CN108710931A - A kind of address information privacy protection method based on Quick Response Code - Google Patents

A kind of address information privacy protection method based on Quick Response Code Download PDF

Info

Publication number
CN108710931A
CN108710931A CN201810423981.9A CN201810423981A CN108710931A CN 108710931 A CN108710931 A CN 108710931A CN 201810423981 A CN201810423981 A CN 201810423981A CN 108710931 A CN108710931 A CN 108710931A
Authority
CN
China
Prior art keywords
address
address information
mail
quick response
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810423981.9A
Other languages
Chinese (zh)
Other versions
CN108710931B (en
Inventor
李晓东
杨金林
刘晶
金鑫
赵耿
张克君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
General Office Of Cpc Central Committee Institute Of Electronic Science And Technology
Original Assignee
General Office Of Cpc Central Committee Institute Of Electronic Science And Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by General Office Of Cpc Central Committee Institute Of Electronic Science And Technology filed Critical General Office Of Cpc Central Committee Institute Of Electronic Science And Technology
Priority to CN201810423981.9A priority Critical patent/CN108710931B/en
Publication of CN108710931A publication Critical patent/CN108710931A/en
Application granted granted Critical
Publication of CN108710931B publication Critical patent/CN108710931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

A kind of address information privacy protection method based on Quick Response Code, this method course of work are as follows:(1) random identifying code is locally generated in user by software tool, and the address information A of classification nested partitions method is generated according to address and identifying code, and identifying code is shown to user and issues recipient for it;(2) Quick Response Code of A is attached to package surface;(3) mail sender sorting devices at different levels, which scan the two-dimensional code and decrypt corresponding address part in A, obtains next stage address;(4) the terminal person of submitting uses special reading equipment, scans the two-dimensional code and decrypts the end address, telephone number and the identifying code that obtain e-mail recipient;(5) it can be mutually authenticated by identifying code between the person of submitting and e-mail recipient;(6) telephone number that special reading equipment decrypts is invisible, can only dial or send short messages for the terminal person of submitting.The present invention can prevent unauthorized party from obtaining the address information except business needs, for protecting address information not to be illegally accessed and utilize.

