CN104933371B - Logistics personal information intimacy protection system based on multi-layer security Quick Response Code - Google Patents
Logistics personal information intimacy protection system based on multi-layer security Quick Response Code Download PDFInfo
- Publication number
- CN104933371B CN104933371B CN201510301103.6A CN201510301103A CN104933371B CN 104933371 B CN104933371 B CN 104933371B CN 201510301103 A CN201510301103 A CN 201510301103A CN 104933371 B CN104933371 B CN 104933371B
- Authority
- CN
- China
- Prior art keywords
- information
- module
- code
- quick response
- response code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of intimacy protection systems of personal information in logistics progress based on Quick Response Code multi-layer security technology.The present invention combines Quick Response Code encryption technology and Multi-layer technology technology, it is intended to solve the problems, such as logistics platform leakage of personal information.Affiliated intimacy protection system mainly includes following module:Layering Quick Response Code decryption information extraction during the Quick Response Code layered encryption print modules of Ji Jian service departments, logistics transfer sweep module, logistics distribution end personal information authentication module.The present invention realizes logistics information inquiry authentication mechanism, solves the contradiction that can not be inquired after address information leakage existing for the inquiry of logistics odd numbers and encryption.
Description
Technical field
The present invention relates to a kind of logistics field individual privacies to protect system, and in particular to one kind is based on multi-layer security Quick Response Code
Logistics personal information intimacy protection system.
Background technology
It is reported that in websites such as " wash in a pan single 114 " and " odd numbers ", express delivery odd numbers information is by marked price, and price is from 0.4 yuan
It is differed to 2 yuan, and the adequate and systematic service such as subsidiary " generation bill kept on file (outbox connection) ".These business sites show, express delivery list merchandised
Number from lead to including Shen, justify it is logical, in lead to, multiple express companies including rhythm reaches, " wash in a pan single 114 " also writes that " odd numbers is from each
Ground courier ".It is a concern that these express delivery odd numbers information for being leaked, in addition to being used at Taobao " brush note ", it is also possible to
It is used to manufacture " vacation package " carry out the illegal activities such as swindling.In reality, entering the room for causing due to express delivery odd numbers information leakage is robbed
Robbery example is reported in media frequently.
Quick Response Code is as the inquiry fastest-rising retrieval mode of utilization rate recently.It is compared than one-dimension code, Quick Response Code has height
Density coding, memory capacity are big, and coding range is wide, and fault-tolerant ability is strong, and decoding reliability is high, with other technologies such as encryption measures knot
The features such as conjunction is widely used, and Quick Response Code can be printed using plain paper, low manufacture cost.Quick Response Code also is able to the storage Chinese
The much informations such as word, letter, number.
With the development of Internet technology, more and more users, businessman, platform use two-dimensional code scanning retrieval technique.
Quick Response Code main application fields include at present:1. identification:Such as business card, meeting signature;2. product traceability:Such as record pork,
The cargo logistics information of the commodity such as dairy produce;3. electronic bill:The systems such as many cinemas, train ticket employ Quick Response Code skill
Art;4. e-commerce:It such as scans poster Quick Response Code and obtains goods links and special discount;5. life & amusement:Such as scan the two-dimensional code
Directly obtain music, video download link.
Quick response (Quick Response, QR) Quick Response Code is most representative one kind and is most widely used
's.The design concept of QR Quick Response Codes is to solve to carry information content and error correction information.But Issued by China State Bureau of Technical Supervision《Soon
Fast response matrix code》Data encryption is not described in detail in standard.With the deep and application field of application market
Expansion, QR Quick Response Codes payment, transmit secret key, record personal sensitive information etc. encryption technologies field had it is more should
With.
The version of QR Quick Response Codes totally 40 versions from 1 to 40, the data capacity that each version can accommodate is from 26 to 3706 yard
Word etc..It is 21 from the length of side of version 1, each version increases by 1 later, and the length of side increases by 4, and the length of side of edition 40 is 177.QR two dimensions
Code share 4 error correcting ranks, respectively with L (low), M (in), Q (standard), H (height), code word ratio can be restored and be followed successively by
7%th, 15%, 25% and 30%.The error correction number of codewords of different error-correction levels is higher, opposite to be got over for the code word of coding information
It is few.
