Method for Encrypting Private Information in Logistics System Based on Two-Dimensional Code
A technology of logistics system and private information, which is applied in the direction of logistics, public key of secure communication, record carrier used by machines, etc. It can solve the problems of customer information protection and customer information confidentiality, so as to ensure the authenticity of information and flexible application Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Before introducing the embodiments of the present invention in detail, let’s first get to know the identity authentication technology: identity-based authentication technology does not require the exchange of keys, and may not require the participation of a trusted third party (even if it is required, the third party generally It is only used to issue a smart card to a user participating in the system for the first time with the information required for the user's signature and encryption). The key management algorithm uses the elliptic curve cryptography theory to construct a public and private key matrix, which can generate a large number of public and private key pairs with a small number of factors; use the user's identity information (ID number, ID number and other unique information) as identification, use The mapping algorithm binds the user ID with the public and private key variables, which solves the problem of ID-based key management. Capable of supporting id...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 