CN108710931A - A kind of address information privacy protection method based on Quick Response Code - Google Patents
A kind of address information privacy protection method based on Quick Response Code Download PDFInfo
- Publication number
- CN108710931A CN108710931A CN201810423981.9A CN201810423981A CN108710931A CN 108710931 A CN108710931 A CN 108710931A CN 201810423981 A CN201810423981 A CN 201810423981A CN 108710931 A CN108710931 A CN 108710931A
- Authority
- CN
- China
- Prior art keywords
- address
- address information
- quick response
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Abstract
A kind of address information privacy protection method based on Quick Response Code, this method course of work are as follows:(1) random identifying code is locally generated in user by software tool, and the address information A of classification nested partitions method is generated according to address and identifying code, and identifying code is shown to user and issues recipient for it;(2) Quick Response Code of A is attached to package surface;(3) mail sender sorting devices at different levels, which scan the two-dimensional code and decrypt corresponding address part in A, obtains next stage address;(4) the terminal person of submitting uses special reading equipment, scans the two-dimensional code and decrypts the end address, telephone number and the identifying code that obtain e-mail recipient;(5) it can be mutually authenticated by identifying code between the person of submitting and e-mail recipient;(6) telephone number that special reading equipment decrypts is invisible, can only dial or send short messages for the terminal person of submitting.The present invention can prevent unauthorized party from obtaining the address information except business needs, for protecting address information not to be illegally accessed and utilize.
Description
Technical field
The present invention relates to information security field more particularly to a kind of address information privacy protection sides based on Quick Response Code
Method prevents the leakage of address information according to the method for the present invention.
Background technology
The rapid development of Internet causes online electronic business transaction to have become main shopping side in people's daily life
One of formula.Online electronic business transaction needs to send commodity in user hand by express delivery.Traditional method is that the address of user is believed
Breath be attached to package surface, this is possible to the leakage for causing user sensitive information, as the specific dwelling places of user, cell-phone number and
Name, these information are possible to be utilized by criminal, to obtain the trust of user to which user is swindled or be entered
Room is plundered, it is also possible to is obtained by other people to carry out the behaviors such as advertising.
The safety used it is an object of the invention to enhance sensitive address information enhances sensitive especially in logistics progress
Address information is protected, and is prevented these sensitive address informations from being obtained by other people and is used for illegal objective.
Invention content
The technical problem to be solved in the present invention is to propose a kind of guard method of logistics address information.Using this method energy
The address information of user is enough set illegally not stolen in logistics progress.
The present invention, which solves the technical problem, to be achieved through the following technical solutions:A kind of mailing based on Quick Response Code
Location information privacy protection method, for protecting address information not to be illegally accessed and utilize, this method workflow is as follows:
(1) this method is by carrying out classification nested partitions method by rank to address and generating Quick Response Code, to different mandates
Side is only capable of seeing its partial address information for seeing of business need, and the privacy of address can be protected not to be illegally accessed and utilize;
(2) classification nested partitions method uses public key cryptography, user that can be carried out to address information according to disclosed public key
Encryption, only holding the decoding module for having respective private keys could decrypt and obtain address information;
(3) classification nested partitions method single-level address corresponding public key encryption next stage address so that mail transmittance process
In could correctly decrypt with the decoding module of upper level address corresponding private key and obtain next stage address.
Wherein, using this method, special reading equipment is decrypting and is obtaining terminal used in the person of submitting of terminal address
Behind address, it can not show the telephone number of e-mail recipient and can only dial or send short messages, thus the contact electricity of recipient
Words are not revealed to anyone.
Wherein, using this method, the recipient of mail can be transmitted to him by Email Sender through network or other modes
Terminal address in the visit personnel of delivering mail of the parts VA verification of identifying code whether be legal logistics personnel.
Wherein, using this method, the person of submitting of mail terminal address can be verified using the identifying code VB in terminal address
Whether the personnel to mail are legal mail reception people.