Description

A kind of address information privacy protection method based on Quick Response Code
Technical field
The present invention relates to information security field more particularly to a kind of address information privacy protection sides based on Quick Response Code Method prevents the leakage of address information according to the method for the present invention.
Background technology
The rapid development of Internet causes online electronic business transaction to have become main shopping side in people's daily life One of formula.Online electronic business transaction needs to send commodity in user hand by express delivery.Traditional method is that the address of user is believed Breath be attached to package surface, this is possible to the leakage for causing user sensitive information, as the specific dwelling places of user, cell-phone number and Name, these information are possible to be utilized by criminal, to obtain the trust of user to which user is swindled or be entered Room is plundered, it is also possible to is obtained by other people to carry out the behaviors such as advertising.
The safety used it is an object of the invention to enhance sensitive address information enhances sensitive especially in logistics progress Address information is protected, and is prevented these sensitive address informations from being obtained by other people and is used for illegal objective.
Invention content
The technical problem to be solved in the present invention is to propose a kind of guard method of logistics address information.Using this method energy The address information of user is enough set illegally not stolen in logistics progress.
The present invention, which solves the technical problem, to be achieved through the following technical solutions:A kind of mailing based on Quick Response Code Location information privacy protection method, for protecting address information not to be illegally accessed and utilize, this method workflow is as follows:
(1) this method is by carrying out classification nested partitions method by rank to address and generating Quick Response Code, to different mandates Side is only capable of seeing its partial address information for seeing of business need, and the privacy of address can be protected not to be illegally accessed and utilize;
(2) classification nested partitions method uses public key cryptography, user that can be carried out to address information according to disclosed public key Encryption, only holding the decoding module for having respective private keys could decrypt and obtain address information;
(3) classification nested partitions method single-level address corresponding public key encryption next stage address so that mail transmittance process In could correctly decrypt with the decoding module of upper level address corresponding private key and obtain next stage address.
Wherein, using this method, special reading equipment is decrypting and is obtaining terminal used in the person of submitting of terminal address Behind address, it can not show the telephone number of e-mail recipient and can only dial or send short messages, thus the contact electricity of recipient Words are not revealed to anyone.
Wherein, using this method, the recipient of mail can be transmitted to him by Email Sender through network or other modes Terminal address in the visit personnel of delivering mail of the parts VA verification of identifying code whether be legal logistics personnel.
Wherein, using this method, the person of submitting of mail terminal address can be verified using the identifying code VB in terminal address Whether the personnel to mail are legal mail reception people.
Wherein, mail transfer mode includes:Express delivery, parcel post, cargo logistics transportation.
Wherein, the public key cryptography, first added after encrypted plaintext before encrypting regular length with Machine number, then re-encrypts, and then additional random number removal backmost is obtained really in plain text after decryption, can prevent needle in this way To the exhaustive attack of address information.
A kind of address information privacy protection method based on Quick Response Code, this method specifically include:
(1) random identifying code is locally generated in user by software tool, and embedding according to address and identifying code generation classification Encrypted address information A is covered, and identifying code is shown to user and issues recipient for it;
(2) Quick Response Code of A is attached to package surface;
(3) mail sender sorting devices at different levels, which scan the two-dimensional code and decrypt corresponding address part in A, obtains next stage Address;
(4) the terminal person of submitting uses special reading equipment, with scanning the two-dimensional code and decrypt the end of acquisition e-mail recipient Location, telephone number and identifying code;
(5) it can be mutually authenticated by identifying code between the person of submitting and e-mail recipient;
(6) telephone number that special reading equipment decrypts is invisible, can only dial or send short messages for the terminal person of submitting.
The advantages of the present invention over the prior art are that:
(1) existing address information privacy protection method uses encrypted based on server access control or symmetric-key Mode, cannot achieve the offline encipherment protection of independent third party except postal company, and the present invention uses public key cryptography, user It can utilize the public key announced that its address information is encrypted before mailing, only be equipped with national departments concerned or third party The decoding module for the private key that trust center is distributed could be decrypted, and the private key in decoding module can not be exported and be replicated, thus Have the characteristics that offline property, protection intensity it is high, independently of express company, can trace afterwards.
(2) present invention is divided into multiple portions by logistics address rank to the address information of mail (such as country, province, city), adopts It is encrypted with different keys, during postal delivery, different postman can only decrypt the address part known needed for its business, because The granularity of this secret protection is thinner.
Description of the drawings
Fig. 1 is classification nested partitions method schematic diagram;
Fig. 2 is special reading equipment schematic diagram;
Fig. 3 is address encryption schematic diagram.
Specific implementation mode
Below in conjunction with the accompanying drawings and specific implementation mode further illustrates the present invention.
The logistics of user receives and is attached to mail package surface after address information is encrypted with quick response code form, only holds decryption The special reading equipment of key, which could read Quick Response Code and decrypt, obtains mail address information in plain text, mail address information plaintext quilt It is divided into multiple portions according to logistics address rank, as shown in Figure 1, using different cipher key hierarchy nested partitions methods, is posted in logistics Whole flow process in, the decoding module of different intermediate sortings or end is only capable of decrypting respective address part.Wherein, logistics Location rank is formulated according to geographic area, using tree.
The typical operation of this method is:
(1) user is locally generated random identifying code by software tool before mailing occurs (such as after shopping online), Identifying code can be number, character, Chinese character or pattern, and identifying code is divided into two parts VA and VB, and identifying code is retained one by user Part issues e-mail recipient's (e-mail recipient is also likely to be me) by network or other modes, is used for later certification.Meanwhile Software tool generates the address information of classification nested partitions method according to identifying code and the address of input, and address is descending to be divided into Multiple ranks, such as country, province, city, area and final word, wherein final word includes end address (such as cell, Lou Hao, room Number), contact details (telephone number and name of such as user) and identifying code.When generating classification nested partitions method address information, first use Final word A0Upper level address A1Corresponding public key encrypts final word to obtain C0, recycle A1Upper level address A2It is right The public key answered is A1Encryption obtains C1, then utilize A2Upper level address A3Corresponding public key is A2Encryption obtains C2, with such It pushes away, finally address An-1The upper level address A of (such as country)n(such as the whole world) corresponding public key is An-1Encryption obtains Cn-1, and handle AnAnd Cn-1、Cn-2、...、C1A is constituted together, since top level address An sensibility can be ignored, is not encrypted;
(2) user sends A to senders (such as businessman), and A is converted into Quick Response Code using tool and is attached to package by sender Sender's (such as loglstics enterprise) is given on surface;
(3) processing equipment of sender scans the Quick Response Code acquisition A on package surface firstnAnd Cn-1, then there is AnInstitute is right The decoding module of private key is answered to decrypt Cn-1Obtain An-1, and package shipment to An-1A is arrived in addressn-1Behind address, there is An-1Institute is right Answer the decoding module of private key by decrypting Cn-2Obtain secondary address An-2, and so on, until package is transported to address A1
(4)A1The person of submitting of address uses special reading equipment, and special reading equipment is by having corresponding A1Corresponding to address The decoding module of private key is by decrypting C1The final word of e-mail recipient is obtained, wherein the contact electricity included in final word Words by special reading equipment can only be dialed or be sent short messages for the person of submitting, and to e-mail recipient, (the specific telephone number person of submitting can not See), the person of submitting finds e-mail recipient according to end address, by showing identifying code VA proves it oneself is package to recipient The legal person of submitting, it is the legal person of submitting wrapped up that can verify him before opening the door for recipient, while the person of submitting can pass through Identifying code VB verification present receivers are legal.
In above-mentioned steps, the encryption of logistics address uses rivest, shamir, adelman, i.e., encrypted key and decryption it is close Key is different, and cannot mutually derive, and wherein encryption key is disclosed, referred to as public key, and decruption key is then secrecy, referred to as private Key.When being encrypted using asymmetric cryptographic algorithm, the random number of a regular length is first added after encrypted plaintext, then again Encryption then obtains additional random number removal backmost really in plain text after decryption.
In above-mentioned steps, identifying code is optional, i.e., user can allow software tool to generate verification in step (1) Code, and in step (4) only selection identifying code can also be generated for the two-way authentication between the person of submitting and e-mail recipient The parts VA or the parts VB, and the unilateral authentication between the person of submitting and e-mail recipient is carried out in step (4), it can also select not Identifying code is generated, without certification in step (4).
In step (4), as shown in Fig. 2, the special reading equipment that uses of the person of submitting can by Response Code scan module, translate Code module, communication module, input module, screen display module and control process module are constituted.Response Code scan module is used for It scans the two-dimensional code, decoding module is used for the private key having using itself and the information of scanning gained is decrypted, and communication module is used It is communicated in mobile phone, the base with e-mail recipient, input module, screen display module and control process module are respectively used to Input, presentation of information and overall control.Special reading equipment has fingerprint or password protection, to ensure its user for sender Specified user.
Safety analysis:
(1) address is dropped due to mail to be carried out locally with the public key corresponding to corresponding addresses at different levels by software tool Encryption, thus unauthorized persons (including sales platform) can not decrypt to obtain the address information of e-mail recipient.
(2) due to mail drop address using classification nested partitions method, either the sorting device in logistics progress or Sorter or the person of submitting of terminal can only obtain the information that each comfortable logistics business should obtain, and can not obtain other The address information that should not be obtained.Specifically, sorting device or sorter can only obtain the address of its address next stage, and nothing Method obtains the address information of next stage again down, and sorting device or sorter can not also decrypt the postal beyond its address range Part address information (sorting device in such as Henan Province or sorter can not decrypt the address information for being mailed to Hebei province).
(3) it can not be led from decoding module by normal operating or illegal means once write-in due to the private key in decoding module Go out, therefore even if many decoding modules all have the private key corresponding to same address, but logistics company personnel can not still replicate and translate Code module obtains the decryption oprerations that private key carries out mail address around decoding module.
(4) the special equipment that reads used in the person of submitting due to terminal address can not show the contact electricity of e-mail recipient It talks about and can only be dialed or be sent short messages, thus the telephone number of recipient is not revealed to anyone.
(5) since identifying code is that user is generating at random locally by software tool, the portions VA in identifying code are utilized Point, it is legal logistics personnel that recipient, which can verify visit delivering mail, pretends to be logistics people to can avoid unauthorized person The trust that member gains recipient by cheating enters its house or other personal airs, or implements swindle using package is forged;Utilize verification The parts VB in code, the person of submitting of terminal address can verify whether the personnel that mail are legal mail reception people, keep away Exempt to falsely claim as one's own mail.
(6) Encryption Algorithm of address information is encrypted using rivest, shamir, adelman, due to address at different levels has can It can be exhausted, such as province and city address, rogue attacks person can be obtained true address information using exhaustive attack, that is, use public key All possible address is encrypted and is compared with the encryption address to be attacked, but asymmetric close in preceding step When code algorithm for encryption, the random number of a regular length is first added after encrypted plaintext, is then re-encrypted, after decryption then Backmost additional random number removal obtains really in plain text, and such attacker just can not can utilize public key to possible address Information is encrypted and compares to obtain true address information, thus the exhaustion of front can be resisted to the encryption of address information Attack.
(7) since decoding module must be through national departments concerned or third party's trust center certification, and there is unique number, this Ensure that logistics company only legal, with occupational qualification or personnel can just take decoding module.And due to decoding Equipment can only be decrypted operation and can not export private key, ensure that private key will not be leaked.
(8) the sensitive information evidence that decoding module contacted periodically storage can arrive remote server, in this way if user's postal Part is dropped address and is revealed, so that it may touch its information with which decoding module according to the trace address, and then trace phase The logistics personnel of pass.
Method in illustrate the invention can be implemented, as shown in figure 3, providing a kind of express delivery scene of doing shopping at home Under specific embodiment.
Third party's trust center formulates express delivery address except end according to province (or municipality directly under the Central Government), city (or area), street three-level Address lists at different levels other than location, wherein province (or municipality directly under the Central Government) grade address includes:Hebei province, Henan Province, Jilin Province, Shandong Province, Shanxi Province, Beijing, Shanghai City etc., city (or area) grade address include:Zhengzhou City, Sanmenxia City, Anyang, Shenyang City, Dalian City, Haidian District Beijing, Chaoyang District Beijing etc., block grade address include:Sanmenxia City Huang Helu, ZhongGuancun, Haidian District, BeiJing road Deng, at the same third party's trust center be above-mentioned each address according to the RSA asymmetric cryptographic algorithms with 1024 ciphertext lengths Generation and the corresponding public private key pair in the address finally issue address lists at different levels and its corresponding public affairs by third party's trust center Key.
Express company submits decoding module to third party's trust center and states the address that decoding module works, third party's letter Appoint center after certification decoding module meets its safety requirements, by unique number and with decoding module work address it is corresponding Private key injects decoding module.Such as:The address of decoding module work is Beijing, then it has private key corresponding with Beijing, Using this private key, it can decrypt and obtain the address in each area of Beijing in logistics address.
The specialist tools software that user downloads from third party's trust center, by address lists at different levels specify mail address, Input end address and contact details simultaneously choose whether to want identifying code, by the mail address of tool software generation classification nested partitions method Information, while tool software can show generated identifying code to user.User keeps identifying code, is received if not me The identifying code is then issued e-mail recipient by mail by network or other approach, while user is encrypted mail address information Issue businessman.Encrypted mail address information tool has a format like:First-level address number is that country's number (does not encrypt, accounts for 1 A byte), address, second-level number (number of province or municipality directly under the Central Government) uses the corresponding public affairs in first-level address after adding 128 random numbers Key is encrypted, and ciphertext length is 1024, accounts for 128 bytes, the third level is similar with the encryption of fourth stage address number, final word It is 1024 that fourth stage address (number in street) corresponding public key encryption, ciphertext length are used after additional 128 random numbers, is accounted for Of length no more than 80 Chinese characters of 128 bytes, wherein final word, letter, number (at most accounting for 160 bytes), by 4 parts It constitutes, first part is address details, and second part is that e-mail recipient's name (is no more than 10 Chinese characters, at most accounts for 20 A byte), Part III is e-mail recipient's cell-phone number (11 ten's digits account for 11 bytes), and Part IV is verification Code (accounts for 4 bytes, the 1-2 byte is the parts VA, and the 3-4 byte is the parts VB), therefore encrypted mail address information Total length be 513 bytes.
Encrypted mail address information is converted into Quick Response Code by businessman using the Quick Response Code Core Generator of download, and two dimension Code is attached to the package surface of user's commodity.Wherein Quick Response Code can be encoded using QRcode, it can preserve the letter of about 2K bytes Breath, therefore encrypted mail address information is preserved enough.
It after express company receives the mail that businessman gives, scans the two-dimensional code first, according to first in scanning gained information A byte obtains first-level address, and the close of the decoding module decryption address, second-level with private key corresponding to first-level address is used in combination Text obtains address, second-level, and mail is dealt into address, second-level.The sorter of address, second-level (such as Henan Province) master station divides Equipment is examined, by scanning the two-dimensional code and with the decoding module with the private key corresponding to address, second-level (such as with Henan Province's private The decoding module of key) it decrypts 2-129 byte in scanning gained information and removes additional 16 bytes (128) in end Random number obtains third-level address, and so on, until the terminal courier in street uses the special reading equipment held to mail On Quick Response Code be scanned, the special decoding module read in equipment has the private key corresponding to the street, therefore to sweeping The 386-513 byte in information obtained by retouching, which is decrypted, can be obtained final word.Special reading equipment is only able to display end First and second, four parts in information, and Part III (cell-phone number of e-mail recipient) can only be dialed or be sent short messages, it can not Seen by the special display screen for reading equipment.
After terminal courier finds e-mail recipient address, e-mail recipient can be by inquiring that the parts VA of identifying code are tested The legitimacy of terminal courier is demonstrate,proved, terminal courier then can be by inquiring that the conjunction of e-mail recipient is verified in the parts VB of identifying code Method.
Attempt illegally to be continuing with after method realization decoding module by feeding dog is lost or personnel leave office ceases to be in force automatically, The method of password protection.
Decoding module needs timing to upload audit information, otherwise can cease to be in force automatically.
Decoding module has the unique key (can be made of multistage key) of oneself, realize the regular of key or it is urgent more Newly.

Claims (7)

1. a kind of address information privacy protection method based on Quick Response Code, for protecting address information not to be illegally accessed and It utilizes, it is characterised in that:This method workflow is as follows:
(1) this method is by carrying out classification nested partitions method by rank to address and generating Quick Response Code, only to different authorized parties It can see its partial address information for seeing of business need, the privacy of address can be protected not to be illegally accessed and utilize;
(2) classification nested partitions method uses public key cryptography, user address information can be encrypted according to disclosed public key, Only holding the decoding module for having respective private keys could decrypt and obtain address information;
(3) classification nested partitions method single-level address corresponding public key encryption next stage address so that have in mail transmittance process There is the decoding module of upper level address corresponding private key that could correctly decrypt and obtain next stage address.
2. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Using this Method, special reading equipment used in the person of submitting of terminal address can not show mail after decrypting and obtaining terminal address The telephone number of recipient and can only dial or send short messages, thus the telephone number of recipient is not revealed to anyone.
3. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Using this Method, the recipient of mail can be transmitted to by Email Sender through network or other modes the identifying code in his terminal address The visit personnel of delivering mail of the parts VA verification whether be legal logistics personnel.
4. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Using this Method, the person of submitting of mail terminal address can be verified using the identifying code VB in terminal address the personnel that mail whether be Legal mail reception people.
5. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Mail passes The mode of passing includes:Express delivery, parcel post, cargo logistics transportation.
6. the address information privacy protection method based on Quick Response Code as described in claim 1, it is characterised in that:Described Public key cryptography is first added the random number of a regular length after encrypted plaintext, is then re-encrypted before encrypting, decrypt Then additional random number removal backmost is obtained afterwards in plain text, can really prevent the exhaustion for address information from attacking in this way It hits.
7. a kind of address information privacy protection method based on Quick Response Code, it is characterised in that:This method specifically includes:
(1) random identifying code is locally generated in user by software tool, and add according to address is nested with identifying code generation classification Close address information A, and identifying code is shown to user and issues recipient for it;
(2) Quick Response Code of A is attached to package surface;
(3) mail sender sorting devices at different levels, which scan the two-dimensional code and decrypt corresponding address part in A, obtains next stage address;
(4) the terminal person of submitting uses special reading equipment, scans the two-dimensional code and decrypts the end address for obtaining e-mail recipient, connection It is phone and identifying code;
(5) it can be mutually authenticated by identifying code between the person of submitting and e-mail recipient;
(6) telephone number that special reading equipment decrypts is invisible, can only dial or send short messages for the terminal person of submitting.
CN201810423981.9A 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code Active CN108710931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810423981.9A CN108710931B (en) 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810423981.9A CN108710931B (en) 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code

Publications (2)

Publication Number Publication Date
CN108710931A true CN108710931A (en) 2018-10-26
CN108710931B CN108710931B (en) 2021-08-17

Family

ID=63867830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810423981.9A Active CN108710931B (en) 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN108710931B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610096A (en) * 2019-09-04 2019-12-24 广东外语外贸大学 Express information protection method
CN115118453A (en) * 2022-05-19 2022-09-27 成都安美勤信息技术股份有限公司 Mailing sensitive information privacy protection method based on commercial cipher algorithm
CN117034326A (en) * 2023-10-08 2023-11-10 园信(北京)科技有限公司 Block chain-based super zip code using method, device and system and electronic equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080118070A1 (en) * 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN103401676A (en) * 2013-07-16 2013-11-20 中国人民解放军海军工程大学 Two-dimensional barcode-based logistics industry personal information privacy protection system and method
US20140331291A1 (en) * 2011-12-29 2014-11-06 The Third Institute Of The Ministry Of Public Security Method for generating and check-controlling network identity indentification code in network electronic identification card
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN105354693A (en) * 2015-11-04 2016-02-24 中南大学 Logistics industry-oriented system and method for cascade protection of user privacy information
US20160192194A1 (en) * 2014-12-29 2016-06-30 Gongming Yang Secure way to build internet credit system and protect private information
CN107104969A (en) * 2017-04-27 2017-08-29 山西大学 The method that the individual privacy information in express delivery is protected with dynamic encryption mechanism
CN107609406A (en) * 2017-08-09 2018-01-19 南京邮电大学 A kind of express delivery address encryption method based on geocoding

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080118070A1 (en) * 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
US20140331291A1 (en) * 2011-12-29 2014-11-06 The Third Institute Of The Ministry Of Public Security Method for generating and check-controlling network identity indentification code in network electronic identification card
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN103401676A (en) * 2013-07-16 2013-11-20 中国人民解放军海军工程大学 Two-dimensional barcode-based logistics industry personal information privacy protection system and method
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
US20160192194A1 (en) * 2014-12-29 2016-06-30 Gongming Yang Secure way to build internet credit system and protect private information
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN105354693A (en) * 2015-11-04 2016-02-24 中南大学 Logistics industry-oriented system and method for cascade protection of user privacy information
CN107104969A (en) * 2017-04-27 2017-08-29 山西大学 The method that the individual privacy information in express delivery is protected with dynamic encryption mechanism
CN107609406A (en) * 2017-08-09 2018-01-19 南京邮电大学 A kind of express delivery address encryption method based on geocoding

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610096A (en) * 2019-09-04 2019-12-24 广东外语外贸大学 Express information protection method
CN115118453A (en) * 2022-05-19 2022-09-27 成都安美勤信息技术股份有限公司 Mailing sensitive information privacy protection method based on commercial cipher algorithm
CN117034326A (en) * 2023-10-08 2023-11-10 园信(北京)科技有限公司 Block chain-based super zip code using method, device and system and electronic equipment
CN117034326B (en) * 2023-10-08 2024-01-30 园信(北京)科技有限公司 Block chain-based super zip code using method, device and system and electronic equipment

Also Published As

Publication number Publication date
CN108710931B (en) 2021-08-17

Similar Documents

Publication Publication Date Title
CN105719120B (en) A method of encryption express delivery list privacy information
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
Kent Internet privacy enhanced mail
CN105554032B (en) A kind of identity real name verification method and verification system for posting part based on express delivery
CN101107805B (en) Method and system of managing and filtering electronic messages using cryptographic techniques
US20060072745A1 (en) Encryption system using device authentication keys
US20060280297A1 (en) Cipher communication system using device authentication keys
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN103181124A (en) System and method for secure use of messaging systems
CN105656920B (en) A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery
CN1835434B (en) Electronic mail system and method based on CPK safety authentication
CN106453268A (en) Method for realizing express privacy protection in the logistics process
CN1283827A (en) Universal electronic information network authentication system and method
CN105721148B (en) A kind of data file encryption method and system based on double random numbers
CN107333262A (en) A kind of system and method based on CN39 code authentication phone numbers
CN102055685B (en) Method for encrypting webmail information
CN108710931A (en) A kind of address information privacy protection method based on Quick Response Code
CN106127441A (en) A kind of network system preventing personal information from leaking and implementation method
US7219229B2 (en) Protected communication system
CN105490814B (en) A kind of ticketing service real name identification method and system based on three-dimension code
CN111541603A (en) Independent intelligent safety mail terminal and encryption method
CN115118453A (en) Mailing sensitive information privacy protection method based on commercial cipher algorithm
CN102655454A (en) Determination method and device for dynamic token trading
CN109412799A (en) System and method for generating local key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant