Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for Encrypting Private Information in Logistics System Based on Two-Dimensional Code

A technology of logistics system and private information, which is applied in the direction of logistics, public key of secure communication, record carrier used by machines, etc. It can solve the problems of customer information protection and customer information confidentiality, so as to ensure the authenticity of information and flexible application Effect

Inactive Publication Date: 2016-02-17
CHENGDU EHENGXIN TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention overcomes the deficiencies of the prior art, aims at the problem that the customer information is not protected in the existing logistics links, and solves the confidentiality problem of the customer information in the logistics by utilizing the characteristics of the two-dimensional code being simple and easy to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Encrypting Private Information in Logistics System Based on Two-Dimensional Code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Before introducing the embodiments of the present invention in detail, let’s first get to know the identity authentication technology: identity-based authentication technology does not require the exchange of keys, and may not require the participation of a trusted third party (even if it is required, the third party generally It is only used to issue a smart card to a user participating in the system for the first time with the information required for the user's signature and encryption). The key management algorithm uses the elliptic curve cryptography theory to construct a public and private key matrix, which can generate a large number of public and private key pairs with a small number of factors; use the user's identity information (ID number, ID number and other unique information) as identification, use The mapping algorithm binds the user ID with the public and private key variables, which solves the problem of ID-based key management. Capable of supporting id...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for encrypting private information in a logistics system based on QR codes, which is characterized by: including the following steps: Step 1, encryption of shipping information: completed by the sender himself, or completed by the picker at the receiving site, Or send it back to the logistics company to complete; Step 2, use the logistics company's system public key to encrypt the shipping information, generate an encrypted QR code and print it; seal the package, leaving only the encrypted QR code on the outside, without placing any plain text information; Step 3, sign for receipt. In this method, there are two signing methods to choose from; one is the QR code signing method, and the other is the random code signing method. To use the QR code signing method, the recipient must have Your own ID number and public-private key pair. The invention has the beneficial effects of ensuring the confidentiality and security of users' private information. This ensures that the package cannot be falsely claimed and cannot be denied after signing for it. Offline verification can be achieved, no network support is required, and the application is more flexible. Identity cannot be stolen.

Description

technical field [0001] The invention relates to a private information encryption technology, in particular to a private information encryption technology in a logistics system, especially a two-dimensional code-based private information encryption technology. Background technique [0002] In recent years, thanks to the vigorous development of e-commerce, the domestic logistics industry market has achieved breakthrough development. The total volume of express delivery business in China has doubled and a half in five years, with an average annual growth rate of 27.23%. With the growth of logistics usage and usage rate, more and more personal information is used in logistics links. [0003] In the existing logistics system, the personal information of the sender, the recipient, and the information of the delivered items are written directly on the parcel surface, without any hidden protection measures, and the privacy of customers is not protected. It is easy to be illegally o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06K19/06H04L9/30G06Q10/08G06Q50/28
Inventor 赵广宇
Owner CHENGDU EHENGXIN TECH