Quick Response Code encryption technology refer to all kinds of Quick Response Codes it is existing on the basis of, with the principle of cryptography by encryption technology
It is together in series with planar bar code technology, to realize that the encryption of information in Quick Response Code is transmitted.Current main Encryption Algorithm is to information
The image in 2 D code of encryption and generation is encrypted.QR two dimension code encryptions still belong to the starting stage.Chinese article code in 2007
What center was write《The technology of Quick Response Code and application》In propose the encrypted scheme of several Quick Response Codes.Liu Yunlong in 2012 etc. exists
The QR Quick Response Codes of des encryption are realized in Android phone.Ren Yongjin has studied Rijndae algorithms and the QR bis- of XOR operation
Tie up code encryption.A high man of virtue and ability in 2013 is had studied the encrypted QR Quick Response Codes of RC4.Week celebrating etc. has studied the QR bis- based on Ising models
Tie up code encryption algorithm.Simple interest peace gives a set of QR Quick Response Codes watermark encrypting technology.It is proposed in Ying Zheng etc. to two dimension within 2014
The multi-layer security technology of code information.
In conclusion existing algorithm not combine closely to information encryption with the generating process of Quick Response Code, only add
The close simple combination with Quick Response Code generation.It can not meet what the information exchange of each link and segmented in logistic information systems were extracted
Privacy protection function.
Invention content
Present invention mainly solves all plain code informations that express delivery odd numbers in logistics links covers all delivery sides and recipient
The problem of both sides' individual privacy information is caused to be very easy to obtain, technically realizes the separation of express delivery procedural information, cargo flow
The functions such as safety certification inquiry.
To achieve these goals, technical solution provided by the invention is as follows:
A kind of logistics personal information intimacy protection system based on multi-layer security Quick Response Code, including:
Input terminal inputs information for user;
Information generating module will fill in the information generation 2 D code information of terminal input;
Transmission authorizes extraction module, and transmission information is extracted from the 2 D code information of information generation terminal generation;
Distribution information extraction module extracts distribution information from the 2 D code information of information generation terminal generation;
It verifies cloud platform module, is authorized in extraction module and distribution information extraction module according to information generating module, transmission
Information generate a Digital verification code, and be sent to information recipient.
Information generating module includes input terminal, information segmenting encrypting module, two-dimension code generator and quick response code printer, defeated
The information for entering end reception input terminal is sent to information segmenting encrypting module, leads to by the encrypted information of information segmenting encrypting module
Two-dimension code generator generation Quick Response Code is crossed, and is exported by quick response code printer.
Transmission authorizes extraction module to include Response Code scan module and permission decoder module, and Response Code scan module will scan
To 2 D code information be transferred to permission decoder module, permission decoder module decodes the letter in Quick Response Code according to the permission of user
Breath.
Distribution information extraction module includes Response Code scan module, permission decoder module and verification decoder module, Quick Response Code
The 2 D code information scanned is transferred to permission decoder module by scan module, and permission decoder module is according to the permission solution of user
Information in permission decoder module and on the spot information are sent to verification cloud platform by the information in code Quick Response Code, verification decoder module
Module.
Verification cloud platform module includes information acquisition module, digital verification code generator, push platform and online data and looks into
Ask platform;Information generating module, transmission are authorized the information in extraction module and distribution information extraction module by information acquisition module
Acquisition summarizes, and is sent to online data searching platform and Digital verification code, and extraction code is generated by digital verification code generator, and
Information is issued by pushing platform and collects people.
The beneficial effects of the invention are as follows:
The present invention is based on multi-layer security technologies, and image in 2 D code information is directly generated by being electronically entered for odd numbers information,
And stage extraction technology is used, solve the information leakage problem that odd numbers information visible band is come in logistics distribution process.Item simultaneously
Mesh introduces odd numbers generation unique authentication short message, realizes logistics information inquiry authentication mechanism, solves the inquiry of logistics odd numbers and deposits
Address information leakage and the contradiction that can not inquire after encryption.
Description of the drawings
Attached drawing is used to provide further understanding of the present invention, and a part for constitution instruction, the reality with the present invention
Example is applied together for explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the multi-layer information encryption core algorithm of a preferred embodiment of the present invention and decrypting process figure;
Fig. 2 is logistics list sample figure after encryption;
Fig. 3 is the express delivery process flow diagram flow chart of one preferred embodiment of invention.
