example, if the system has recorded the certificate B in advance, it indicates that the system has the authority to operate the certificate a and the certificate B simultaneously, so the associated information of the certificate B can be directly updated, so that the certificate identifier of the certificate a is not included therein. Otherwise, if the result is negative, it indicates that the system does not record the credential B, and does not have the right to operate the credential B, so that other execution entities can be triggered to execute the operation. For example, a notification message may be sent to an executing agent that has authority to operate credential B to disassociate credential A from credential B, such that it may be processed accordingly.
Based on the above, the user can delete the certificate B as required after canceling the association between the certificate a and the certificate B. Considering that the original credential is generally not deletable, if the user requests deletion of credential B, the system may further determine the credential attributes of credential B before deleting credential B.
Based on this problem, in an embodiment of the present invention, the method may further include: recording a credential attribute of the at least one credential;
and after the updating of the recorded first association information, further comprising:
receiving an externally input request for deleting the target certificate identification;
judging whether the at least one certificate comprises the target certificate or not according to the certificate deleting request, if so, continuing the current process;
and judging whether the certificate attribute of the target certificate is the original certificate, if so, displaying prompt information for prompting that the original certificate is forbidden to be deleted, and ending the current process, otherwise, deleting the recorded target certificate.
In detail, for any credential, when the credential is an original credential, the system may record its credential attribute as the original credential, whereas when the credential is not the original credential, the system may record its credential attribute as a non-original credential.
When the user requests to delete any of the credentials, the system may read the recorded information to determine if the credentials are authorized to be deleted. For example, the system may determine whether the recorded credentials are included in all of the recorded credentials, i.e., whether the credentials have been recorded. Specifically, based on the uniqueness of the credential identifier, the system may sequentially determine whether each recorded credential identifier is the same as the credential identifier requested to be deleted by the user, and may attempt to delete the corresponding credential if the recorded credential identifiers are the same as the credential identifier requested to be deleted by the user. Otherwise, if the system determines that the certificate is not authorized to be deleted, the notification information of the certificate can be displayed, so that the user can know the reason of the failure of the certificate deletion.
In detail, for the deletion of the certificate, because the original certificate can not be deleted, when the certificate to be deleted is judged to be recorded, the attribute of the certificate can be further read, whether the certificate is the original certificate or not is determined, if the certificate is not the original certificate, the certificate can be deleted, otherwise, prompt information for prompting the original certificate to prohibit deletion is displayed, so that a user can know the reason of the failure of the deletion of the certificate.
In an embodiment of the present invention, a function button for combining and canceling association and deleting a credential may be displayed on the display interface, and when the user selects the credential identifier of the credential B and clicks the function button, the system may regard that the user requests to cancel the association between the credential a and the credential B and requests to delete the credential B.
The above defines the specific implementation of the certificate association relationship release and deletion, and the generation of the certificate is now defined as follows. In detail, it may be defined that the user may generate a credential for the original credential, the generated credential is naturally a non-original credential, the generated credential is automatically associated with the original credential, and both have completed the verification and the cancellation.
Based on the above, in an embodiment of the present invention, in order to illustrate a possible implementation manner of generating a credential, the method may further include: recording a credential attribute of the at least one credential;
showing the determined certificate attribute of each certificate;
receiving a certificate generation request which is input externally and aims at any one second certificate displayed, wherein the certificate attribute of the second certificate is an original certificate;
receiving externally input information required for credential generation of the credential generation request;
generating required information according to the certificate, and generating and recording certificate information of a third certificate;
recording the certificate attribute of the third certificate as a non-original certificate, recording the association identifier of the third certificate as the first identifier, and recording the association information of the third certificate as the certificate identifier of the second certificate;
updating the recorded associated information of the second certificate, so that the associated information of the second certificate comprises a certificate identifier of the third certificate;
recording a credential revocation status for the second credential and the third credential as a completion status.
In detail, after the user sends out the voucher viewing request, the user can intuitively know each original voucher by displaying the voucher attribute aiming at the related voucher requested to be displayed by the user.
Thus, when any original certificate needs to be verified and cancelled, the user can select the original certificate to send out a certificate generation request. Upon request, the user may further enter information required to generate the voucher, which may generally define the voucher content of the voucher. Thus, based on the information input by the user, the system can generate a new certificate and record the new certificate.
