A method for realizing express privacy protection in the logistics process

A privacy protection and logistics technology, applied in transmission systems, electrical components, etc., can solve problems such as inability to realize express delivery information protection, uneven quality of express delivery employees, lack of effective supervision of employees, etc., to ensure security and usability, avoiding direct exposure, and increasing efficiency

Active Publication Date: 2019-06-07
SICHUAN UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two main reasons for this phenomenon: one is the lack of information protection measures, and the other is the lack of effective supervision of employees. Due to the uneven quality of express employees and the ability to come into contact with a large number of express orders every day, in Under the temptation of interests, a black chain of interests has been formed. Buyers only need to find out that they can buy a courier note that includes the address of the sender and recipient, phone number, courier number, and receipt time for less than one yuan. At the same time, according to the tracking number information on the official website, it can be found that the information is correct
[0003] It can be seen that a large part of the reason for the leakage of courier privacy is that the courier practitioners at the grassroots level of the company are selling courier information. Due to ignoring this source, there is no restriction on the courier's authority, so the courier can see the courier. The complete information on the website, the courier can copy the information while reading the information, which cannot protect the courier information well
This will be detrimental to the promotion of the express delivery real-name system: after the implementation of the express delivery real-name system, more personal core information will be put on the courier bill. If the current situation of courier selling express bills cannot be curbed, the security of customers' private information will be seriously affected. threaten

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing express privacy protection in the logistics process
  • A method for realizing express privacy protection in the logistics process
  • A method for realizing express privacy protection in the logistics process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows the flow chart of the method for realizing express privacy protection in the logistics process provided by the present invention, figure 2 It shows the flow chart of information interaction provided by the present invention for the first terminal to request to obtain the key set when picking up the package, image 3 It shows the flow chart of information interaction provided by the present invention in which the first terminal completes the registration before receiving the mail, Figure 4 It shows the flow chart of information interaction provided by the present invention in which the second terminal requests to obtain the outer symmetric key when dispatching the parcel, Figure 5 It shows the flow chart of information interaction provided by the present invention in which the second terminal completes the registration before delivery. The method for realizing express delivery privacy protection in the logistics process provided by this embodiment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of logistics security, and discloses a method for realizing express privacy protection in the logistics process. This method uses the key set from the cloud server to re-encrypt the user's delivery information and private information at different levels when sending and receiving documents, and then through the management of the key set by the cloud server, different decryption requesters are granted different Decryption authority, so that the courier's decryption authority can be restricted when delivering the package, so that it can only use part of the key from the cloud server to decrypt and obtain the delivery information, thereby not only avoiding the direct exposure of the courier information, but also preventing it from being directly exposed by illegal personnel. Acquisition can also prevent couriers from obtaining customers' private information by taking advantage of their positions, so as to realize the security protection of courier privacy, curb the illegal behavior of buying and selling courier orders, and facilitate the promotion of the real-name system for courier delivery.

Description

technical field [0001] The invention relates to the technical field of logistics security, in particular to a method for realizing express privacy protection in the logistics process. Background technique [0002] In the existing logistics and transportation process, the courier bill attached to the courier item records the user's personal information in detail, such as the delivery address, the name and mobile phone number of the receiver and recipient, and these personal information are directly exposed without encryption protection, so It is easy to cause the problem of personal information leakage. By searching the keyword "buy courier order" on Baidu, the results showed 727,000 results. At the same time, many buying and selling websites clearly marked the price of the courier order number, and divided them into different grades according to the completeness of the information filled in and whether it has been scanned. There are two main reasons for this phenomenon: one...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0407H04L63/0435H04L63/0478H04L65/1073H04L67/10
Inventor 赵亮刘光明苏欣雨
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products