Wherein, mail transfer mode includes:Express delivery, parcel post, cargo logistics transportation.
Wherein, the public key cryptography, first added after encrypted plaintext before encrypting regular length with
Machine number, then re-encrypts, and then additional random number removal backmost is obtained really in plain text after decryption, can prevent needle in this way
To the exhaustive attack of address information.
A kind of address information privacy protection method based on Quick Response Code, this method specifically include:
(1) random identifying code is locally generated in user by software tool, and embedding according to address and identifying code generation classification
Encrypted address information A is covered, and identifying code is shown to user and issues recipient for it;
(2) Quick Response Code of A is attached to package surface;
(3) mail sender sorting devices at different levels, which scan the two-dimensional code and decrypt corresponding address part in A, obtains next stage
Address;
(4) the terminal person of submitting uses special reading equipment, with scanning the two-dimensional code and decrypt the end of acquisition e-mail recipient
Location, telephone number and identifying code;
(5) it can be mutually authenticated by identifying code between the person of submitting and e-mail recipient;
(6) telephone number that special reading equipment decrypts is invisible, can only dial or send short messages for the terminal person of submitting.
The advantages of the present invention over the prior art are that:
(1) existing address information privacy protection method uses encrypted based on server access control or symmetric-key
Mode, cannot achieve the offline encipherment protection of independent third party except postal company, and the present invention uses public key cryptography, user
It can utilize the public key announced that its address information is encrypted before mailing, only be equipped with national departments concerned or third party
The decoding module for the private key that trust center is distributed could be decrypted, and the private key in decoding module can not be exported and be replicated, thus
Have the characteristics that offline property, protection intensity it is high, independently of express company, can trace afterwards.
(2) present invention is divided into multiple portions by logistics address rank to the address information of mail (such as country, province, city), adopts
It is encrypted with different keys, during postal delivery, different postman can only decrypt the address part known needed for its business, because
The granularity of this secret protection is thinner.
Description of the drawings
Fig. 1 is classification nested partitions method schematic diagram;
Fig. 2 is special reading equipment schematic diagram;
Fig. 3 is address encryption schematic diagram.
Specific implementation mode
Below in conjunction with the accompanying drawings and specific implementation mode further illustrates the present invention.
The logistics of user receives and is attached to mail package surface after address information is encrypted with quick response code form, only holds decryption
The special reading equipment of key, which could read Quick Response Code and decrypt, obtains mail address information in plain text, mail address information plaintext quilt
It is divided into multiple portions according to logistics address rank, as shown in Figure 1, using different cipher key hierarchy nested partitions methods, is posted in logistics
Whole flow process in, the decoding module of different intermediate sortings or end is only capable of decrypting respective address part.Wherein, logistics
Location rank is formulated according to geographic area, using tree.
The typical operation of this method is:
(1) user is locally generated random identifying code by software tool before mailing occurs (such as after shopping online),
Identifying code can be number, character, Chinese character or pattern, and identifying code is divided into two parts VA and VB, and identifying code is retained one by user
Part issues e-mail recipient's (e-mail recipient is also likely to be me) by network or other modes, is used for later certification.Meanwhile
Software tool generates the address information of classification nested partitions method according to identifying code and the address of input, and address is descending to be divided into
Multiple ranks, such as country, province, city, area and final word, wherein final word includes end address (such as cell, Lou Hao, room
Number), contact details (telephone number and name of such as user) and identifying code.When generating classification nested partitions method address information, first use
Final word A0Upper level address A1Corresponding public key encrypts final word to obtain C0, recycle A1Upper level address A2It is right
The public key answered is A1Encryption obtains C1, then utilize A2Upper level address A3Corresponding public key is A2Encryption obtains C2, with such
It pushes away, finally address An-1The upper level address A of (such as country)n(such as the whole world) corresponding public key is An-1Encryption obtains Cn-1, and handle
