Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Logistics information security encryption method based on identity authentication and system based on identity authentication

A logistics information and identity verification technology, which is applied in the field of identity verification-based logistics information security encryption method and system, can solve personal privacy threats and other issues, and achieve the effect of eliminating security risks and controlling costs

Inactive Publication Date: 2016-10-12
OPEN SECURITY RES INC
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under such circumstances, the packaging of item 7 has always been accompanied by clear text logistics information and private information of both parties, which is a great threat to personal privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Logistics information security encryption method based on identity authentication and system based on identity authentication
  • Logistics information security encryption method based on identity authentication and system based on identity authentication
  • Logistics information security encryption method based on identity authentication and system based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] A method and system for secure encryption of logistics information based on identity verification. The workflow of the secure logistics information system is as follows:

[0036] Such as figure 2 , image 3 As shown, in the goods-picking stage 21, item information processing step 101: when the goods-hunter 2 picks up goods from the sender 1, he inputs the logistics information on the handheld device 10, and communicates with the logistics center server 9 through the handheld device 10 Exchange the encryption key, after encrypting the logistics information, output the encrypted encrypted label 15 through the label printer 14, the encrypted label 15 is a logistics pattern identification (such as a two-dimensional code or a radio frequency electronic tag), which is attached to the item 7 and becomes information encryption Item 8 is then handed over to logistics delivery center 3. The information on the encrypted label 15 includes: encrypted basic logistics information (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method provides a logistics information security encryption method based on identity authentication and a system based on identity authentication. The method comprises the steps that 1) a canvassing canvasser uses an identity code to exchange an encryption key with a logistics center server for label encryption; 2) a logistics distribution center sends goods to a logistics receiving center according to the logistics receiving center address clearly identified by an encrypted label; 3) the logistics receiving center uses the identity code to exchange the encryption key with the logistics center server to interpret the detailed address of an addressee, and arranges a deliveryman; and 4) the deliveryman uses the identity code to exchange the encryption key with the logistics center server to interpret the detailed address and the contact information of the addressee, and delivers the goods to the addressee. The system comprises a handheld device, a node terminal device, the encryption label and the logistics center server. The handheld device and the node terminal device are in data connection with the logistics center server. The method and the system are simple, reliable, convenient and efficient.

Description

technical field [0001] The invention relates to the field of logistics information security, in particular to an authentication-based logistics information security encryption method and system. Background technique [0002] With the explosive development of e-commerce and Internet + business, logistics business has also become an important part of the industrial chain. Shopping festivals such as "Double Eleven" produced by e-commerce websites have more than 300 million parcels in one day. Behind such a huge amount of packages are tens of millions of real ordinary people and their real information. Every time an order is placed through the Internet, the sender and recipient information are clearly written on the paper logistics certificate exposed outside the package. This undoubtedly poses a great threat to the personal privacy of buyers and sellers, and even the safety of work and life. There is a group of people who specialize in collecting logistics voucher informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/08G06Q50/28H04L9/30
CPCH04L9/30G06Q10/08
Inventor 刘峥
Owner OPEN SECURITY RES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products