Specific embodiment
The present invention discloses a kind of logistics personal information intimacy protection system based on multi-layer security Quick Response Code, including:
Input terminal inputs information for user;
Information generating module will fill in the information generation 2 D code information of terminal input;
Transmission authorizes extraction module, and transmission information is extracted from the 2 D code information of information generation terminal generation;
Distribution information extraction module extracts distribution information from the 2 D code information of information generation terminal generation;
It verifies cloud platform module, is authorized in extraction module and distribution information extraction module according to information generating module, transmission
Information generate a Digital verification code, and be sent to information recipient.
Information generating module includes input terminal, information segmenting encrypting module, two-dimension code generator and quick response code printer, defeated
The information for entering end reception input terminal is sent to information segmenting encrypting module, leads to by the encrypted information of information segmenting encrypting module
Two-dimension code generator generation Quick Response Code is crossed, and is exported by quick response code printer.
Transmission authorizes extraction module to include Response Code scan module and permission decoder module, and Response Code scan module will scan
To 2 D code information be transferred to permission decoder module, permission decoder module decodes the letter in Quick Response Code according to the permission of user
Breath.
Distribution information extraction module includes Response Code scan module, permission decoder module and verification decoder module, Quick Response Code
The 2 D code information scanned is transferred to permission decoder module by scan module, and permission decoder module is according to the permission solution of user
Information in permission decoder module and on the spot information are sent to verification cloud platform by the information in code Quick Response Code, verification decoder module
Module.
Verification cloud platform module includes information acquisition module, digital verification code generator, push platform and online data and looks into
Ask platform;Information generating module, transmission are authorized the information in extraction module and distribution information extraction module by information acquisition module
Acquisition summarizes, and is sent to online data searching platform and Digital verification code, and extraction code is generated by digital verification code generator, and
Information is issued by pushing platform and collects people.
With reference to a preferred embodiment, the present invention will be described in detail.
As shown in Figure 1, in logistics progress, since sortation hubs needs manually check express delivery final destination.If using
General Two-Dimensional code generation technique, logistics personnel reuse remain able to after scanning device scanning to obtain addressee, sender it is complete
Information.The present invention by data in express delivery list by format extract, formed multiple regions, such as " city ", " street ", " doorplate ",
The fields such as " name " and " phone ".By coding encryptings technologies such as such as Hash codings before Quick Response Code is generated, plaintext address is believed
Then breath each field is encrypted using different secret keys by participle.Such as source addressee information " Prevalence In Qixia District, Nanjing City text
The Zhang San 18088886666 " of garden road 9 forms ciphertext " xyaxygtuedoutdiv " after multi-layer security
As shown in Fig. 2, the ciphertext of acquisition is formed into ciphertext Quick Response Code express delivery odd numbers by general QR Quick Response Codes encryption technology.
The odd numbers includes the multilayer ciphertext Quick Response Code that the preceding paragraph falls the cipher-text information generation, simultaneously containing logistics company information such as
" encryption express delivery " and structuring logistics odd numbers is such as " 8888888888 ", so that sender and addressee inquire.In order to ensure fast
The permission for passing odd numbers inquiry is not known by general logistics personnel, and the more detailed data flow knot of invention design is described below
Structure.
As shown in figure 3, contain each of entire Quick Response Code multi-layer security logistics personal information method for secret protection and system
Using role (sender, logistics employee, dispatching employee and addressee), the four module information generating module of system, transmission are awarded
Power extraction module, distribution information extraction module, verification cloud platform module (be called respectively in the present embodiment the generation of express delivery odd numbers,
Physical transportation, dispatching and consignee's verification, verification cloud platform).Idiographic flow is as follows:
Step 1:Express delivery addressee station personnel start information acquisition system terminal, confirm that network connection uses employee's account after unimpeded
Family and code entry system generate unified QR Quick Response Code public keys, and are saved in information acquisition terminal.There are one the terminal is held
Small-sized local data base, therefore after communicating and log in verification cloud platform, follow-up off-line operation can be carried out.
Step 2:Sender's use information acquisition terminal inputs express delivery information, for example existing express delivery odd numbers of information format, packet
It includes:Address of the addressee, name, telephone number;Sender address, name, telephone number;Other information etc..