AnAnd Cn-1、Cn-2、...、C1A is constituted together, since top level address An sensibility can be ignored, is not encrypted;
(2) user sends A to senders (such as businessman), and A is converted into Quick Response Code using tool and is attached to package by sender
Sender's (such as loglstics enterprise) is given on surface;
(3) processing equipment of sender scans the Quick Response Code acquisition A on package surface firstnAnd Cn-1, then there is AnInstitute is right
The decoding module of private key is answered to decrypt Cn-1Obtain An-1, and package shipment to An-1A is arrived in addressn-1Behind address, there is An-1Institute is right
Answer the decoding module of private key by decrypting Cn-2Obtain secondary address An-2, and so on, until package is transported to address A1;
(4)A1The person of submitting of address uses special reading equipment, and special reading equipment is by having corresponding A1Corresponding to address
The decoding module of private key is by decrypting C1The final word of e-mail recipient is obtained, wherein the contact electricity included in final word
Words by special reading equipment can only be dialed or be sent short messages for the person of submitting, and to e-mail recipient, (the specific telephone number person of submitting can not
See), the person of submitting finds e-mail recipient according to end address, by showing identifying code VA proves it oneself is package to recipient
The legal person of submitting, it is the legal person of submitting wrapped up that can verify him before opening the door for recipient, while the person of submitting can pass through
Identifying code VB verification present receivers are legal.
In above-mentioned steps, the encryption of logistics address uses rivest, shamir, adelman, i.e., encrypted key and decryption it is close
Key is different, and cannot mutually derive, and wherein encryption key is disclosed, referred to as public key, and decruption key is then secrecy, referred to as private
Key.When being encrypted using asymmetric cryptographic algorithm, the random number of a regular length is first added after encrypted plaintext, then again
Encryption then obtains additional random number removal backmost really in plain text after decryption.
In above-mentioned steps, identifying code is optional, i.e., user can allow software tool to generate verification in step (1)
Code, and in step (4) only selection identifying code can also be generated for the two-way authentication between the person of submitting and e-mail recipient
The parts VA or the parts VB, and the unilateral authentication between the person of submitting and e-mail recipient is carried out in step (4), it can also select not
Identifying code is generated, without certification in step (4).
In step (4), as shown in Fig. 2, the special reading equipment that uses of the person of submitting can by Response Code scan module, translate
Code module, communication module, input module, screen display module and control process module are constituted.Response Code scan module is used for
It scans the two-dimensional code, decoding module is used for the private key having using itself and the information of scanning gained is decrypted, and communication module is used
It is communicated in mobile phone, the base with e-mail recipient, input module, screen display module and control process module are respectively used to
Input, presentation of information and overall control.Special reading equipment has fingerprint or password protection, to ensure its user for sender
Specified user.
Safety analysis:
(1) address is dropped due to mail to be carried out locally with the public key corresponding to corresponding addresses at different levels by software tool
Encryption, thus unauthorized persons (including sales platform) can not decrypt to obtain the address information of e-mail recipient.
(2) due to mail drop address using classification nested partitions method, either the sorting device in logistics progress or
Sorter or the person of submitting of terminal can only obtain the information that each comfortable logistics business should obtain, and can not obtain other
The address information that should not be obtained.Specifically, sorting device or sorter can only obtain the address of its address next stage, and nothing
Method obtains the address information of next stage again down, and sorting device or sorter can not also decrypt the postal beyond its address range
Part address information (sorting device in such as Henan Province or sorter can not decrypt the address information for being mailed to Hebei province).
(3) it can not be led from decoding module by normal operating or illegal means once write-in due to the private key in decoding module
Go out, therefore even if many decoding modules all have the private key corresponding to same address, but logistics company personnel can not still replicate and translate
Code module obtains the decryption oprerations that private key carries out mail address around decoding module.
(4) the special equipment that reads used in the person of submitting due to terminal address can not show the contact electricity of e-mail recipient
It talks about and can only be dialed or be sent short messages, thus the telephone number of recipient is not revealed to anyone.
