CN104933371B - Logistics personal information intimacy protection system based on multi-layer security Quick Response Code - Google Patents

Logistics personal information intimacy protection system based on multi-layer security Quick Response Code Download PDF

Info

Publication number
CN104933371B
CN104933371B CN201510301103.6A CN201510301103A CN104933371B CN 104933371 B CN104933371 B CN 104933371B CN 201510301103 A CN201510301103 A CN 201510301103A CN 104933371 B CN104933371 B CN 104933371B
Authority
CN
China
Prior art keywords
information
module
code
quick response
response code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510301103.6A
Other languages
Chinese (zh)
Other versions
CN104933371A (en
Inventor
李华康
孙国梓
杨涛
杨一涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201510301103.6A priority Critical patent/CN104933371B/en
Publication of CN104933371A publication Critical patent/CN104933371A/en
Application granted granted Critical
Publication of CN104933371B publication Critical patent/CN104933371B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of intimacy protection systems of personal information in logistics progress based on Quick Response Code multi-layer security technology.The present invention combines Quick Response Code encryption technology and Multi-layer technology technology, it is intended to solve the problems, such as logistics platform leakage of personal information.Affiliated intimacy protection system mainly includes following module:Layering Quick Response Code decryption information extraction during the Quick Response Code layered encryption print modules of Ji Jian service departments, logistics transfer sweep module, logistics distribution end personal information authentication module.The present invention realizes logistics information inquiry authentication mechanism, solves the contradiction that can not be inquired after address information leakage existing for the inquiry of logistics odd numbers and encryption.