Step 3:Sender is inputted information and carries out structuring participle by core Encryption Algorithm, is sliced into city, street, door
Then the fields such as board, name, phone are equipped with privately owned secret key using different Encryption Algorithm and are encrypted.As city is added using DES
Close algorithm, street are using RC Encryption Algorithm, name using IDEA encryption algorithm, phone using RSA cryptographic algorithms etc..It encrypts herein
Algorithm and secret key be not unique.It is separately set according to terminal hardware equipment in specific implementation process.Addressee, outbox are generated after encryption
People, the ciphertext 1 of other information, ciphertext 2 and ciphertext 3.
Step 4:Information acquisition terminal using general QR encryption generation ciphertext Quick Response Code, including information coding, Error Correction of Coding,
Generation image and etc..This step can be with general QR Quick Response Codes coding techniques, not described in detail herein.
Step 5:The Quick Response Code of generation and logistics company information, current logistics manifest number are synthesized into new output Quick Response Code,
As shown in Figure 1.And print three parts by the quick response code printer that information acquisition terminal is connected directly.Portion transfers to sender to preserve.
Other two parts are pasted on courier packages.
Step 6:If information acquisition terminal can communicate with verification cloud platform, then the ciphertext Quick Response Code of generation is sent to cloud clothes
Business device.If information acquisition terminal is in off-line state, the ciphertext Quick Response Code of generation is stored in local data base.
Step 7:After verification cloud platform receives the ciphertext Quick Response Code manifest from information acquisition terminal, Quick Response Code is solved
Code, and sender's telephone number ciphertext is decoded.Then a random verification code based on express delivery odd numbers plain code is generated, such as
Odd numbers " 8888888888 " generation identifying code " 123456 ".By short message sending to sender, to check express delivery path online.
Step 8:Express delivery collecting and distributing centre staff verifies cloud platform by special two-dimensional code scanning terminal landing, obtains just
Beginning information scanning permission.There is certain effective work limitation after scanning device initialization, verified without moment online communication.
Step 9:Logistics employee in collecting and distributing centre obtains express delivery to be arrived using two-dimensional code scanning terminal scanning quick despatch is authorized
Up to information such as sortation hubs, city, home-delivery centers.According to the logistics links of each loglstics enterprise how much, end of scan is only shown to
Up to next link destination.Such as lead to express delivery by Shen from Shanghai Songjiang street from certain express delivery to send, it is therefore an objective to Nanjing Qixia
Literature garden of area road 9.Entire logistics chain node is " Songjiang → Shanghai → Nanjing → Yadong celestial being woods → dispatching ".Then Songjiang collecting and distributing centre
It can only be seen in " Shanghai " after staff's scanning;Shanghai collecting and distributing centre staff receives express delivery, and " south can only be seen after scanning
Capital ";It can only be seen " Yadong celestial being woods " after Nanjing collecting and distributing centre staff scanning.
Step 10:Collecting and distributing centre staff scans quick despatch by end of scan every time, and terminal has been placed in network
In the environment of after, terminal by writing scan express delivery number odd numbers such as " 8888888888 " or in real time with collecting and distributing centre database pair
Connect or upload verification cloud platform.
Step 11:Dispatching personnel obtain dispatching permission using dispatching two-dimensional code scanning terminal landing verification cloud platform.Dispatching
Personnel are before shipment by dispensing terminal scanning QR Quick Response Codes, terminal generation addressee better address, surname (being free of name), part hand
Machine number (latter 4).Small item is printed, the addressee's Quick Response Code for being pasted onto quick despatch reserves place.
Step 12:While printing addressee's better address, verification cloud platform confirms that quick despatch is allotted, and one is sent from backstage
Item delivery of cargo identifying code.That is the delivery of cargo identifying code " 112233 " of verification cloud platform generation express delivery odd numbers " 8888888888 ", and pass through
Short message mode is sent to addressee.
Step 13:After dispatching personnel meet with addressee, addressee inputs delivery of cargo identifying code in accessory staff terminal equipment
" 112233 ", generation addressee's name full name extraction decryption secret key, scan the two-dimensional code.Display mistake then refuses accessory;Display is just
It is true then addressee is allowed to get.The Quick Response Code for posting address of the addressee gives addressee together with quick despatch.
Step 14:Addressee signs surname (being free of name) and partial phone at accessory personnel's receipt 2 D code information place of reserving
Number (latter 4) is as receipt.So that logistics company is kept on file, using management staff verify after accident is encountered and test
Card.