(5) since identifying code is that user is generating at random locally by software tool, the portions VA in identifying code are utilized
Point, it is legal logistics personnel that recipient, which can verify visit delivering mail, pretends to be logistics people to can avoid unauthorized person
The trust that member gains recipient by cheating enters its house or other personal airs, or implements swindle using package is forged;Utilize verification
The parts VB in code, the person of submitting of terminal address can verify whether the personnel that mail are legal mail reception people, keep away
Exempt to falsely claim as one's own mail.
(6) Encryption Algorithm of address information is encrypted using rivest, shamir, adelman, due to address at different levels has can
It can be exhausted, such as province and city address, rogue attacks person can be obtained true address information using exhaustive attack, that is, use public key
All possible address is encrypted and is compared with the encryption address to be attacked, but asymmetric close in preceding step
When code algorithm for encryption, the random number of a regular length is first added after encrypted plaintext, is then re-encrypted, after decryption then
Backmost additional random number removal obtains really in plain text, and such attacker just can not can utilize public key to possible address
Information is encrypted and compares to obtain true address information, thus the exhaustion of front can be resisted to the encryption of address information
Attack.
(7) since decoding module must be through national departments concerned or third party's trust center certification, and there is unique number, this
Ensure that logistics company only legal, with occupational qualification or personnel can just take decoding module.And due to decoding
Equipment can only be decrypted operation and can not export private key, ensure that private key will not be leaked.
(8) the sensitive information evidence that decoding module contacted periodically storage can arrive remote server, in this way if user's postal
Part is dropped address and is revealed, so that it may touch its information with which decoding module according to the trace address, and then trace phase
The logistics personnel of pass.
Method in illustrate the invention can be implemented, as shown in figure 3, providing a kind of express delivery scene of doing shopping at home
Under specific embodiment.
Third party's trust center formulates express delivery address except end according to province (or municipality directly under the Central Government), city (or area), street three-level
Address lists at different levels other than location, wherein province (or municipality directly under the Central Government) grade address includes:Hebei province, Henan Province, Jilin Province, Shandong Province,
Shanxi Province, Beijing, Shanghai City etc., city (or area) grade address include:Zhengzhou City, Sanmenxia City, Anyang, Shenyang City, Dalian
City, Haidian District Beijing, Chaoyang District Beijing etc., block grade address include:Sanmenxia City Huang Helu, ZhongGuancun, Haidian District, BeiJing road
Deng, at the same third party's trust center be above-mentioned each address according to the RSA asymmetric cryptographic algorithms with 1024 ciphertext lengths
Generation and the corresponding public private key pair in the address finally issue address lists at different levels and its corresponding public affairs by third party's trust center
Key.
Express company submits decoding module to third party's trust center and states the address that decoding module works, third party's letter
Appoint center after certification decoding module meets its safety requirements, by unique number and with decoding module work address it is corresponding
Private key injects decoding module.Such as:The address of decoding module work is Beijing, then it has private key corresponding with Beijing,
Using this private key, it can decrypt and obtain the address in each area of Beijing in logistics address.
The specialist tools software that user downloads from third party's trust center, by address lists at different levels specify mail address,
Input end address and contact details simultaneously choose whether to want identifying code, by the mail address of tool software generation classification nested partitions method
Information, while tool software can show generated identifying code to user.User keeps identifying code, is received if not me
The identifying code is then issued e-mail recipient by mail by network or other approach, while user is encrypted mail address information
Issue businessman.Encrypted mail address information tool has a format like:First-level address number is that country's number (does not encrypt, accounts for 1
A byte), address, second-level number (number of province or municipality directly under the Central Government) uses the corresponding public affairs in first-level address after adding 128 random numbers
Key is encrypted, and ciphertext length is 1024, accounts for 128 bytes, the third level is similar with the encryption of fourth stage address number, final word
It is 1024 that fourth stage address (number in street) corresponding public key encryption, ciphertext length are used after additional 128 random numbers, is accounted for
Of length no more than 80 Chinese characters of 128 bytes, wherein final word, letter, number (at most accounting for 160 bytes), by 4 parts
It constitutes, first part is address details, and second part is that e-mail recipient's name (is no more than 10 Chinese characters, at most accounts for 20
A byte), Part III is e-mail recipient's cell-phone number (11 ten's digits account for 11 bytes), and Part IV is verification
Code (accounts for 4 bytes, the 1-2 byte is the parts VA, and the 3-4 byte is the parts VB), therefore encrypted mail address information
Total length be 513 bytes.
Encrypted mail address information is converted into Quick Response Code by businessman using the Quick Response Code Core Generator of download, and two dimension
Code is attached to the package surface of user's commodity.Wherein Quick Response Code can be encoded using QRcode, it can preserve the letter of about 2K bytes
Breath, therefore encrypted mail address information is preserved enough.
It after express company receives the mail that businessman gives, scans the two-dimensional code first, according to first in scanning gained information
A byte obtains first-level address, and the close of the decoding module decryption address, second-level with private key corresponding to first-level address is used in combination
Text obtains address, second-level, and mail is dealt into address, second-level.The sorter of address, second-level (such as Henan Province) master station divides
Equipment is examined, by scanning the two-dimensional code and with the decoding module with the private key corresponding to address, second-level (such as with Henan Province's private
The decoding module of key) it decrypts 2-129 byte in scanning gained information and removes additional 16 bytes (128) in end
Random number obtains third-level address, and so on, until the terminal courier in street uses the special reading equipment held to mail
On Quick Response Code be scanned, the special decoding module read in equipment has the private key corresponding to the street, therefore to sweeping
The 386-513 byte in information obtained by retouching, which is decrypted, can be obtained final word.Special reading equipment is only able to display end
First and second, four parts in information, and Part III (cell-phone number of e-mail recipient) can only be dialed or be sent short messages, it can not
Seen by the special display screen for reading equipment.
After terminal courier finds e-mail recipient address, e-mail recipient can be by inquiring that the parts VA of identifying code are tested
The legitimacy of terminal courier is demonstrate,proved, terminal courier then can be by inquiring that the conjunction of e-mail recipient is verified in the parts VB of identifying code
Method.
Attempt illegally to be continuing with after method realization decoding module by feeding dog is lost or personnel leave office ceases to be in force automatically,
The method of password protection.
Decoding module needs timing to upload audit information, otherwise can cease to be in force automatically.
Decoding module has the unique key (can be made of multistage key) of oneself, realize the regular of key or it is urgent more
Newly.
Claims (7)
1. a kind of address information privacy protection method based on Quick Response Code, for protecting address information not to be illegally accessed and
It utilizes, it is characterised in that:This method workflow is as follows:
(1) this method is by carrying out classification nested partitions method by rank to address and generating Quick Response Code, only to different authorized parties
It can see its partial address information for seeing of business need, the privacy of address can be protected not to be illegally accessed and utilize;
(2) classification nested partitions method uses public key cryptography, user address information can be encrypted according to disclosed public key,
Only holding the decoding module for having respective private keys could decrypt and obtain address information;
(3) classification nested partitions method single-level address corresponding public key encryption next stage address so that have in mail transmittance process
There is the decoding module of upper level address corresponding private key that could correctly decrypt and obtain next stage address.
2. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Using this
Method, special reading equipment used in the person of submitting of terminal address can not show mail after decrypting and obtaining terminal address
The telephone number of recipient and can only dial or send short messages, thus the telephone number of recipient is not revealed to anyone.
3. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Using this
Method, the recipient of mail can be transmitted to by Email Sender through network or other modes the identifying code in his terminal address
The visit personnel of delivering mail of the parts VA verification whether be legal logistics personnel.
4. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Using this
Method, the person of submitting of mail terminal address can be verified using the identifying code VB in terminal address the personnel that mail whether be
Legal mail reception people.
5. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Mail passes
The mode of passing includes:Express delivery, parcel post, cargo logistics transportation.
6. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Described
Public key cryptography is first added the random number of a regular length after encrypted plaintext, is then re-encrypted before encrypting, decrypt
Then additional random number removal backmost is obtained afterwards in plain text, can really prevent the exhaustion for address information from attacking in this way
It hits.
7. a kind of address information privacy protection method based on Quick Response Code, it is characterised in that:This method specifically includes:
(1) random identifying code is locally generated in user by software tool, and add according to address is nested with identifying code generation classification
Close address information A, and identifying code is shown to user and issues recipient for it;
(2) Quick Response Code of A is attached to package surface;
(3) mail sender sorting devices at different levels, which scan the two-dimensional code and decrypt corresponding address part in A, obtains next stage address;
(4) the terminal person of submitting uses special reading equipment, scans the two-dimensional code and decrypts the end address for obtaining e-mail recipient, connection
It is phone and identifying code;
(5) it can be mutually authenticated by identifying code between the person of submitting and e-mail recipient;
(6) telephone number that special reading equipment decrypts is invisible, can only dial or send short messages for the terminal person of submitting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810423981.9A CN108710931B (en) | 2018-05-07 | 2018-05-07 | Mailing address information privacy protection method based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810423981.9A CN108710931B (en) | 2018-05-07 | 2018-05-07 | Mailing address information privacy protection method based on two-dimensional code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108710931A true CN108710931A (en) | 2018-10-26 |
CN108710931B CN108710931B (en) | 2021-08-17 |
Family
ID=63867830
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810423981.9A Active CN108710931B (en) | 2018-05-07 | 2018-05-07 | Mailing address information privacy protection method based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108710931B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110610096A (en) * | 2019-09-04 | 2019-12-24 | 广东外语外贸大学 | Express information protection method |
CN115118453A (en) * | 2022-05-19 | 2022-09-27 | 成都安美勤信息技术股份有限公司 | Mailing sensitive information privacy protection method based on commercial cipher algorithm |
CN117034326A (en) * | 2023-10-08 | 2023-11-10 | 园信(北京)科技有限公司 | Block chain-based super zip code using method, device and system and electronic equipment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080118070A1 (en) * | 2006-11-20 | 2008-05-22 | 6580874 Canada Inc. | Open and distributed systems to provide secure email service |
CN103177220A (en) * | 2013-04-12 | 2013-06-26 | 成都市易恒信科技有限公司 | Personal information encryption method in logistics system based on two-dimensional codes |
CN103401676A (en) * | 2013-07-16 | 2013-11-20 | 中国人民解放军海军工程大学 | Two-dimensional barcode-based logistics industry personal information privacy protection system and method |
US20140331291A1 (en) * | 2011-12-29 | 2014-11-06 | The Third Institute Of The Ministry Of Public Security | Method for generating and check-controlling network identity indentification code in network electronic identification card |
CN104281936A (en) * | 2013-10-07 | 2015-01-14 | 深圳市华傲数据技术有限公司 | Package information hierarchical display method and system |
CN104933371A (en) * | 2015-06-04 | 2015-09-23 | 南京邮电大学 | Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code |
CN105354693A (en) * | 2015-11-04 | 2016-02-24 | 中南大学 | Logistics industry-oriented system and method for cascade protection of user privacy information |
US20160192194A1 (en) * | 2014-12-29 | 2016-06-30 | Gongming Yang | Secure way to build internet credit system and protect private information |
CN107104969A (en) * | 2017-04-27 | 2017-08-29 | 山西大学 | The method that the individual privacy information in express delivery is protected with dynamic encryption mechanism |
CN107609406A (en) * | 2017-08-09 | 2018-01-19 | 南京邮电大学 | A kind of express delivery address encryption method based on geocoding |
-
2018
- 2018-05-07 CN CN201810423981.9A patent/CN108710931B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080118070A1 (en) * | 2006-11-20 | 2008-05-22 | 6580874 Canada Inc. | Open and distributed systems to provide secure email service |
