Logistics processing method capable of protecting privacy by information decomposition

A processing method and logistics technology, applied in the field of logistics, can solve problems such as easy leakage of user information

Inactive Publication Date: 2016-08-24
宋同晶
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the problem that user information is easily leaked during logistics transportation and delivery, this application provides a logistics processing method that protects privacy through information decomposition, including:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Logistics processing method capable of protecting privacy by information decomposition
  • Logistics processing method capable of protecting privacy by information decomposition
  • Logistics processing method capable of protecting privacy by information decomposition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] This example provides a logistics processing method that protects privacy through information decomposition. The flow chart is as follows figure 1 shown.

[0019] S11: Package information collection.

[0020] The specific process of parcel information collection is: the cloud server acquires and stores parcel user information and parcel logistics transit information, among which, parcel user information includes sender information and recipient information, and parcel user information can be called user privacy information; parcel logistics Transit information is information that does not involve user privacy in the process of logistics transfer. For example, it can be information such as the current transfer location, the next transfer location, and the status of the package. The package logistics transfer information is mainly used for the transfer of packages. Through step S11, both the user privacy information and the parcel transfer information about the parcel in...

Embodiment 2

[0059] Based on the first embodiment, the solution for collecting package user information in step S11, this example adopts the first method of embodiment one to collect package user information, specifically including the following steps, the flow chart of which is as follows Figure 4 shown.

[0060] S21: The mobile terminal collects sender and sender information.

[0061] Specifically, the sender uses the mobile terminal to scan the barcode of the courier receipt, and connects to the cloud server through the link of the barcode. Then, the sender enters the mailing and recipient information on the mobile terminal, and completes payment and other operations. The meanings of the sender information and receiver information are similar to those of the sender information and receiver information in Embodiment 1, and will not be repeated here.

[0062] Specifically, the sender can directly enter the recipient's name, address, phone number, sender's name, address, phone number, in...

Embodiment 3

[0080] Based on Embodiment 1 and Embodiment 2, this example adopts the third method of Embodiment 1 to collect package user information, which specifically includes the following steps, and its flow chart is as follows Image 6 shown.

[0081] S41: The server obtains the sender's information and the recipient's phone number.

[0082] In this step, the sender uses the mobile terminal to choose to send a courier based on an interactive platform. The interactive platform is preferably WeChat. When the sender chooses to send a courier through a WeChat public account, the sender will obtain a courier service box, which includes The sender service box and the receiver service box, if the sender has registered an account before, the sender will enter the registered account into the sender service box through the mobile terminal, and the sender service box will automatically obtain the sender information, otherwise, the sender needs to enter the sender’s information in the sender’s i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A logistics processing method capable of protecting privacy by information decomposition is mainly characterized in that only machine identification codes, manual identification codes and courier numbers are contained in articles and article labels, no privacy information of users are contained, all the information including users' names, contact details and address information are stored in cloud, articles and all information are associated with each other through the courier numbers, and only necessary information fragments are sent to dispatchers or transfer equipment through a network during a logistics process without displaying all information. The information fragments may be transfer places, or destinations, which are not private information. In this way, user privacy can be protected without affecting express delivery. Information flow is transmitted through data, which eliminating manual writing, printing and identification. The express delivery efficiency is thus improved.

Description

technical field [0001] The invention relates to the field of logistics, in particular to a logistics processing method for protecting privacy through information decomposition. Background technique [0002] The current express delivery uses traditional express delivery documents, which need to manually write / print recipient and sender addresses, phone numbers, names and other information, so that all the private information of the recipient and sender is exposed to In addition, special personnel are required to input information such as the address, phone number, and name of the recipient and sender into the server so that the server can perform logistics tracking and notification. The above factors lead to the following disadvantages in the current express delivery method: 1. Leakage of user privacy information; 2. Loss of human labor; 3. User privacy information cannot be flexibly changed during the express delivery process. Contents of the invention [0003] In view of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/08G06Q50/28
CPCG06Q10/083G06Q10/0833G06Q50/28
Inventor 宋同晶
Owner 宋同晶
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products