To sum up, the present invention is directed to all information plaintexts of express delivery odd numbers in logistics links as it can be seen that leading to the illegal express delivery people in part
Member brings by express delivery odd numbers information to marketing or even according to express delivery odd numbers information trace, harassing and wrecking addressee, sender
Criminal case.Quick Response Code multi-layer security technology proposed by the present invention can effectively protect express delivery odd numbers information in entire logistics stream
Confidentiality during logical, the safety for increasing client is sparse, reduces break one's promise problem and compensation that bad employee brings to express company
Repay problem.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, although with reference to aforementioned reality
Example is applied the present invention is described in detail, it for those skilled in the art, still can be to aforementioned each implementation
Technical solution recorded in example modifies or carries out equivalent replacement to which part technical characteristic.All essences in the present invention
With within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention god.
Claims (4)
1. a kind of logistics personal information intimacy protection system based on multi-layer security Quick Response Code, which is characterized in that including:
Input terminal inputs information, use information acquisition terminal input express delivery information for user;
Information generating module will fill in the information generation 2 D code information of terminal input;
Transmission authorizes extraction module, and transmission information is extracted from the 2 D code information of information generation terminal generation;
Distribution information extraction module extracts distribution information from the 2 D code information of information generation terminal generation;
It verifies cloud platform module, the letter in extraction module and distribution information extraction module is authorized according to information generating module, transmission
Cease and receive the ciphertext Quick Response Code of information acquisition terminal, Quick Response Code is decoded, and to sender's telephone number ciphertext into
Row decoding, generates a Digital verification code, and be sent to information recipient;Verify cloud platform module include information acquisition module,
Digital verification code generator, push platform and online data searching platform;Information acquisition module awards information generating module, transmission
Information collection in power extraction module and distribution information extraction module summarizes, and is sent to online data searching platform and digital verification
Code generates extraction code by digital verification code generator, and passes through to push platform and issue information and collect people.
2. the logistics personal information intimacy protection system according to claim 1 based on multi-layer security Quick Response Code, feature
It is, information generating module includes input terminal, information segmenting encrypting module, two-dimension code generator and quick response code printer, input
The information that end receives input terminal is sent to information segmenting encrypting module, passes through by the encrypted information of information segmenting encrypting module
Two-dimension code generator generates Quick Response Code, and is exported by quick response code printer.
3. the logistics personal information intimacy protection system according to claim 1 based on multi-layer security Quick Response Code, feature
It is, transmission authorizes extraction module to arrive scanning including Response Code scan module and permission decoder module, Response Code scan module
2 D code information be transferred to permission decoder module, permission decoder module decodes the letter in Quick Response Code according to the permission of user
Breath.
4. the logistics personal information intimacy protection system according to claim 1 based on multi-layer security Quick Response Code, feature
It is, distribution information extraction module includes Response Code scan module, permission decoder module and verification decoder module, two-dimensional code scanning
The 2 D code information scanned is transferred to permission decoder module by module, and permission decoder module decodes two according to the permission of user
The information in code is tieed up, the information in permission decoder module and on the spot information are sent to verification cloud platform mould by verification decoder module
Block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510301103.6A CN104933371B (en) | 2015-06-04 | 2015-06-04 | Logistics personal information intimacy protection system based on multi-layer security Quick Response Code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510301103.6A CN104933371B (en) | 2015-06-04 | 2015-06-04 | Logistics personal information intimacy protection system based on multi-layer security Quick Response Code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104933371A CN104933371A (en) | 2015-09-23 |
CN104933371B true CN104933371B (en) | 2018-06-22 |
Family
ID=54120533
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510301103.6A Active CN104933371B (en) | 2015-06-04 | 2015-06-04 | Logistics personal information intimacy protection system based on multi-layer security Quick Response Code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104933371B (en) |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426946B (en) * | 2015-11-25 | 2018-08-07 | 河北博英通讯技术有限公司 | A kind of layering of Quick Response Code and verification method |
CN105574692A (en) * | 2015-12-02 | 2016-05-11 | 华南农业大学 | Anonymous express information security system based on two-dimension code |
CN105373910A (en) * | 2015-12-16 | 2016-03-02 | 南京信息职业技术学院 | Express delivery system and express delivery method for protecting user privacy |
CN105656920B (en) * | 2016-02-03 | 2018-09-07 | 深圳支付界科技有限公司 | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery |
CN105554032B (en) * | 2016-02-03 | 2018-07-24 | 深圳支付界科技有限公司 | A kind of identity real name verification method and verification system for posting part based on express delivery |
CN105761038A (en) * | 2016-02-15 | 2016-07-13 | 刘小曲 | Express delivery method based on two-dimensional code and system thereof |
CN105847233A (en) * | 2016-03-10 | 2016-08-10 | 浪潮集团有限公司 | Switch for subfield encryption transmission |
CN105719120B (en) * | 2016-04-25 | 2019-11-15 | 成都木马人网络科技有限公司 | A method of encryption express delivery list privacy information |
CN106453268B (en) * | 2016-09-21 | 2019-06-07 | 四川大学 | A method of realizing express delivery secret protection in logistics progress |
CN108665195A (en) * | 2017-03-28 | 2018-10-16 | 金东纸业(江苏)股份有限公司 | A kind of logistic track method, mobile device, logistics monitoring equipment and mobile terminal |
CN108664798B (en) * | 2017-03-31 | 2021-06-29 | 北京京东尚科信息技术有限公司 | Information encryption method and device |
CN106960305A (en) * | 2017-04-14 | 2017-07-18 | 南京邮电大学 | A kind of information privacy protection formula network scheduling material-flow method |
CN107085778A (en) * | 2017-04-18 | 2017-08-22 | 上海斐讯数据通信技术有限公司 | A kind of logistical tracking systems and logistic track method |
CN107748846A (en) * | 2017-04-25 | 2018-03-02 | 南京邮电大学 | A kind of management method for protecting consumer privacy information under express delivery system of real name |
DE102017207345B3 (en) * | 2017-05-02 | 2018-07-26 | Thales Management & Services Deutschland Gmbh | Method of handling a freight container |
CN107273947A (en) * | 2017-06-06 | 2017-10-20 | 北京洋浦伟业科技发展有限公司 | The information processing method and device of user profile in hiding article transport list |
CN107609406A (en) * | 2017-08-09 | 2018-01-19 | 南京邮电大学 | A kind of express delivery address encryption method based on geocoding |
CN107578203A (en) * | 2017-09-04 | 2018-01-12 | 安徽爱她有果电子商务有限公司 | A kind of express company's system of the protection user profile based on e-commerce platform |
CN107809428A (en) * | 2017-10-27 | 2018-03-16 | 咪咕互动娱乐有限公司 | Information encryption method, decryption method, device and storage medium |
CN108416223B (en) * | 2018-02-11 | 2022-04-15 | 长沙理工大学 | Information label encryption method and system based on chaos theory |
CN108540464B (en) * | 2018-03-29 | 2021-03-09 | 贵州华城楼宇科技有限公司 | Information security management system and method |
CN108763937B (en) * | 2018-04-13 | 2021-06-29 | 拉扎斯网络科技(上海)有限公司 | Distribution document generation, distribution and popularization information processing method and device |
CN108710931B (en) * | 2018-05-07 | 2021-08-17 | 中共中央办公厅电子科技学院 | Mailing address information privacy protection method based on two-dimensional code |
CN110581831B (en) * | 2018-06-11 | 2021-12-03 | 腾讯科技(深圳)有限公司 | Communication method, information acquisition method, electronic device, and storage medium |
CN109409114B (en) * | 2018-11-05 | 2021-09-14 | 重庆邮电大学 | Parallel graph encryption method based on easy-to-remember structure |
CN109344654B (en) * | 2018-11-12 | 2021-11-19 | 金成思 | Two-dimensional code training clothes information encryption and identification system |
CN109670560A (en) * | 2018-11-13 | 2019-04-23 | 温州华天软件科技有限公司 | A kind of logistics information acquisition system reading and veritify function with identity |
CN109711199A (en) * | 2019-01-04 | 2019-05-03 | 杭州卓凯科技有限公司 | Shipping platform order information encryption method on line |
CN110724464A (en) * | 2019-10-28 | 2020-01-24 | 洛阳酷腿网络科技有限公司 | Adhesive tape containing anti-unpacking and anti-falling verification two-dimensional code |
CN112668953B (en) * | 2020-08-31 | 2023-09-29 | 浙江万里学院 | Method for embedding intelligent logistics sending and receiving information |
CN114266525B (en) * | 2021-12-31 | 2022-09-06 | 深圳市凯东源现代物流股份有限公司 | Collection-warehouse collection-distribution type storage and distribution system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930192A (en) * | 2012-09-19 | 2013-02-13 | 腾讯科技(深圳)有限公司 | Method for generating and acquiring safety information and relevant devices |
CN103177220A (en) * | 2013-04-12 | 2013-06-26 | 成都市易恒信科技有限公司 | Personal information encryption method in logistics system based on two-dimensional codes |
CN103401676A (en) * | 2013-07-16 | 2013-11-20 | 中国人民解放军海军工程大学 | Two-dimensional barcode-based logistics industry personal information privacy protection system and method |
CN103473661A (en) * | 2013-09-02 | 2013-12-25 | 深圳市华傲数据技术有限公司 | Logistic encryption signing method and system |
CN104036378A (en) * | 2014-06-24 | 2014-09-10 | 吉安市综合物流中心有限公司 | Logistics blind conveying system |
CN104463529A (en) * | 2014-11-26 | 2015-03-25 | 浙江工业大学 | Logistics distribution bill generating method based on two-dimension code and encryption technology |
-
2015
- 2015-06-04 CN CN201510301103.6A patent/CN104933371B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930192A (en) * | 2012-09-19 | 2013-02-13 | 腾讯科技(深圳)有限公司 | Method for generating and acquiring safety information and relevant devices |
CN103177220A (en) * | 2013-04-12 | 2013-06-26 | 成都市易恒信科技有限公司 | Personal information encryption method in logistics system based on two-dimensional codes |
CN103401676A (en) * | 2013-07-16 | 2013-11-20 | 中国人民解放军海军工程大学 | Two-dimensional barcode-based logistics industry personal information privacy protection system and method |
CN103473661A (en) * | 2013-09-02 | 2013-12-25 | 深圳市华傲数据技术有限公司 | Logistic encryption signing method and system |
CN104036378A (en) * | 2014-06-24 | 2014-09-10 | 吉安市综合物流中心有限公司 | Logistics blind conveying system |
CN104463529A (en) * | 2014-11-26 | 2015-03-25 | 浙江工业大学 | Logistics distribution bill generating method based on two-dimension code and encryption technology |
Also Published As
Publication number | Publication date |
---|---|
CN104933371A (en) | 2015-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104933371B (en) | Logistics personal information intimacy protection system based on multi-layer security Quick Response Code | |
CN105719120B (en) | A method of encryption express delivery list privacy information | |
CN104134142B (en) | A kind of subway booking recognized based on Quick Response Code, ticket checking method | |
CN101036152B (en) | Methods and systems for making, tracking and authentication of products | |
US7614546B2 (en) | Method and system for deterring product counterfeiting, diversion and piracy | |
CN201716765U (en) | Wine counterfeiting tracing system based on two-dimensional bar codes | |
US6081610A (en) | System and method for verifying signatures on documents | |
CN106452756A (en) | Construction verification method and device capable of verifying security two-dimensional code offline | |
CN107851111A (en) | Use the identity management services of block chain | |
CN105656920B (en) | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery | |
CN104123624A (en) | Confidential express method and system thereof | |
CN103177220A (en) | Personal information encryption method in logistics system based on two-dimensional codes | |
CN102509141A (en) | Electronic group-buying coupon and usage and system of electronic group-buying coupon | |
CN103679406A (en) | Method for authenticating parcel addressee by mark decoding device and decoding device | |
CN105554032A (en) | Identity real-name authentication method and authentication system based on express sending | |
CN106845275B (en) | A kind of the electronic bill management system and method for secret protection | |
CN107992923A (en) | A kind of QR Quick Response Codes generation and the method read | |
CN106022673A (en) | Logistics information security encryption method based on identity authentication and system based on identity authentication | |
CN106296049A (en) | A kind of express delivery receiving/transmission method, management server, terminal and express delivery receive-transmit system | |
CN106060016A (en) | Encryption logistic system | |
CN103415007A (en) | Mobile phone two-dimensional code safe use method based on information hiding | |
CN109190403A (en) | A kind of express delivery bill kept on file method for secret protection based on block chain | |
CN108710931B (en) | Mailing address information privacy protection method based on two-dimensional code | |
Sahu et al. | QR code and application in India | |
CN104021487A (en) | Digital anti-counterfeiting method for implementing repeated verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |