Method for realizing express privacy protection in the logistics process

A privacy protection and logistics technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as inability to realize express delivery information protection, uneven quality of express delivery employees, and threats to customers' private information security, so as to avoid direct exposure , increase efficiency, prevent the effect of direct acquisition

Active Publication Date: 2017-02-22
SICHUAN UNIV
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two main reasons for this phenomenon: one is the lack of information protection measures, and the other is the lack of effective supervision of employees. Due to the uneven quality of express employees and the ability to come into contact with a large number of express orders every day, in Under the temptation of interests, a black chain of interests has been formed. Buyers only need to find out that they can buy a courier note that includes the address of the sender and recipient, phone number, courier number, and receipt time for less than one yuan. At the same time, according to the tracking number information on the official website, it can be found that the information is correct
[0003] It can be seen that a large part of the reason for the leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing express privacy protection in the logistics process
  • Method for realizing express privacy protection in the logistics process
  • Method for realizing express privacy protection in the logistics process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows the flow chart of the method for realizing express privacy protection in the logistics process provided by the present invention, figure 2 It shows the flow chart of information interaction provided by the present invention for the first terminal to request to obtain the key set when picking up the package, image 3 It shows the flow chart of information interaction provided by the present invention in which the first terminal completes the registration before receiving the mail, Figure 4 It shows the flow chart of information interaction provided by the present invention in which the second terminal requests to obtain the outer symmetric key when dispatching the parcel, Figure 5 It shows the flow chart of information interaction provided by the present invention in which the second terminal completes the registration before delivery. The method for realizing express delivery privacy protection in the logistics process provided by this embodiment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of the logistics security, and discloses a method for realizing express privacy protection in the logistics process. The method comprises the following steps: performing re-encryptions at different levels on delivery information and privacy information of a user by use of a secret key set from a cloud server when sending and receiving an express, and then managing the secret key set through the cloud server, granting different decryption permissions aiming at different decryption requesters, thereby limiting the decryption permission of a courier in delivering the express, wherein the courier can only use partial secret key from the cloud server to decrypt to acquire the delivery information. Therefore, an illegal person cannot directly acquire the express information since the direct exposure of the express information is avoided, and the condition that the courier uses the position to acquire the privacy information of a customer can be prevented, thereby realizing the safety protection of the express privacy, inhibiting the illegality of dealing the express list, and facilitating the popularization of the real-name system of the express.

Description

technical field [0001] The invention relates to the technical field of logistics security, in particular to a method for realizing express privacy protection in the logistics process. Background technique [0002] In the existing logistics and transportation process, the courier bill attached to the courier item records the user's personal information in detail, such as the delivery address, the name and mobile phone number of the receiver and recipient, and these personal information are directly exposed without encryption protection, so It is easy to cause the problem of personal information leakage. By searching the keyword "buy courier order" on Baidu, the results showed 727,000 results. At the same time, many buying and selling websites clearly marked the price of the courier order number, and divided them into different grades according to the completeness of the information filled in and whether it has been scanned. There are two main reasons for this phenomenon: one...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0407H04L63/0435H04L63/0478H04L65/1073H04L67/10
Inventor 赵亮刘光明苏欣雨
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products