Description

Logistics personal information intimacy protection system based on multi-layer security Quick Response Code
Technical field
The present invention relates to a kind of logistics field individual privacies to protect system, and in particular to one kind is based on multi-layer security Quick Response Code Logistics personal information intimacy protection system.
Background technology
It is reported that in websites such as " wash in a pan single 114 " and " odd numbers ", express delivery odd numbers information is by marked price, and price is from 0.4 yuan It is differed to 2 yuan, and the adequate and systematic service such as subsidiary " generation bill kept on file (outbox connection) ".These business sites show, express delivery list merchandised Number from lead to including Shen, justify it is logical, in lead to, multiple express companies including rhythm reaches, " wash in a pan single 114 " also writes that " odd numbers is from each Ground courier ".It is a concern that these express delivery odd numbers information for being leaked, in addition to being used at Taobao " brush note ", it is also possible to It is used to manufacture " vacation package " carry out the illegal activities such as swindling.In reality, entering the room for causing due to express delivery odd numbers information leakage is robbed Robbery example is reported in media frequently.
Quick Response Code is as the inquiry fastest-rising retrieval mode of utilization rate recently.It is compared than one-dimension code, Quick Response Code has height Density coding, memory capacity are big, and coding range is wide, and fault-tolerant ability is strong, and decoding reliability is high, with other technologies such as encryption measures knot The features such as conjunction is widely used, and Quick Response Code can be printed using plain paper, low manufacture cost.Quick Response Code also is able to the storage Chinese The much informations such as word, letter, number.
With the development of Internet technology, more and more users, businessman, platform use two-dimensional code scanning retrieval technique. Quick Response Code main application fields include at present:1. identification:Such as business card, meeting signature;2. product traceability:Such as record pork, The cargo logistics information of the commodity such as dairy produce;3. electronic bill:The systems such as many cinemas, train ticket employ Quick Response Code skill Art;4. e-commerce:It such as scans poster Quick Response Code and obtains goods links and special discount;5. life & amusement:Such as scan the two-dimensional code Directly obtain music, video download link.
Quick response (Quick Response, QR) Quick Response Code is most representative one kind and is most widely used 's.The design concept of QR Quick Response Codes is to solve to carry information content and error correction information.But Issued by China State Bureau of Technical Supervision《Soon Fast response matrix code》Data encryption is not described in detail in standard.With the deep and application field of application market Expansion, QR Quick Response Codes payment, transmit secret key, record personal sensitive information etc. encryption technologies field had it is more should With.
The version of QR Quick Response Codes totally 40 versions from 1 to 40, the data capacity that each version can accommodate is from 26 to 3706 yard Word etc..It is 21 from the length of side of version 1, each version increases by 1 later, and the length of side increases by 4, and the length of side of edition 40 is 177.QR two dimensions Code share 4 error correcting ranks, respectively with L (low), M (in), Q (standard), H (height), code word ratio can be restored and be followed successively by 7%th, 15%, 25% and 30%.The error correction number of codewords of different error-correction levels is higher, opposite to be got over for the code word of coding information It is few.
Quick Response Code encryption technology refer to all kinds of Quick Response Codes it is existing on the basis of, with the principle of cryptography by encryption technology It is together in series with planar bar code technology, to realize that the encryption of information in Quick Response Code is transmitted.Current main Encryption Algorithm is to information The image in 2 D code of encryption and generation is encrypted.QR two dimension code encryptions still belong to the starting stage.Chinese article code in 2007 What center was write《The technology of Quick Response Code and application》In propose the encrypted scheme of several Quick Response Codes.Liu Yunlong in 2012 etc. exists The QR Quick Response Codes of des encryption are realized in Android phone.Ren Yongjin has studied Rijndae algorithms and the QR bis- of XOR operation Tie up code encryption.A high man of virtue and ability in 2013 is had studied the encrypted QR Quick Response Codes of RC4.Week celebrating etc. has studied the QR bis- based on Ising models Tie up code encryption algorithm.Simple interest peace gives a set of QR Quick Response Codes watermark encrypting technology.It is proposed in Ying Zheng etc. to two dimension within 2014 The multi-layer security technology of code information.
In conclusion existing algorithm not combine closely to information encryption with the generating process of Quick Response Code, only add The close simple combination with Quick Response Code generation.It can not meet what the information exchange of each link and segmented in logistic information systems were extracted Privacy protection function.
Invention content
Present invention mainly solves all plain code informations that express delivery odd numbers in logistics links covers all delivery sides and recipient The problem of both sides' individual privacy information is caused to be very easy to obtain, technically realizes the separation of express delivery procedural information, cargo flow The functions such as safety certification inquiry.
To achieve these goals, technical solution provided by the invention is as follows:
A kind of logistics personal information intimacy protection system based on multi-layer security Quick Response Code, including:
Input terminal inputs information for user;
Information generating module will fill in the information generation 2 D code information of terminal input;
Transmission authorizes extraction module, and transmission information is extracted from the 2 D code information of information generation terminal generation;
Distribution information extraction module extracts distribution information from the 2 D code information of information generation terminal generation;
It verifies cloud platform module, is authorized in extraction module and distribution information extraction module according to information generating module, transmission Information generate a Digital verification code, and be sent to information recipient.
Information generating module includes input terminal, information segmenting encrypting module, two-dimension code generator and quick response code printer, defeated The information for entering end reception input terminal is sent to information segmenting encrypting module, leads to by the encrypted information of information segmenting encrypting module Two-dimension code generator generation Quick Response Code is crossed, and is exported by quick response code printer.
Transmission authorizes extraction module to include Response Code scan module and permission decoder module, and Response Code scan module will scan To 2 D code information be transferred to permission decoder module, permission decoder module decodes the letter in Quick Response Code according to the permission of user Breath.