Since the user can check the credential content of the original credential requested by the user, and issue the credential generation request and provide the information required for credential generation, i.e. the user is considered to have completed the verification of the original credential, the generated new credential is automatically associated with the original credential, and the verification status of the corresponding credential is the completed status.
In addition, in order to ensure the information consistency, the associated information of the original certificate needs to be updated so as to include the certificate identifier of the newly generated certificate.
In general, the system updates the relevant information of any recorded voucher, such as the associated identifier and the associated relationship of the voucher, and when the currently displayed content is still the content before updating, the system can update the displayed content in real time so as to keep the content consistent with the updated content, so that the user can timely and intuitively know the change made by the user.
Of course, if the user subsequently finds the association error, the step 105 can be executed to cancel the error association operation.
In detail, the credential type of the credential may be different based on different application scenarios, and there is a difference in correspondence between the recorded credential revocation status. Thus, in one embodiment of the invention, the method may further comprise: recording a credential type of the at least one credential;
the changing the credential revocation status for the first credential and the target credential from a completion status to a to-do status comprises:
determining a credential type for the first credential and the target credential;
when the determined certificate type is the current verification, the certificate verification state of the first certificate and the target certificate is changed from verified verification to non-verified verification;
when the determined certificate type is the pre-submission, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the pre-submission to the pre-submission;
and when the determined certificate type is to be shared, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the sharing to the sharing.
In detail, for the current verification, two implementation modes of current automatic verification and current manual verification can exist.
In detail, when the system makes a change of the certificate verification and cancellation state, the system can read the certificate type of the certificate and correspondingly modify the certificate verification and cancellation state based on the acquired certificate type.
Based on the above, as shown in fig. 2, an embodiment of the present invention provides a credential association management method, which may include the following steps:
step 201: the credential information, credential attributes, credential types, association identifications, and association information for the 100 credentials are recorded.
In detail, the credential information includes a credential identification and a credential content of the credential, and when the association identification is yes, the association information includes a credential identification of each credential with which the credential is associated.
Suppose that the system records 100 certificates, namely certificate 1-certificate 100, and the certificate identifiers are: voucher-001 to voucher-100.
Step 202: and receiving a certificate viewing request which is input externally and requests to view all the certificates.
The system determines that the recorded 100 vouchers are vouchers to be displayed.
Step 203: and showing the recorded credential information, association identification and credential attributes of the 100 credentials.
Because the content of the presentation is more, the presentation can be performed in pages, such as 20 vouchers per page. A total of 5 pages show the 100 credentials.
Step 204: and receiving an externally input association information viewing request aiming at the displayed voucher 1, wherein the association identifier of the voucher 1 is positive.
Assuming that the certificate 1 is an original certificate, the certificate 1 is associated with 3 certificates, i.e. certificate 2 to certificate 4.
Step 205: and displaying the associated information 1 of the voucher 1 according to the associated information viewing request.
Based on the above, 3 voucher identifications of voucher-002, voucher-003, voucher-004 can be presented.
Step 206: receiving externally input certificate identification in association information 1: a disassociation request for credential-002.
Assuming credential 1 and credential 2 are incorrectly associated, a disassociation may be requested.
Step 207: the recorded association information 1 is updated so that the association information 1 does not include the credential-002.
After updating, association information 1 includes only credential-003 and credential-004.
Step 208: updating the recorded associated information of the voucher 2 after judging that the voucher 2 recorded with the voucher identification of-002 does not comprise the voucher identification of the voucher 1: credential-001.
Since the system is recorded with credential 2, its associated information can be updated so that it does not include credential-001. In general, the certificate 2 is not the original certificate, and the association information is usually empty after the certificate 2 is disassociated from the certificate 1, so the association flag can be changed from yes to no.
Step 209: determining the credential type of credential 1 and credential 2 as pre-provisioned, changes the credential revocation status for credential 1 and credential 2 from pre-provisioned to pre-provisioned.
Both are assumed to be pre-submission type credentials.
Step 210: an externally entered delete credential request for credential-002 is received.
Assuming credential 2 is wrong, a deletion may be requested.
Step 211: if the certificate 2 is recorded and the certificate 2 is not the original certificate, the certificate 2 is deleted.
Step 212: an externally entered credential generation request for credential 1 is received.
Since credential 2 is wrong, credential 2 may be deleted and a new credential generated again.
Step 213: and receiving externally input information required for the credential generation of the credential generation request.
Step 214: and generating required information according to the certificate, and generating and recording the certificate information of the new certificate.
For example, the new credential is credential 101, whose credential is identified as credential-101.
Step 215: recording the certificate attribute of the new certificate as a non-original certificate, recording the association identifier of the new certificate as yes, recording the association information of the new certificate as certificate-001, and recording the certificate type of the new certificate as pre-mentioned.
Step 216: the association information for credential 1 is updated so that the association information for credential 1 includes the credential identification of the new credential.
Based on the above, the associated information for voucher 1 includes voucher-003, voucher-004, and voucher-101.
Step 217: determining the credential type of credential 1 and the new credential as pre-mentions, recording the credential revocation status for credential 1 and the new credential as pre-mentions.
As shown in fig. 3, an embodiment of the present invention provides a credential association management apparatus, which may include:
a recording unit 301, configured to record credential information, an association identifier, and association information of at least one credential, where the credential information includes a credential identifier of the credential, and when the association identifier is a first identifier, the association information includes a credential identifier of each credential associated with the credential;
a receiving unit 302, configured to receive a credential viewing request input from outside; receiving an externally input association information viewing request aiming at any one of the displayed first certificates, wherein the association identifier of the first certificate is the first identifier; receiving an externally input disassociation request aiming at any target certificate identifier in the displayed first association information;
a processing unit 303, configured to determine, from the at least one credential, respective credentials corresponding to the credential viewing request; displaying the determined voucher information and the associated identification of each voucher; displaying first associated information of the first certificate according to the associated information viewing request; updating the recorded first association information according to the association canceling request, so that the first association information does not include the target certificate identification; and changing the certificate verification state aiming at the first certificate and the target certificate from a completion state to a to-be-completed state, wherein the certificate identification of the target certificate is the target certificate identification.
In an embodiment of the present invention, the processing unit 303 is further configured to determine whether the at least one credential includes the target credential, and if so, update the recorded associated information of the target credential, so that the associated information of the target credential does not include the credential identifier of the first credential.
In an embodiment of the present invention, the recording unit 301 is further configured to record a credential attribute of the at least one credential;
the receiving unit 302 is further configured to receive an externally input request for deleting the target credential identifier;
the processing unit 303 is further configured to determine, according to the request for deleting a credential, whether the at least one credential includes the target credential, if so, determine whether a credential attribute of the target credential is an original credential, if so, display a prompting message for prompting that the original credential is prohibited from being deleted, and end, and if not, delete the recorded target credential.
In an embodiment of the present invention, the recording unit 301 is further configured to record a credential attribute of the at least one credential;
the receiving unit 302 is further configured to receive a credential generation request for any one of the displayed second credentials, where the credential attribute of the second credential is an original credential, and the credential generation request is input from outside; receiving externally input information required for credential generation of the credential generation request;
the processing unit 303 is further configured to display the determined credential attribute of each credential; generating required information according to the certificate, and generating and recording certificate information of a third certificate; recording the certificate attribute of the third certificate as a non-original certificate, recording the association identifier of the third certificate as the first identifier, and recording the association information of the third certificate as the certificate identifier of the second certificate; updating the recorded associated information of the second certificate, so that the associated information of the second certificate comprises a certificate identifier of the third certificate; recording a credential revocation status for the second credential and the third credential as a completion status.
In an embodiment of the present invention, the recording unit 301 is further configured to record a credential type of the at least one credential;
the processing unit 303, further configured to determine a credential type of the first credential and the target credential; when the determined certificate type is the current verification, the certificate verification state of the first certificate and the target certificate is changed from verified verification to non-verified verification; when the determined certificate type is the pre-submission, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the pre-submission to the pre-submission; and when the determined certificate type is to be shared, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the sharing to the sharing.
Because the information interaction, execution process, and other contents between the units in the device are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
In summary, the embodiments of the present invention have at least the following advantages:
1. in the embodiment of the invention, the certificate association management method comprises the following steps: recording the certificate information, the associated identification and the associated information of each certificate, wherein the certificate information comprises the certificate identification of each certificate, and when the associated identification is the first identification, the associated information comprises the certificate identification of each certificate associated with each certificate; when a voucher viewing request is input from the outside, corresponding vouchers are determined from the recorded vouchers, and voucher information and associated identifications of the vouchers are displayed; when an associated information viewing request aiming at any certificate with the associated identifier as a first identifier is input externally, displaying first associated information of the certificate; when an association canceling request aiming at any target certificate mark is input externally, updating the first association information to ensure that the first association information does not include the target certificate mark; the credential revocation status for the first credential and the credential having the target credential identification is changed from a completed state to a to-be-completed state. Therefore, the embodiment of the invention can solve the problem of certificate association error.
The present invention also provides a computer-readable medium storing instructions for causing a computer to perform a credential association management method as described herein. Specifically, a system or an apparatus equipped with a storage medium on which software program codes that realize the functions of any of the above-described embodiments are stored may be provided, and a computer (or a CPU or MPU) of the system or the apparatus is caused to read out and execute the program codes stored in the storage medium.
In this case, the program code itself read from the storage medium can realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code constitute a part of the present invention.
Examples of the storage medium for supplying the program code include a floppy disk, a hard disk, a magneto-optical disk, an optical disk (e.g., CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD + RW), a magnetic tape, a nonvolatile memory card, and a ROM. Alternatively, the program code may be downloaded from a server computer via a communications network.
Further, it should be clear that the functions of any one of the above-described embodiments may be implemented not only by executing the program code read out by the computer, but also by causing an operating system or the like operating on the computer to perform a part or all of the actual operations based on instructions of the program code.
Further, it is to be understood that the program code read out from the storage medium is written to a memory provided in an expansion board inserted into the computer or to a memory provided in an expansion unit connected to the computer, and then causes a CPU or the like mounted on the expansion board or the expansion unit to perform part or all of the actual operations based on instructions of the program code, thereby realizing the functions of any of the above-described embodiments.
It should be noted that not all steps and modules in the above flows and system structure diagrams are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The system structure described in the above embodiments may be a physical structure or a logical structure, that is, some modules may be implemented by the same physical entity, or some modules may be implemented by a plurality of physical entities, or some components in a plurality of independent devices may be implemented together.
In the above embodiments, the hardware unit may be implemented mechanically or electrically. For example, a hardware element may comprise permanently dedicated circuitry or logic (such as a dedicated processor, FPGA or ASIC) to perform the corresponding operations. The hardware elements may also comprise programmable logic or circuitry, such as a general purpose processor or other programmable processor, that may be temporarily configured by software to perform the corresponding operations. The specific implementation (mechanical, or dedicated permanent, or temporarily set) may be determined based on cost and time considerations.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other similar elements in a process, method, article, or apparatus that comprises the element.
While the invention has been shown and described in detail in the drawings and in the preferred embodiments, it is not intended to limit the invention to the embodiments disclosed, and it will be apparent to those skilled in the art that various combinations of the code auditing means in the various embodiments described above may be used to obtain further embodiments of the invention, which are also within the scope of the invention.

Claims (10)

1. A credential association management method, comprising:
recording credential information, association identification and association information of at least one credential, wherein the credential information includes a credential identification of the credential, and when the association identification is a first identification, the association information includes a credential identification of each credential associated with the credential;
receiving a voucher viewing request input from the outside;
determining, from the at least one credential, respective credentials corresponding to the credential viewing request;
displaying the determined voucher information and the associated identification of each voucher;
receiving an externally input association information viewing request aiming at any one of the displayed first certificates, wherein the association identifier of the first certificate is the first identifier;
displaying first associated information of the first certificate according to the associated information viewing request;
receiving an externally input disassociation request aiming at any target certificate identifier in the displayed first association information;
updating the recorded first association information according to the association canceling request, so that the first association information does not include the target certificate identification;
and changing the certificate verification state aiming at the first certificate and the target certificate from a completion state to a to-be-completed state, wherein the certificate identification of the target certificate is the target certificate identification.
2. The method of claim 1,
after the updating the recorded first association information, further comprising:
and judging whether the at least one certificate comprises the target certificate, if so, updating the recorded associated information of the target certificate, so that the associated information of the target certificate does not comprise the certificate identifier of the first certificate.
3. The method of claim 1,
further comprising: recording a credential attribute of the at least one credential;
and after the updating of the recorded first association information, further comprising:
receiving an externally input request for deleting the target certificate identification;
judging whether the at least one certificate comprises the target certificate or not according to the certificate deleting request, if so, continuing the current process;
and judging whether the certificate attribute of the target certificate is the original certificate, if so, displaying prompt information for prompting that the original certificate is forbidden to be deleted, and ending the current process, otherwise, deleting the recorded target certificate.
4. The method of claim 1,
further comprising: recording a credential attribute of the at least one credential;
showing the determined certificate attribute of each certificate;
receiving a certificate generation request which is input externally and aims at any one second certificate displayed, wherein the certificate attribute of the second certificate is an original certificate;
receiving externally input information required for credential generation of the credential generation request;
generating required information according to the certificate, and generating and recording certificate information of a third certificate;
recording the certificate attribute of the third certificate as a non-original certificate, recording the association identifier of the third certificate as the first identifier, and recording the association information of the third certificate as the certificate identifier of the second certificate;
updating the recorded associated information of the second certificate, so that the associated information of the second certificate comprises a certificate identifier of the third certificate;
recording a credential revocation status for the second credential and the third credential as a completion status.
5. The method according to any one of claims 1 to 4,
further comprising: recording a credential type of the at least one credential;
the changing the credential revocation status for the first credential and the target credential from a completion status to a to-do status comprises:
determining a credential type for the first credential and the target credential;
when the determined certificate type is the current verification, the certificate verification state of the first certificate and the target certificate is changed from verified verification to non-verified verification;
when the determined certificate type is the pre-submission, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the pre-submission to the pre-submission;
and when the determined certificate type is to be shared, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the sharing to the sharing.
6. A credential association management apparatus, comprising:
the recording unit is used for recording the certificate information, the association identifier and the association information of at least one certificate, wherein the certificate information comprises the certificate identifier of the certificate, and when the association identifier is a first identifier, the association information comprises the certificate identifier of each certificate associated with the certificate;
the receiving unit is used for receiving a voucher viewing request input from the outside; receiving an externally input association information viewing request aiming at any one of the displayed first certificates, wherein the association identifier of the first certificate is the first identifier; receiving an externally input disassociation request aiming at any target certificate identifier in the displayed first association information;
a processing unit, configured to determine, from the at least one credential, respective credentials corresponding to the credential viewing request; displaying the determined voucher information and the associated identification of each voucher; displaying first associated information of the first certificate according to the associated information viewing request; updating the recorded first association information according to the association canceling request, so that the first association information does not include the target certificate identification; and changing the certificate verification state aiming at the first certificate and the target certificate from a completion state to a to-be-completed state, wherein the certificate identification of the target certificate is the target certificate identification.
7. The credential association management device according to claim 6,
the processing unit is further configured to determine whether the at least one credential includes the target credential, and if so, update the recorded association information of the target credential, so that the association information of the target credential does not include the credential identifier of the first credential.
8. The credential association management device according to claim 6,
the recording unit is further used for recording the certificate attribute of the at least one certificate;
the receiving unit is further used for receiving a deletion certificate request aiming at the target certificate identification, which is input externally;
the processing unit is further configured to determine, according to the request for deleting a credential, whether the at least one credential includes the target credential, if so, determine whether a credential attribute of the target credential is an original credential, if so, display a prompt message for prompting the original credential to prohibit deletion, and end the process, and if not, delete the recorded target credential.
9. The credential association management device according to claim 6,
the recording unit is further used for recording the certificate attribute of the at least one certificate;
the receiving unit is further configured to receive a credential generation request for any one of the displayed second credentials, the credential attribute of the second credentials being an original credential, the request being input from outside; receiving externally input information required for credential generation of the credential generation request;
the processing unit is further used for displaying the determined certificate attribute of each certificate; generating required information according to the certificate, and generating and recording certificate information of a third certificate; recording the certificate attribute of the third certificate as a non-original certificate, recording the association identifier of the third certificate as the first identifier, and recording the association information of the third certificate as the certificate identifier of the second certificate; updating the recorded associated information of the second certificate, so that the associated information of the second certificate comprises a certificate identifier of the third certificate; recording a credential revocation status for the second credential and the third credential as a completion status.
10. The credential association management device according to any one of claims 6 to 9,
the recording unit is further used for recording the certificate type of the at least one certificate;
the processing unit is further configured to determine a credential type of the first credential and the target credential; when the determined certificate type is the current verification, the certificate verification state of the first certificate and the target certificate is changed from verified verification to non-verified verification; when the determined certificate type is the pre-submission, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the pre-submission to the pre-submission; and when the determined certificate type is to be shared, changing the certificate verification and cancellation state aiming at the first certificate and the target certificate from the completion of the sharing to the sharing.
CN201911100452.6A 2019-11-12 2019-11-12 Certificate association management method and device Pending CN110874790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911100452.6A CN110874790A (en) 2019-11-12 2019-11-12 Certificate association management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911100452.6A CN110874790A (en) 2019-11-12 2019-11-12 Certificate association management method and device

Publications (1)

Publication Number Publication Date
CN110874790A true CN110874790A (en) 2020-03-10

Family

ID=69717922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911100452.6A Pending CN110874790A (en) 2019-11-12 2019-11-12 Certificate association management method and device

Country Status (1)

Country Link
CN (1) CN110874790A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511565A (en) * 2021-01-29 2021-03-16 腾讯科技(深圳)有限公司 Request response method and device, computer readable storage medium and electronic equipment
CN113205318A (en) * 2021-05-28 2021-08-03 金蝶软件(中国)有限公司 Voucher display method, voucher generation device and computer storage medium
CN113205318B (en) * 2021-05-28 2024-07-26 金蝶软件(中国)有限公司 Credential display method, credential generation device and computer storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010061564A (en) * 2008-09-05 2010-03-18 Ricoh Co Ltd Voucher registration system, management server, method for associating voucher and business with each other, and program
CN103577591A (en) * 2013-11-12 2014-02-12 广东金宇恒科技有限公司 Method and device for generating accounting voucher
CN109241116A (en) * 2018-09-29 2019-01-18 金蝶软件(中国)有限公司 A kind of methods of exhibiting and relevant device of service correlation information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010061564A (en) * 2008-09-05 2010-03-18 Ricoh Co Ltd Voucher registration system, management server, method for associating voucher and business with each other, and program
CN103577591A (en) * 2013-11-12 2014-02-12 广东金宇恒科技有限公司 Method and device for generating accounting voucher
CN109241116A (en) * 2018-09-29 2019-01-18 金蝶软件(中国)有限公司 A kind of methods of exhibiting and relevant device of service correlation information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吉康: "金蝶K/3行政事业版V12.2支持政府会计制度综合补丁(PT122180)", 《HTTPS://VIP.KINGDEE.COM/ARTICLE/47741211986427908》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511565A (en) * 2021-01-29 2021-03-16 腾讯科技(深圳)有限公司 Request response method and device, computer readable storage medium and electronic equipment
CN113205318A (en) * 2021-05-28 2021-08-03 金蝶软件(中国)有限公司 Voucher display method, voucher generation device and computer storage medium
CN113205318B (en) * 2021-05-28 2024-07-26 金蝶软件(中国)有限公司 Credential display method, credential generation device and computer storage medium

Similar Documents

Publication Publication Date Title
CN101841618B (en) Information processing apparatus, information processing method
JP2000259477A (en) Data processing system and its program recording medium
US20090177751A1 (en) Mail transmission method
US20110060922A1 (en) License management system
CN105894640B (en) A kind of guest room door lock management method and device
CN105787709A (en) Method of synchronizing multiple system accounts
CN109493087A (en) A kind of method, computer installation and computer readable storage medium based on two dimensional code examination Immovable Property Registration information
JP2009157819A (en) Electronic appliance service system
CN108985659B (en) Method for carrying out approval process and approval node authorization on user
US20120330914A1 (en) Server, inter-business enterprise information control method and computer program
CN105991888A (en) Server device, operation image data providing method and information processing system
US7912859B2 (en) Information processing apparatus, system, and method for managing documents used in an organization
JP2009175868A (en) Log auditing device and log auditing program
JP2002123764A (en) Method and system for supporting contract, managing server and program
CN110874790A (en) Certificate association management method and device
US8793775B2 (en) Apparatus and method for managing web based service account
CN108875324B (en) Form authorization method based on form time property field
CN113792274A (en) Information management method, management system and storage medium
US20150081834A1 (en) Information processing system and method
JP4628086B2 (en) Workflow system, browsing restriction method, program, and recording medium
CN111800397A (en) Login method, device and system of intangible asset management platform
US20080066291A1 (en) Hazardous substance guarantee acquiring method and system, product manufacturing method and computer-readable program
CN108156203B (en) Storage system and storage node management method
US10657139B2 (en) Information processing apparatus and non-transitory computer readable medium for distributed resource management
US8799995B2 (en) Image forming method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200310