US20140331291A1 (en) * | 2011-12-29 | 2014-11-06 | The Third Institute Of The Ministry Of Public Security | Method for generating and check-controlling network identity indentification code in network electronic identification card |
CN103177220A (en) * | 2013-04-12 | 2013-06-26 | 成都市易恒信科技有限公司 | Personal information encryption method in logistics system based on two-dimensional codes |
CN103401676A (en) * | 2013-07-16 | 2013-11-20 | 中国人民解放军海军工程大学 | Two-dimensional barcode-based logistics industry personal information privacy protection system and method |
CN104281936A (en) * | 2013-10-07 | 2015-01-14 | 深圳市华傲数据技术有限公司 | Package information hierarchical display method and system |
US20160192194A1 (en) * | 2014-12-29 | 2016-06-30 | Gongming Yang | Secure way to build internet credit system and protect private information |
CN104933371A (en) * | 2015-06-04 | 2015-09-23 | 南京邮电大学 | Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code |
CN105354693A (en) * | 2015-11-04 | 2016-02-24 | 中南大学 | Logistics industry-oriented system and method for cascade protection of user privacy information |
CN107104969A (en) * | 2017-04-27 | 2017-08-29 | 山西大学 | The method that the individual privacy information in express delivery is protected with dynamic encryption mechanism |
CN107609406A (en) * | 2017-08-09 | 2018-01-19 | 南京邮电大学 | A kind of express delivery address encryption method based on geocoding |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110610096A (en) * | 2019-09-04 | 2019-12-24 | 广东外语外贸大学 | Express information protection method |
CN115118453A (en) * | 2022-05-19 | 2022-09-27 | 成都安美勤信息技术股份有限公司 | Mailing sensitive information privacy protection method based on commercial cipher algorithm |
CN117034326A (en) * | 2023-10-08 | 2023-11-10 | 园信(北京)科技有限公司 | Block chain-based super zip code using method, device and system and electronic equipment |
CN117034326B (en) * | 2023-10-08 | 2024-01-30 | 园信(北京)科技有限公司 | Block chain-based super zip code using method, device and system and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108710931B (en) | 2021-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105719120B (en) | A method of encryption express delivery list privacy information | |
CN100533456C (en) | Security code production method and methods of using the same, and programmable device therefor | |
Kent | Internet privacy enhanced mail | |
CN105554032B (en) | A kind of identity real name verification method and verification system for posting part based on express delivery | |
CN101107805B (en) | Method and system of managing and filtering electronic messages using cryptographic techniques | |
US20060072745A1 (en) | Encryption system using device authentication keys | |
US20060280297A1 (en) | Cipher communication system using device authentication keys | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
CN108737374A (en) | The method for secret protection that data store in a kind of block chain | |
CN103181124A (en) | System and method for secure use of messaging systems | |
CN105656920B (en) | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery | |
CN1835434B (en) | Electronic mail system and method based on CPK safety authentication | |
CN106453268A (en) | Method for realizing express privacy protection in the logistics process | |
CN1283827A (en) | Universal electronic information network authentication system and method | |
CN105721148B (en) | A kind of data file encryption method and system based on double random numbers | |
CN107333262A (en) | A kind of system and method based on CN39 code authentication phone numbers | |
CN102055685B (en) | Method for encrypting webmail information | |
CN108710931A (en) | A kind of address information privacy protection method based on Quick Response Code | |
CN106127441A (en) | A kind of network system preventing personal information from leaking and implementation method | |
US7219229B2 (en) | Protected communication system | |
CN105490814B (en) | A kind of ticketing service real name identification method and system based on three-dimension code | |
CN111541603A (en) | Independent intelligent safety mail terminal and encryption method | |
CN115118453A (en) | Mailing sensitive information privacy protection method based on commercial cipher algorithm | |
CN102655454A (en) | Determination method and device for dynamic token trading | |
CN109412799A (en) | System and method for generating local key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |