CN114170736A - Express cabinet unpacking method based on near field communication technology - Google Patents

Express cabinet unpacking method based on near field communication technology Download PDF

Info

Publication number
CN114170736A
CN114170736A CN202111475775.0A CN202111475775A CN114170736A CN 114170736 A CN114170736 A CN 114170736A CN 202111475775 A CN202111475775 A CN 202111475775A CN 114170736 A CN114170736 A CN 114170736A
Authority
CN
China
Prior art keywords
user
express
authentication code
cabinet
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111475775.0A
Other languages
Chinese (zh)
Inventor
马山虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongtongji Network Technology Co Ltd
Original Assignee
Shanghai Zhongtongji Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhongtongji Network Technology Co Ltd filed Critical Shanghai Zhongtongji Network Technology Co Ltd
Priority to CN202111475775.0A priority Critical patent/CN114170736A/en
Publication of CN114170736A publication Critical patent/CN114170736A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • G07F17/13Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned the containers being a postal pick-up locker
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The application relates to the field of express delivery, and particularly discloses an express delivery cabinet unpacking method based on a near field communication technology, which comprises the steps of firstly obtaining user information and express delivery information corresponding to a user; generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment; receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the corresponding grid information for storing express corresponding to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding an encrypted identity authentication code sent by the express cabinet based on user NFC equipment; and finally, sending the grid information to an express cabinet for the express cabinet to open the corresponding grid. Therefore, by the method, after the user NFC equipment writes the identity authentication code, when the user needs to take the express delivery, no operation is needed, and the system or the server automatically opens the express delivery cabinet door for storing the express delivery of the user, so that the express delivery efficiency is improved, and the user experience is enhanced.

Description

Express cabinet unpacking method based on near field communication technology
Technical Field
The application relates to the field of express delivery, in particular to an express delivery cabinet unpacking method based on a near field communication technology.
Background
Along with the continuous increase of express delivery quantity, the user firstly needs to find the pickup code when picking up the express delivery, then manually inputs the pickup code in the express delivery cabinet through equipment such as a mobile phone, or after binding the mobile phone with a preset system, picks up the express delivery through a two-dimensional code scanning mode.
Disclosure of Invention
The application provides an express cabinet unpacking method based on a near field communication technology, and aims to solve the problems that in the prior art, in an express delivery pickup process, a plurality of user operation steps and large operation difficulty are caused.
The above object of the present application is achieved by the following technical solutions:
the embodiment of the application provides an express cabinet unpacking method based on a near field communication technology, which comprises the following steps:
acquiring user information and express delivery information corresponding to the user;
generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment;
receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the corresponding grid information for storing express, which corresponds to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding the encrypted identity authentication code sent by the user NFC equipment based on the express delivery cabinet;
and sending the grid information to an express cabinet for the express cabinet to open a corresponding grid.
Further, the user information includes a user mobile phone number and a user ID;
the express delivery information comprises an express delivery cabinet ID and grid information used for storing express delivery.
Further, the generating an encrypted authentication code corresponding to the user based on the user information includes:
generating an identity authentication code corresponding to the user by an SHA256 signature method based on the user information;
encrypting the identity authentication code through an RSA521 algorithm to generate an encrypted identity authentication code;
based on the encrypted authentication code sent by the user NFC equipment, decoding to obtain the authentication code comprises:
and decoding the encrypted identity authentication code through an RSA521 algorithm to obtain the identity authentication code.
Further, the determining the grid information corresponding to the express cabinet ID and the identity authentication code for storing the express includes:
determining the user information based on the express cabinet ID and the identity authentication code;
and determining the grid information corresponding to the ID of the express cabinet and the identity authentication code and used for storing the express based on the user information and the express information corresponding to the user.
Further, the writing the encrypted authentication code into the user NFC device includes:
sending the encrypted identity authentication code to a preset APP in the NFC equipment of the user;
and writing the encrypted identity authentication code into the user NFC equipment through the preset APP based on CoreNFC and/or NdefManager (android).
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
according to the technical scheme provided by the embodiment of the application, user information and express information corresponding to a user are obtained firstly; generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment; then receiving an express cabinet ID and an identity authentication code sent by the express cabinet, and determining the grid information for storing express corresponding to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding an encrypted identity authentication code sent by user NFC equipment based on an express delivery cabinet; and finally, sending the grid information to an express cabinet for the express cabinet to open the corresponding grid. Therefore, according to the express cabinet unpacking method based on the near field communication technology, after the user NFC equipment writes the identity authentication code in, when the user needs to take the express, no operation is needed, and the system or the server automatically opens the express cabinet door for storing the express of the user, so that the express taking efficiency is improved, and the user experience is enhanced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flow chart of an express cabinet unpacking method based on a near field communication technology according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an express delivery cabinet unpacking method based on a near field communication technology according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
In recent years, near field communication has become a popular vocabulary in the mobile field, but many people do not know its meaning or have only a vague idea about it. Some people just view it with mobile payment and mobile wallet solutions, etc., and think that near field communication is just shopping with a cell phone at a point of sale. And near field communication, as its name implies, refers to not only mobile payment and mobile wallets. Near field communication is a technology, also called short-range wireless communication, which is a short-range high-frequency wireless communication technology, and allows contactless point-to-point data transmission and data exchange between electronic devices.
The communication need not necessarily be between two handheld devices, but it can also work on mobile devices and some objects, such as sales terminal systems at store checkout counters, tags built in with near field communication chips, brand tags, posters, stamps or cards. For these simple purposes, the near field communication chip does not need battery support. Instead, the chip is in a passive state and can be activated by another device generating a radio frequency field.
Based on the remote communication mode, authentication information is sent to a remote server mostly through a mobile phone end or a cabinet machine end, and after the authentication information is analyzed by the server, the express cabinet is informed of unpacking through a remote pushing mode. In the authentication information acquisition stage, a two-dimensional code mode of inputting a verification code or scanning a screen of a cabinet air conditioner by hands is usually adopted, and the method has the problems that a user needs many operations and the operation difficulty is high, so that the efficiency of a pickup process is low and the user experience is poor.
In order to solve the problems, the application provides an express cabinet unpacking method and an express cabinet unpacking device based on a near field communication technology, so that the express item taking process is simplified, the user operation and operation difficulty are reduced, the item taking efficiency of a user is improved, and the item taking experience of the user is improved. Specific embodiments are illustrated in detail by the following examples.
Examples
Referring to fig. 1, fig. 1 is a schematic flow chart of an express delivery cabinet unpacking method based on a near field communication technology according to an embodiment of the present application, and as shown in fig. 1, the method at least includes the following steps:
s101, obtaining user information and express delivery information corresponding to the user.
And S102, generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the NFC equipment of the user.
In the express cabinet unpacking method based on the near field communication technology, the user information comprises a user mobile phone number and a user ID, and the express information comprises an express cabinet ID and grid information for storing express. The server side can encrypt and generate the user identity authentication code based on the user information and the express delivery information. Specifically, the server may sign the mobile phone number, the user ID, and the global SALT of the user by using the SHA256 signature method to generate the identity authentication code of the user. For any length of message, SHA256 generates a 256-bit hash value, called a message digest. This digest is equivalent to an array of 32 bytes in length, usually represented by a 64-byte hexadecimal string, where 1 byte is 8 bits and a hexadecimal character is 4 bits in length.
For example, assuming that a user a with a mobile phone number of 15600000000 has a user ID of 100001, we perform SHA256 signature using global SALT as FAKE, and the result is 297386F358BDB6CDC4A3BE46E8AC10628C0C793360442188E02BA6277579B 57D. This string is the authentication code of user a.
Further, after an authentication code corresponding to the user is generated by using the SHA256 signature method based on the user information, for the sake of security, in this application, the authentication code is further encrypted by using the RSA521 algorithm to generate an encrypted authentication code. Specifically, in order to ensure that data is transmitted more safely between hardware and reduce verification requests of a server, the identity authentication code is subjected to RSA asymmetric encryption and then is used as the final identity authentication code, so that information safety is ensured.
And then, writing the authentication information and the identity authentication code into the user equipment through a preset APP. Specifically, after the App acquires the authentication information, data can be written into the NFC-enabled device through corenfc (ios) and ndefmanager (android). For the partial write operation, the method can be realized by writing Android or iOS app, and the operation can also be performed by using a hardware NFC card writer. The written authentication code is just an identity authentication code.
It should be noted that most android and apple cell phones on the market at present have writable NFC chips, and besides the cell phones, the bracelet, NFC card, NFC button, and the like that support can all be used as a carrier for writing in authentication information.
S103, receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the grid information corresponding to the express cabinet ID and the identity authentication code and used for storing express.
The identity verification code is obtained by decoding the encrypted identity authentication code sent by the user NFC equipment based on the express delivery cabinet.
And S104, sending the grid information to an express cabinet for the express cabinet to open a corresponding grid.
Specifically, after receiving data transmitted by the user NFC device, the NFC data receiving device connected to the cabinet system first performs an asymmetric decryption locally, and if the decryption succeeds, it is verified that the data contains valid user identity authentication information.
The decryption method and the encryption method both adopt an RSA512 method. The RSA encryption algorithm is an asymmetric encryption algorithm. RSA is widely used in public key cryptography and electronic commerce. The public key (public key) and the private key (PrivateKey) are a key pair (i.e., a public key and a private key) obtained by an algorithm, the public key is a public part of the key pair, and the private key is an unpublished part. The public key is typically used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key. In the application, the private key can be stored only in the server side, and the public key can be placed in the cabinet system.
In the specific authentication and unpacking process, after the cabinet, namely express cabinet software, obtains a valid user identity authentication code, the cabinet ID and the authentication code are sent to the server, the server finds user information according to the authentication code, performs combined query with the associated cabinet ID, and sends a notification to the express cabinet to unpack after finding the grid information of the express cabinet in which the user express is located in the cabinet.
According to the express cabinet unpacking method based on the near field communication technology, after the user NFC equipment writes the identity authentication code in, when the user needs to take the express, the system or the server automatically opens the express cabinet door for storing the express of the user until the user needs to carry equipment such as a mobile phone. In practical application, since the identity information of the user is preset in the NFC device in an encrypted manner, in the step of identity authentication, the following two manners are not required to be adopted for authentication, for example, a mobile phone is started, then a corresponding app is opened, a corresponding page is entered, and code scanning authentication is performed. Or the card cabinet machine is clicked, the verification code input page is entered, the verification code in the mobile phone is opened, the verification code is input, and the authentication is completed. And the identity authentication can be completed only by enabling the NFC equipment (mobile phone or card) to be close to the NFC card reader. Because cell-phone or card easy operation, no matter be old man or child, all very convenient to use, easy operation uses the threshold low, what improve greatly gets an efficiency and promoted and get a experience.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (5)

1. An express cabinet unpacking method based on a near field communication technology is characterized by comprising the following steps:
acquiring user information and express delivery information corresponding to the user;
generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment;
receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the corresponding grid information for storing express, which corresponds to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding the encrypted identity authentication code sent by the user NFC equipment based on the express delivery cabinet;
and sending the grid information to an express cabinet for the express cabinet to open a corresponding grid.
2. The express delivery cabinet unpacking method based on the near field communication technology as claimed in claim 1,
the user information comprises a user mobile phone number and a user ID;
the express delivery information comprises an express delivery cabinet ID and grid information used for storing express delivery.
3. The express delivery cabinet unpacking method based on the near field communication technology, according to claim 1, wherein the generating of the encrypted authentication code corresponding to the user based on the user information includes:
generating an identity authentication code corresponding to the user by an SHA256 signature method based on the user information;
encrypting the identity authentication code through an RSA521 algorithm to generate an encrypted identity authentication code;
based on the encrypted authentication code sent by the user NFC equipment, decoding to obtain the authentication code comprises:
and decoding the encrypted identity authentication code through an RSA521 algorithm to obtain the identity authentication code.
4. The express cabinet unpacking method based on the near field communication technology, according to claim 1, wherein the determining of the grid information corresponding to the express cabinet ID and the identity authentication code and used for storing the express comprises:
determining the user information based on the express cabinet ID and the identity authentication code;
and determining the grid information corresponding to the ID of the express cabinet and the identity authentication code and used for storing the express based on the user information and the express information corresponding to the user.
5. The express delivery cabinet unpacking method based on the near field communication technology, according to claim 1, wherein the writing of the encrypted authentication code into the user NFC device includes:
sending the encrypted identity authentication code to a preset APP in the NFC equipment of the user;
and writing the encrypted identity authentication code into the user NFC equipment through the preset APP based on CoreNFC and/or NdefManager.
CN202111475775.0A 2021-12-06 2021-12-06 Express cabinet unpacking method based on near field communication technology Pending CN114170736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111475775.0A CN114170736A (en) 2021-12-06 2021-12-06 Express cabinet unpacking method based on near field communication technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111475775.0A CN114170736A (en) 2021-12-06 2021-12-06 Express cabinet unpacking method based on near field communication technology

Publications (1)

Publication Number Publication Date
CN114170736A true CN114170736A (en) 2022-03-11

Family

ID=80483238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111475775.0A Pending CN114170736A (en) 2021-12-06 2021-12-06 Express cabinet unpacking method based on near field communication technology

Country Status (1)

Country Link
CN (1) CN114170736A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104966357A (en) * 2015-05-28 2015-10-07 宇龙计算机通信科技(深圳)有限公司 Automatic receive-dispatch express delivery method and system
CN107134072A (en) * 2017-04-27 2017-09-05 上海斐讯数据通信技术有限公司 A kind of intelligent express delivery bin, pickup system and the implementation method of pickup
CN107437105A (en) * 2017-08-09 2017-12-05 哈尔滨工业大学 The safe express system of NFC and QR codes and application method of a kind of more role's whole scenes
CN108665644A (en) * 2017-03-28 2018-10-16 北大方正集团有限公司 Express mail processing method, apparatus and system
CN109285288A (en) * 2018-07-25 2019-01-29 顺丰科技有限公司 A kind of passive intelligent cabinet
CN109872465A (en) * 2019-02-22 2019-06-11 京东方科技集团股份有限公司 Express delivery stores equipment and its control method
CN110532824A (en) * 2019-08-19 2019-12-03 河海大学 Method is signed in a kind of express delivery based on NFC technique
CN112541990A (en) * 2020-12-07 2021-03-23 深圳市智莱科技股份有限公司 Door lock opening method and system of intelligent cabinet
CN113240861A (en) * 2021-05-17 2021-08-10 上海中通吉网络技术有限公司 Express delivery cabinet pickup system, method and equipment based on NFC

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104966357A (en) * 2015-05-28 2015-10-07 宇龙计算机通信科技(深圳)有限公司 Automatic receive-dispatch express delivery method and system
CN108665644A (en) * 2017-03-28 2018-10-16 北大方正集团有限公司 Express mail processing method, apparatus and system
CN107134072A (en) * 2017-04-27 2017-09-05 上海斐讯数据通信技术有限公司 A kind of intelligent express delivery bin, pickup system and the implementation method of pickup
CN107437105A (en) * 2017-08-09 2017-12-05 哈尔滨工业大学 The safe express system of NFC and QR codes and application method of a kind of more role's whole scenes
CN109285288A (en) * 2018-07-25 2019-01-29 顺丰科技有限公司 A kind of passive intelligent cabinet
CN109872465A (en) * 2019-02-22 2019-06-11 京东方科技集团股份有限公司 Express delivery stores equipment and its control method
CN110532824A (en) * 2019-08-19 2019-12-03 河海大学 Method is signed in a kind of express delivery based on NFC technique
CN112541990A (en) * 2020-12-07 2021-03-23 深圳市智莱科技股份有限公司 Door lock opening method and system of intelligent cabinet
CN113240861A (en) * 2021-05-17 2021-08-10 上海中通吉网络技术有限公司 Express delivery cabinet pickup system, method and equipment based on NFC

Similar Documents

Publication Publication Date Title
CN107077670B (en) Method and apparatus for transmitting and processing transaction message, computer readable storage medium
US9445262B2 (en) Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal
US10445722B2 (en) Systems and methods for enabling secure transactions with mobile devices
JP2015136121A (en) Updating mobile devices with additional elements
CN106527673A (en) Method and apparatus for binding wearable device, and electronic payment method and apparatus
US10643204B2 (en) Cryptography method and system for securing data via electronic transmission
CN102184499A (en) Account information binding method, financial transaction method and mobile terminal
CN109102291B (en) Security control method and device for two-dimensional code payment
CN110598433B (en) Block chain-based anti-fake information processing method and device
JP2014011762A (en) Information processing apparatus, terminal device, information processing system, method for information processing, and computer program
KR101162196B1 (en) System and Method for Assigning Dynamic ID to RFID Tag, RFID Tag, RFID Terminal and Recording Medium
CN105427102A (en) Financial IC card based authentication method and corresponding device and system
WO2017101585A1 (en) Smartcard reading device and method
CN101841806A (en) Service card information processing method, device and system and communication terminal
CN107172718B (en) Information processing method and electronic equipment
CN114170736A (en) Express cabinet unpacking method based on near field communication technology
KR101162227B1 (en) RFID Terminal
CN101887503B (en) Seed circulation supervision system and authentication method thereof
CN101330685B (en) Method for ciphering and transmitting short message
WO2008154872A1 (en) A mobile terminal, a method and a system for downloading bank card information or payment application information
CN105472545A (en) Bluetooth automatic connecting method, master device, slave device and system
KR101426223B1 (en) Method for checking confidential information using smartcard and smart terminal, and computer-readable recording medium for the same
KR101077860B1 (en) RFID tag
CN107231603B (en) Intelligent terminal and method for opening intelligent Bluetooth card online
CN103782304B (en) The method of pre-configured key during for manufacture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220311