Personal information encryption method in logistics system based on two-dimensional codes

A technology of logistics system and private information, applied in the direction of logistics, public key of secure communication, record carrier used by machines, etc. It can solve the problems of confidentiality of customer information and protection of customer information, and achieve the effect of ensuring information and flexible application.

Inactive Publication Date: 2013-06-26
CHENGDU EHENGXIN TECH
View PDF4 Cites 77 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention overcomes the deficiencies of the prior art, aims at the problem that the customer information is not protected in the existing logistics links,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal information encryption method in logistics system based on two-dimensional codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Before introducing the embodiments of the present invention in detail, let us first understand the identification authentication technology: the identification-based authentication technology does not need to exchange keys, nor does it require the participation of a trusted third party (even if necessary, the third party generally It is only used to issue a smart card to a user who participates in the system for the first time with the information required for the user's signature and encryption). The key management algorithm uses the elliptic curve cryptography theory to construct public and private key matrices, which can generate a large number of public and private key pairs with a small number of factors; use the user's identity information (ID number, ID number and other unique information) as an identifier, use The mapping algorithm binds the user ID to the public and private key variables, and solves the problem of key management based on ID. Ability to support ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a personal information encryption method in a logistics system based on two-dimensional codes. The personal information encryption method in the logistics system based on two-dimensional codes is characterized by comprising the following steps that: step 1. object sending information is encrypted: the encryption is finished by senders, or collectors in the field, or objects are sent back to a logistics company and are encrypted; step 2. object sending information is encrypted by utilizing a system public key of a logistics company, and encryption two-dimensional codes are generated and are printed; packages are packed, encryption two-dimensional codes are only reserved externally, and no plaintext information is reserved; and step 3. signing is carried out after receiving. According to the invention, two signing modes are selectable, one is a two-dimensional code signing mode, and the other one is a random code signing mode; and if the two-dimensional signing mode is adopted, a receiver needs to have an ID number and public and private key pairs in the system. The personal information encryption method in the logistics system based on two-dimensional codes provided by the invention has the advantages that the encryption and safety of the user private information are ensured; packages are protected from being falsely received by other people, and denying of receiving is avoided after signing; off-line check can be realized, network support is not required, and the application is much flexible; and identity theft is also avoided.

Description

technical field [0001] The invention relates to private information encryption technology, in particular to the private information encryption technology in a logistics system, especially a two-dimensional code-based private information encryption technology. [0002] Background technique [0003] In recent years, thanks to the vigorous development of e-commerce, the domestic logistics market has achieved breakthrough development. The total volume of express delivery business in China has doubled and a half in five years, with an average annual growth rate of 27.23%. With the growth of logistics usage and usage, more and more personal information is used in logistics. [0004] In the existing logistics system, the personal information of the sender and the recipient, and the information of the items to be sent are directly written on the package face slip, without any hidden protection measures, and the customer's privacy cannot be protected. It is easy to be illegally obt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06K19/06H04L9/30G06Q10/08G06Q50/28
Inventor 赵广宇
Owner CHENGDU EHENGXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products