Distribution information extraction module includes Response Code scan module, permission decoder module and verification decoder module, Quick Response Code The 2 D code information scanned is transferred to permission decoder module by scan module, and permission decoder module is according to the permission solution of user Information in permission decoder module and on the spot information are sent to verification cloud platform by the information in code Quick Response Code, verification decoder module Module.
Verification cloud platform module includes information acquisition module, digital verification code generator, push platform and online data and looks into Ask platform;Information generating module, transmission are authorized the information in extraction module and distribution information extraction module by information acquisition module Acquisition summarizes, and is sent to online data searching platform and Digital verification code, and extraction code is generated by digital verification code generator, and Information is issued by pushing platform and collects people.
The beneficial effects of the invention are as follows:
The present invention is based on multi-layer security technologies, and image in 2 D code information is directly generated by being electronically entered for odd numbers information, And stage extraction technology is used, solve the information leakage problem that odd numbers information visible band is come in logistics distribution process.Item simultaneously Mesh introduces odd numbers generation unique authentication short message, realizes logistics information inquiry authentication mechanism, solves the inquiry of logistics odd numbers and deposits Address information leakage and the contradiction that can not inquire after encryption.
Description of the drawings
Attached drawing is used to provide further understanding of the present invention, and a part for constitution instruction, the reality with the present invention Example is applied together for explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the multi-layer information encryption core algorithm of a preferred embodiment of the present invention and decrypting process figure;
Fig. 2 is logistics list sample figure after encryption;
Fig. 3 is the express delivery process flow diagram flow chart of one preferred embodiment of invention.
Specific embodiment
The present invention discloses a kind of logistics personal information intimacy protection system based on multi-layer security Quick Response Code, including:
Input terminal inputs information for user;
Information generating module will fill in the information generation 2 D code information of terminal input;
Transmission authorizes extraction module, and transmission information is extracted from the 2 D code information of information generation terminal generation;
Distribution information extraction module extracts distribution information from the 2 D code information of information generation terminal generation;
It verifies cloud platform module, is authorized in extraction module and distribution information extraction module according to information generating module, transmission Information generate a Digital verification code, and be sent to information recipient.
Information generating module includes input terminal, information segmenting encrypting module, two-dimension code generator and quick response code printer, defeated The information for entering end reception input terminal is sent to information segmenting encrypting module, leads to by the encrypted information of information segmenting encrypting module Two-dimension code generator generation Quick Response Code is crossed, and is exported by quick response code printer.
Transmission authorizes extraction module to include Response Code scan module and permission decoder module, and Response Code scan module will scan To 2 D code information be transferred to permission decoder module, permission decoder module decodes the letter in Quick Response Code according to the permission of user Breath.
Distribution information extraction module includes Response Code scan module, permission decoder module and verification decoder module, Quick Response Code The 2 D code information scanned is transferred to permission decoder module by scan module, and permission decoder module is according to the permission solution of user Information in permission decoder module and on the spot information are sent to verification cloud platform by the information in code Quick Response Code, verification decoder module Module.
Verification cloud platform module includes information acquisition module, digital verification code generator, push platform and online data and looks into Ask platform;Information generating module, transmission are authorized the information in extraction module and distribution information extraction module by information acquisition module Acquisition summarizes, and is sent to online data searching platform and Digital verification code, and extraction code is generated by digital verification code generator, and Information is issued by pushing platform and collects people.
With reference to a preferred embodiment, the present invention will be described in detail.
As shown in Figure 1, in logistics progress, since sortation hubs needs manually check express delivery final destination.If using General Two-Dimensional code generation technique, logistics personnel reuse remain able to after scanning device scanning to obtain addressee, sender it is complete Information.The present invention by data in express delivery list by format extract, formed multiple regions, such as " city ", " street ", " doorplate ", The fields such as " name " and " phone ".By coding encryptings technologies such as such as Hash codings before Quick Response Code is generated, plaintext address is believed Then breath each field is encrypted using different secret keys by participle.Such as source addressee information " Prevalence In Qixia District, Nanjing City text The Zhang San 18088886666 " of garden road 9 forms ciphertext " xyaxygtuedoutdiv " after multi-layer security
As shown in Fig. 2, the ciphertext of acquisition is formed into ciphertext Quick Response Code express delivery odd numbers by general QR Quick Response Codes encryption technology. The odd numbers includes the multilayer ciphertext Quick Response Code that the preceding paragraph falls the cipher-text information generation, simultaneously containing logistics company information such as " encryption express delivery " and structuring logistics odd numbers is such as " 8888888888 ", so that sender and addressee inquire.In order to ensure fast The permission for passing odd numbers inquiry is not known by general logistics personnel, and the more detailed data flow knot of invention design is described below Structure.
As shown in figure 3, contain each of entire Quick Response Code multi-layer security logistics personal information method for secret protection and system Using role (sender, logistics employee, dispatching employee and addressee), the four module information generating module of system, transmission are awarded Power extraction module, distribution information extraction module, verification cloud platform module (be called respectively in the present embodiment the generation of express delivery odd numbers, Physical transportation, dispatching and consignee's verification, verification cloud platform).Idiographic flow is as follows:
