Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing express privacy protection in the logistics process

A privacy protection and logistics technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as inability to realize express delivery information protection, uneven quality of express delivery employees, and threats to customers' private information security, so as to avoid direct exposure , increase efficiency, prevent the effect of direct acquisition

Active Publication Date: 2017-02-22
SICHUAN UNIV
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two main reasons for this phenomenon: one is the lack of information protection measures, and the other is the lack of effective supervision of employees. Due to the uneven quality of express employees and the ability to come into contact with a large number of express orders every day, in Under the temptation of interests, a black chain of interests has been formed. Buyers only need to find out that they can buy a courier note that includes the address of the sender and recipient, phone number, courier number, and receipt time for less than one yuan. At the same time, according to the tracking number information on the official website, it can be found that the information is correct
[0003] It can be seen that a large part of the reason for the leakage of courier privacy is that the courier practitioners at the grassroots level of the company are selling courier information. Due to ignoring this source, there is no restriction on the courier's authority, so the courier can see the courier. The complete information on the website, the courier can copy the information while reading the information, which cannot protect the courier information well
This will be detrimental to the promotion of the express delivery real-name system: after the implementation of the express delivery real-name system, more personal core information will be put on the courier bill. If the current situation of courier selling express bills cannot be curbed, the security of customers' private information will be seriously affected. threaten

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing express privacy protection in the logistics process
  • Method for realizing express privacy protection in the logistics process
  • Method for realizing express privacy protection in the logistics process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows the flow chart of the method for realizing express privacy protection in the logistics process provided by the present invention, figure 2 It shows the flow chart of information interaction provided by the present invention for the first terminal to request to obtain the key set when picking up the package, image 3 It shows the flow chart of information interaction provided by the present invention in which the first terminal completes the registration before receiving the mail, Figure 4 It shows the flow chart of information interaction provided by the present invention in which the second terminal requests to obtain the outer symmetric key when dispatching the parcel, Figure 5 It shows the flow chart of information interaction provided by the present invention in which the second terminal completes the registration before delivery. The method for realizing express delivery privacy protection in the logistics process provided by this embodiment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of the logistics security, and discloses a method for realizing express privacy protection in the logistics process. The method comprises the following steps: performing re-encryptions at different levels on delivery information and privacy information of a user by use of a secret key set from a cloud server when sending and receiving an express, and then managing the secret key set through the cloud server, granting different decryption permissions aiming at different decryption requesters, thereby limiting the decryption permission of a courier in delivering the express, wherein the courier can only use partial secret key from the cloud server to decrypt to acquire the delivery information. Therefore, an illegal person cannot directly acquire the express information since the direct exposure of the express information is avoided, and the condition that the courier uses the position to acquire the privacy information of a customer can be prevented, thereby realizing the safety protection of the express privacy, inhibiting the illegality of dealing the express list, and facilitating the popularization of the real-name system of the express.

Description

technical field [0001] The invention relates to the technical field of logistics security, in particular to a method for realizing express privacy protection in the logistics process. Background technique [0002] In the existing logistics and transportation process, the courier bill attached to the courier item records the user's personal information in detail, such as the delivery address, the name and mobile phone number of the receiver and recipient, and these personal information are directly exposed without encryption protection, so It is easy to cause the problem of personal information leakage. By searching the keyword "buy courier order" on Baidu, the results showed 727,000 results. At the same time, many buying and selling websites clearly marked the price of the courier order number, and divided them into different grades according to the completeness of the information filled in and whether it has been scanned. There are two main reasons for this phenomenon: one...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0407H04L63/0435H04L63/0478H04L65/1073H04L67/10
Inventor 赵亮刘光明苏欣雨
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products