Unlock instant, AI-driven research and patent intelligence for your innovation.

A logistics privacy protection method

A privacy protection and logistics technology, applied in the field of logistics, can solve the problems of express company privacy leakage, leakage of express information, failure to prevent user privacy leakage, etc.

Active Publication Date: 2021-12-21
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) After the user signs for the express delivery, he fails to properly handle the order information on the package, which may lead to the leakage of personal or corporate privacy
[0006] (2) The sender fills in non-essential privacy information when filling out the courier order, which may reveal personal and business privacy
[0007] (3) Due to negligence of the courier when transporting the courier, the courier information is maliciously stolen by others
[0008] (4) Malicious couriers deliberately leak courier information by taking advantage of their positions
[0009] (5) The courier service company leaks courier information due to its own defects or infiltration by hackers
[0010] (6) The express company itself has privacy leakage behavior
The disadvantage of this solution is: the recipient / sender’s contact number and other data are stored in the express service party / express company, which cannot prevent user privacy leakage caused by malicious courier / express company’s internal malicious behavior and hacker infiltration of the express company The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A logistics privacy protection method
  • A logistics privacy protection method
  • A logistics privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0070] The embodiments of the present invention are written in a progressive manner.

[0071] The embodiment of the present invention provides a logistics privacy protection method, please refer to figure 2 . It mainly solves the technical problem of privacy leakage behavior caused by the leakage of express information due to the internal behavior of malicious couriers / express companies or the infiltration of hackers in the existing technology....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a logistics privacy protection method, comprising the following steps: S1. The sending company encrypts and generates a hidden QR code according to the private information of the express item and the sending company information; S2. The sending company will affix the QR hidden code label The express items are delivered to the express company, and the public information of the express items is provided; S3. The express company delivers the express items to the receiving company according to the public information of the express items; S4. The receiving company analyzes the QR hidden information according to the pre-agreed information with the sending company The public information of express items includes: the external contact number of the sending company, the public address of the sending company, the external contact number of the receiving company, and the public address of the receiving company. This method effectively prevents the leakage of privacy caused by the internal behavior of malicious couriers / express companies, or the leakage of courier information caused by infiltration by hackers.

Description

technical field [0001] The invention relates to the technical field of logistics, in particular to a logistics privacy protection method. Background technique [0002] Under the promotion of e-commerce, the combination of logistics industry and "Internet +" has achieved rapid development and has become one of the important components of life consumption. Logistics express is getting closer and closer to people's lives, providing more convenience. However, while express delivery brings convenience, it also brings the risk of privacy leakage, especially for corporate organizations that have high requirements for their own confidentiality. [0003] In some logistics and express delivery links, there are a large number of threats to the privacy of individual users and corporate users. [0004] Such as figure 1 As shown, when user 1, a member of organization A, mails / signs for the courier, [0005] (1) After the user signs for the express delivery, he fails to properly handle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06Q10/08
Inventor 王宝生罗振豪邢倩倩解炜唐勇伍林洁
Owner NAT UNIV OF DEFENSE TECH