Step 1:Express delivery addressee station personnel start information acquisition system terminal, confirm that network connection uses employee's account after unimpeded Family and code entry system generate unified QR Quick Response Code public keys, and are saved in information acquisition terminal.There are one the terminal is held Small-sized local data base, therefore after communicating and log in verification cloud platform, follow-up off-line operation can be carried out.
Step 2:Sender's use information acquisition terminal inputs express delivery information, for example existing express delivery odd numbers of information format, packet It includes:Address of the addressee, name, telephone number;Sender address, name, telephone number;Other information etc..
Step 3:Sender is inputted information and carries out structuring participle by core Encryption Algorithm, is sliced into city, street, door Then the fields such as board, name, phone are equipped with privately owned secret key using different Encryption Algorithm and are encrypted.As city is added using DES Close algorithm, street are using RC Encryption Algorithm, name using IDEA encryption algorithm, phone using RSA cryptographic algorithms etc..It encrypts herein Algorithm and secret key be not unique.It is separately set according to terminal hardware equipment in specific implementation process.Addressee, outbox are generated after encryption People, the ciphertext 1 of other information, ciphertext 2 and ciphertext 3.
Step 4:Information acquisition terminal using general QR encryption generation ciphertext Quick Response Code, including information coding, Error Correction of Coding, Generation image and etc..This step can be with general QR Quick Response Codes coding techniques, not described in detail herein.
Step 5:The Quick Response Code of generation and logistics company information, current logistics manifest number are synthesized into new output Quick Response Code, As shown in Figure 1.And print three parts by the quick response code printer that information acquisition terminal is connected directly.Portion transfers to sender to preserve. Other two parts are pasted on courier packages.
Step 6:If information acquisition terminal can communicate with verification cloud platform, then the ciphertext Quick Response Code of generation is sent to cloud clothes Business device.If information acquisition terminal is in off-line state, the ciphertext Quick Response Code of generation is stored in local data base.
Step 7:After verification cloud platform receives the ciphertext Quick Response Code manifest from information acquisition terminal, Quick Response Code is solved Code, and sender's telephone number ciphertext is decoded.Then a random verification code based on express delivery odd numbers plain code is generated, such as Odd numbers " 8888888888 " generation identifying code " 123456 ".By short message sending to sender, to check express delivery path online.
Step 8:Express delivery collecting and distributing centre staff verifies cloud platform by special two-dimensional code scanning terminal landing, obtains just Beginning information scanning permission.There is certain effective work limitation after scanning device initialization, verified without moment online communication.
Step 9:Logistics employee in collecting and distributing centre obtains express delivery to be arrived using two-dimensional code scanning terminal scanning quick despatch is authorized Up to information such as sortation hubs, city, home-delivery centers.According to the logistics links of each loglstics enterprise how much, end of scan is only shown to Up to next link destination.Such as lead to express delivery by Shen from Shanghai Songjiang street from certain express delivery to send, it is therefore an objective to Nanjing Qixia Literature garden of area road 9.Entire logistics chain node is " Songjiang → Shanghai → Nanjing → Yadong celestial being woods → dispatching ".Then Songjiang collecting and distributing centre It can only be seen in " Shanghai " after staff's scanning;Shanghai collecting and distributing centre staff receives express delivery, and " south can only be seen after scanning Capital ";It can only be seen " Yadong celestial being woods " after Nanjing collecting and distributing centre staff scanning.
Step 10:Collecting and distributing centre staff scans quick despatch by end of scan every time, and terminal has been placed in network In the environment of after, terminal by writing scan express delivery number odd numbers such as " 8888888888 " or in real time with collecting and distributing centre database pair Connect or upload verification cloud platform.
Step 11:Dispatching personnel obtain dispatching permission using dispatching two-dimensional code scanning terminal landing verification cloud platform.Dispatching Personnel are before shipment by dispensing terminal scanning QR Quick Response Codes, terminal generation addressee better address, surname (being free of name), part hand Machine number (latter 4).Small item is printed, the addressee's Quick Response Code for being pasted onto quick despatch reserves place.
Step 12:While printing addressee's better address, verification cloud platform confirms that quick despatch is allotted, and one is sent from backstage Item delivery of cargo identifying code.That is the delivery of cargo identifying code " 112233 " of verification cloud platform generation express delivery odd numbers " 8888888888 ", and pass through Short message mode is sent to addressee.
Step 13:After dispatching personnel meet with addressee, addressee inputs delivery of cargo identifying code in accessory staff terminal equipment " 112233 ", generation addressee's name full name extraction decryption secret key, scan the two-dimensional code.Display mistake then refuses accessory;Display is just It is true then addressee is allowed to get.The Quick Response Code for posting address of the addressee gives addressee together with quick despatch.
Step 14:Addressee signs surname (being free of name) and partial phone at accessory personnel's receipt 2 D code information place of reserving Number (latter 4) is as receipt.So that logistics company is kept on file, using management staff verify after accident is encountered and test Card.
To sum up, the present invention is directed to all information plaintexts of express delivery odd numbers in logistics links as it can be seen that leading to the illegal express delivery people in part Member brings by express delivery odd numbers information to marketing or even according to express delivery odd numbers information trace, harassing and wrecking addressee, sender Criminal case.Quick Response Code multi-layer security technology proposed by the present invention can effectively protect express delivery odd numbers information in entire logistics stream Confidentiality during logical, the safety for increasing client is sparse, reduces break one's promise problem and compensation that bad employee brings to express company Repay problem.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, although with reference to aforementioned reality Example is applied the present invention is described in detail, it for those skilled in the art, still can be to aforementioned each implementation Technical solution recorded in example modifies or carries out equivalent replacement to which part technical characteristic.All essences in the present invention With within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention god.

Claims (4)

1. a kind of logistics personal information intimacy protection system based on multi-layer security Quick Response Code, which is characterized in that including:
Input terminal inputs information, use information acquisition terminal input express delivery information for user;
Information generating module will fill in the information generation 2 D code information of terminal input;
Transmission authorizes extraction module, and transmission information is extracted from the 2 D code information of information generation terminal generation;
Distribution information extraction module extracts distribution information from the 2 D code information of information generation terminal generation;
It verifies cloud platform module, the letter in extraction module and distribution information extraction module is authorized according to information generating module, transmission Cease and receive the ciphertext Quick Response Code of information acquisition terminal, Quick Response Code is decoded, and to sender's telephone number ciphertext into Row decoding, generates a Digital verification code, and be sent to information recipient;Verify cloud platform module include information acquisition module, Digital verification code generator, push platform and online data searching platform;Information acquisition module awards information generating module, transmission Information collection in power extraction module and distribution information extraction module summarizes, and is sent to online data searching platform and digital verification Code generates extraction code by digital verification code generator, and passes through to push platform and issue information and collect people.
2. the logistics personal information intimacy protection system according to claim 1 based on multi-layer security Quick Response Code, feature It is, information generating module includes input terminal, information segmenting encrypting module, two-dimension code generator and quick response code printer, input The information that end receives input terminal is sent to information segmenting encrypting module, passes through by the encrypted information of information segmenting encrypting module Two-dimension code generator generates Quick Response Code, and is exported by quick response code printer.
3. the logistics personal information intimacy protection system according to claim 1 based on multi-layer security Quick Response Code, feature It is, transmission authorizes extraction module to arrive scanning including Response Code scan module and permission decoder module, Response Code scan module 2 D code information be transferred to permission decoder module, permission decoder module decodes the letter in Quick Response Code according to the permission of user Breath.
4. the logistics personal information intimacy protection system according to claim 1 based on multi-layer security Quick Response Code, feature It is, distribution information extraction module includes Response Code scan module, permission decoder module and verification decoder module, two-dimensional code scanning The 2 D code information scanned is transferred to permission decoder module by module, and permission decoder module decodes two according to the permission of user The information in code is tieed up, the information in permission decoder module and on the spot information are sent to verification cloud platform mould by verification decoder module Block.
CN201510301103.6A 2015-06-04 2015-06-04 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code Active CN104933371B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510301103.6A CN104933371B (en) 2015-06-04 2015-06-04 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510301103.6A CN104933371B (en) 2015-06-04 2015-06-04 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code

Publications (2)

Publication Number Publication Date
CN104933371A CN104933371A (en) 2015-09-23
CN104933371B true CN104933371B (en) 2018-06-22

Family

ID=54120533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510301103.6A Active CN104933371B (en) 2015-06-04 2015-06-04 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code

Country Status (1)

Country Link
CN (1) CN104933371B (en)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426946B (en) * 2015-11-25 2018-08-07 河北博英通讯技术有限公司 A kind of layering of Quick Response Code and verification method
CN105574692A (en) * 2015-12-02 2016-05-11 华南农业大学 Anonymous express information security system based on two-dimension code
CN105373910A (en) * 2015-12-16 2016-03-02 南京信息职业技术学院 Express delivery system and express delivery method for protecting user privacy
CN105656920B (en) * 2016-02-03 2018-09-07 深圳支付界科技有限公司 A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery
CN105554032B (en) * 2016-02-03 2018-07-24 深圳支付界科技有限公司 A kind of identity real name verification method and verification system for posting part based on express delivery
CN105761038A (en) * 2016-02-15 2016-07-13 刘小曲 Express delivery method based on two-dimensional code and system thereof
CN105847233A (en) * 2016-03-10 2016-08-10 浪潮集团有限公司 Switch for subfield encryption transmission
CN105719120B (en) * 2016-04-25 2019-11-15 成都木马人网络科技有限公司 A method of encryption express delivery list privacy information
CN106453268B (en) * 2016-09-21 2019-06-07 四川大学 A method of realizing express delivery secret protection in logistics progress
CN108665195A (en) * 2017-03-28 2018-10-16 金东纸业(江苏)股份有限公司 A kind of logistic track method, mobile device, logistics monitoring equipment and mobile terminal
CN108664798B (en) * 2017-03-31 2021-06-29 北京京东尚科信息技术有限公司 Information encryption method and device
CN106960305A (en) * 2017-04-14 2017-07-18 南京邮电大学 A kind of information privacy protection formula network scheduling material-flow method
CN107085778A (en) * 2017-04-18 2017-08-22 上海斐讯数据通信技术有限公司 A kind of logistical tracking systems and logistic track method
CN107748846A (en) * 2017-04-25 2018-03-02 南京邮电大学 A kind of management method for protecting consumer privacy information under express delivery system of real name
DE102017207345B3 (en) * 2017-05-02 2018-07-26 Thales Management & Services Deutschland Gmbh Method of handling a freight container
CN107273947A (en) * 2017-06-06 2017-10-20 北京洋浦伟业科技发展有限公司 The information processing method and device of user profile in hiding article transport list
CN107609406A (en) * 2017-08-09 2018-01-19 南京邮电大学 A kind of express delivery address encryption method based on geocoding
CN107578203A (en) * 2017-09-04 2018-01-12 安徽爱她有果电子商务有限公司 A kind of express company's system of the protection user profile based on e-commerce platform
CN107809428A (en) * 2017-10-27 2018-03-16 咪咕互动娱乐有限公司 Information encryption method, decryption method, device and storage medium
CN108416223B (en) * 2018-02-11 2022-04-15 长沙理工大学 Information label encryption method and system based on chaos theory
CN108540464B (en) * 2018-03-29 2021-03-09 贵州华城楼宇科技有限公司 Information security management system and method
CN108763937B (en) * 2018-04-13 2021-06-29 拉扎斯网络科技(上海)有限公司 Distribution document generation, distribution and popularization information processing method and device
CN108710931B (en) * 2018-05-07 2021-08-17 中共中央办公厅电子科技学院 Mailing address information privacy protection method based on two-dimensional code
CN110581831B (en) * 2018-06-11 2021-12-03 腾讯科技(深圳)有限公司 Communication method, information acquisition method, electronic device, and storage medium
CN109409114B (en) * 2018-11-05 2021-09-14 重庆邮电大学 Parallel graph encryption method based on easy-to-remember structure
CN109344654B (en) * 2018-11-12 2021-11-19 金成思 Two-dimensional code training clothes information encryption and identification system
CN109670560A (en) * 2018-11-13 2019-04-23 温州华天软件科技有限公司 A kind of logistics information acquisition system reading and veritify function with identity
CN109711199A (en) * 2019-01-04 2019-05-03 杭州卓凯科技有限公司 Shipping platform order information encryption method on line
CN110724464A (en) * 2019-10-28 2020-01-24 洛阳酷腿网络科技有限公司 Adhesive tape containing anti-unpacking and anti-falling verification two-dimensional code
CN112668953B (en) * 2020-08-31 2023-09-29 浙江万里学院 Method for embedding intelligent logistics sending and receiving information
CN114266525B (en) * 2021-12-31 2022-09-06 深圳市凯东源现代物流股份有限公司 Collection-warehouse collection-distribution type storage and distribution system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930192A (en) * 2012-09-19 2013-02-13 腾讯科技(深圳)有限公司 Method for generating and acquiring safety information and relevant devices
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN103401676A (en) * 2013-07-16 2013-11-20 中国人民解放军海军工程大学 Two-dimensional barcode-based logistics industry personal information privacy protection system and method
CN103473661A (en) * 2013-09-02 2013-12-25 深圳市华傲数据技术有限公司 Logistic encryption signing method and system
CN104036378A (en) * 2014-06-24 2014-09-10 吉安市综合物流中心有限公司 Logistics blind conveying system
CN104463529A (en) * 2014-11-26 2015-03-25 浙江工业大学 Logistics distribution bill generating method based on two-dimension code and encryption technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930192A (en) * 2012-09-19 2013-02-13 腾讯科技(深圳)有限公司 Method for generating and acquiring safety information and relevant devices
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN103401676A (en) * 2013-07-16 2013-11-20 中国人民解放军海军工程大学 Two-dimensional barcode-based logistics industry personal information privacy protection system and method
CN103473661A (en) * 2013-09-02 2013-12-25 深圳市华傲数据技术有限公司 Logistic encryption signing method and system
CN104036378A (en) * 2014-06-24 2014-09-10 吉安市综合物流中心有限公司 Logistics blind conveying system
CN104463529A (en) * 2014-11-26 2015-03-25 浙江工业大学 Logistics distribution bill generating method based on two-dimension code and encryption technology

Also Published As

Publication number Publication date
CN104933371A (en) 2015-09-23

Similar Documents

Publication Publication Date Title
CN104933371B (en) Logistics personal information intimacy protection system based on multi-layer security Quick Response Code
CN105719120B (en) A method of encryption express delivery list privacy information
CN104134142B (en) A kind of subway booking recognized based on Quick Response Code, ticket checking method
CN101036152B (en) Methods and systems for making, tracking and authentication of products
US7614546B2 (en) Method and system for deterring product counterfeiting, diversion and piracy
CN201716765U (en) Wine counterfeiting tracing system based on two-dimensional bar codes
US6081610A (en) System and method for verifying signatures on documents
CN106452756A (en) Construction verification method and device capable of verifying security two-dimensional code offline
CN107851111A (en) Use the identity management services of block chain
CN105656920B (en) A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery
CN104123624A (en) Confidential express method and system thereof
CN103177220A (en) Personal information encryption method in logistics system based on two-dimensional codes
CN102509141A (en) Electronic group-buying coupon and usage and system of electronic group-buying coupon
CN103679406A (en) Method for authenticating parcel addressee by mark decoding device and decoding device
CN105554032A (en) Identity real-name authentication method and authentication system based on express sending
CN106845275B (en) A kind of the electronic bill management system and method for secret protection
CN107992923A (en) A kind of QR Quick Response Codes generation and the method read
CN106022673A (en) Logistics information security encryption method based on identity authentication and system based on identity authentication
CN106296049A (en) A kind of express delivery receiving/transmission method, management server, terminal and express delivery receive-transmit system
CN106060016A (en) Encryption logistic system
CN103415007A (en) Mobile phone two-dimensional code safe use method based on information hiding
CN109190403A (en) A kind of express delivery bill kept on file method for secret protection based on block chain
CN108710931B (en) Mailing address information privacy protection method based on two-dimensional code
Sahu et al. QR code and application in India
CN104021487A (en) Digital anti-counterfeiting method for implementing repeated verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant