Combined handover authentication method and system used for goods escorting

An authentication method and authentication system technology, applied in logistics, data processing applications, instruments, etc., can solve problems such as time difference, collusion and theft of items, insecurity, etc., to ensure timeliness and reliability, avoid handover errors, and ensure reliability The effect of traceability

Inactive Publication Date: 2015-03-04
SUZHOU UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above-mentioned escort management method, although secret escort (a string of identifiable characters) and escort personnel information are used as double authentication, there are still unsafe factors, which are manifested as: 1. Uncontrollable escort delivery point Sex, if the bank staff (user) and the escort are handed over within the scope of abnormal work, private handover, secret custody and personnel authentication can all be passed, but the items may be stolen by the two parties in collusion; 2. The above method is offline authentication. There is no communication process of uploading and replying with the remote management system during the escort handover process, the management system data is not updated in time, real-time monitoring cannot be achieved, there is a time difference, and security problems are prone to occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined handover authentication method and system used for goods escorting
  • Combined handover authentication method and system used for goods escorting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with accompanying drawing and embodiment:

[0027] The detailed description of the present invention is mainly presented by programs, steps, logic blocks, processes or other symbolic descriptions, which directly or indirectly simulate the operation of the technical solutions in the present invention. These descriptions and representations herein are used by those skilled in the art to effectively convey the substance of their work to others skilled in the art.

[0028] The term "in one embodiment" or "embodiment" here means that specific features, structures or characteristics related to the embodiment can be included in at least one implementation of the present invention. The appearances of "in one embodiment" or "in another embodiment" in various places in this specification are not necessarily all referring to the same embodiment, nor are separate or selected embodiments mutually exclusive of other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a combined handover authentication method and system used for goods escorting. The method is characterized by including the following steps that: (a) handover task information is pre-stored to a remote server; (b) handheld terminals transmit handover requests through a wireless network, detect geographic positions where signals are transmitted, and after conformation between the geographic positions and geographic positions pre-stored in the remote server are confirmed, opening codes are send back; (c) the handheld terminals open authentication interface display, and read several pieces of authentication tag information, are coupled with the remote server through the wireless network, and judge whether the obtained authentication tag information is correct or not through comparison, at the same time, download personnel information, and the method enters a manual authentication phase; and (d) physical handover is performed, and tag information of handover items is uploaded, and the handover terminates. The system can keep real-time communication with the remote server through the wireless network. According to the combined handover authentication method and system, an electronic fence is set, and information can be uploaded and downloaded on line, and the controllability, timeliness and reliability of a handover process can be ensured, and situations such as handover errors and omissions can be avoided; and the whole handover process has traceability, so that the whole handover process is safer and more reliable.

Description

technical field [0001] The invention relates to a management system for escorted logistics, in particular to a combined handover authentication method and system for escorted logistics, which are mainly used in the financial industry, government agencies, etc. to escort valuables or documents. Background technique [0002] The escort logistics system is usually used for banks to escort money and valuables, or for governments and government agencies to escort important documents, etc., and exists as a new third-party service industry management system. Due to the particularity of the escorted goods, it is determined that the logistics service company undertaking the escort business has the characteristics of high entry barriers, strong security guarantees, and large risks and responsibilities, which are not acceptable to ordinary enterprises. The logistics management of the escort company involves people, Cars, items (wallets, guns), etc. have higher security requirements tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/08G06Q50/28
CPCG06Q10/08G06Q50/28
Inventor 朱斐刘全王辉刁红军伏玉琛朱巧明
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products