Anonymous express information security system based on two-dimension code

An information security system and two-dimensional code technology, applied in the fields of instruments, data processing applications, logistics, etc., can solve problems such as information leakage and information security leakage, and achieve the effect of ensuring security.

Inactive Publication Date: 2016-05-11
SOUTH CHINA AGRI UNIV
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These cases have exposed various dangers of information security leakage in the process of express delivery. Therefore, how to solve t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous express information security system based on two-dimension code
  • Anonymous express information security system based on two-dimension code
  • Anonymous express information security system based on two-dimension code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0046] This system is a privacy protection solution designed for express delivery companies (such as: China Post EMS, SF Express, YTO Express, etc.), which mainly solves the problem of information leakage in the process of sending and receiving express delivery, and protects the privacy of senders and recipients Address information and item information prevent the leakage of personal privacy to the greatest extent and protect personal safety. It mainly involves the following participants, related institutions and media, and their respective meanings are shown in Table 1.

[0047] Table 1 Comparison table of concepts and meanings of system design

[0048]

[0049] like figure 1 As shown, the system of the present invention is composed of a relatively independent key management subsystem and an express information management subsystem. Structure; the express delivery information management subsystem mainly includes five entities of the sender, the recipient, the courier, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous express information security system based on a two-dimension code. The system comprises a key management subsystem and an express information management subsystem; the key management subsystem is used for distributing and managing the subsystems of system participants and is constructed by using an attribute based encryption technique; the express information management subsystem mainly comprises five entities of a sender, a receiver, a deliverer, a package and a database; the sender sends the package to the receiver through the deliverer; the tag on the package is used for identifying partial public information of the sender and the receiver; and the database is used for recording related package and the secret information of the sender and the receiver. According to the system of the invention, the information leakage problem possibly generated in the goods delivery process is taken into full consideration; all secret information not just the list number is hidden; the information security is ensured greatly; and the information leakage risk is avoided.

Description

technical field [0001] The invention relates to the research field of express information security, in particular to an anonymous express information security system based on a two-dimensional code. Background technique [0002] With the development of globalization, it has become more and more normal to be able to buy what you want without leaving home. People surf the Internet at home, see what they like, place an order, and receive it within a few days To post something to your home. However, in this process, the protection of information has also become important. In the process of posting goods, many people will handle them, which increases the risk of information leakage. For example: On October 22, 2014, YTO Express was exposed that its nearly one million individual express delivery information could not only be purchased online, but also the tracking number data information could be refreshed 24 hours a day. All were exposed, seriously affecting their daily lives. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/08G06Q50/28
CPCG06Q10/08G06Q50/28
Inventor 李西明林锦霞郭玉彬马莎黄琼
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products