CN106453268A - Method for realizing express privacy protection in the logistics process - Google Patents

Method for realizing express privacy protection in the logistics process Download PDF

Info

Publication number
CN106453268A
CN106453268A CN201610837887.9A CN201610837887A CN106453268A CN 106453268 A CN106453268 A CN 106453268A CN 201610837887 A CN201610837887 A CN 201610837887A CN 106453268 A CN106453268 A CN 106453268A
Authority
CN
China
Prior art keywords
terminal
key
express delivery
cloud server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610837887.9A
Other languages
Chinese (zh)
Other versions
CN106453268B (en
Inventor
赵亮
刘光明
苏欣雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Original Assignee
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan University filed Critical Sichuan University
Priority to CN201610837887.9A priority Critical patent/CN106453268B/en
Publication of CN106453268A publication Critical patent/CN106453268A/en
Application granted granted Critical
Publication of CN106453268B publication Critical patent/CN106453268B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention relates to the technical field of the logistics security, and discloses a method for realizing express privacy protection in the logistics process. The method comprises the following steps: performing re-encryptions at different levels on delivery information and privacy information of a user by use of a secret key set from a cloud server when sending and receiving an express, and then managing the secret key set through the cloud server, granting different decryption permissions aiming at different decryption requesters, thereby limiting the decryption permission of a courier in delivering the express, wherein the courier can only use partial secret key from the cloud server to decrypt to acquire the delivery information. Therefore, an illegal person cannot directly acquire the express information since the direct exposure of the express information is avoided, and the condition that the courier uses the position to acquire the privacy information of a customer can be prevented, thereby realizing the safety protection of the express privacy, inhibiting the illegality of dealing the express list, and facilitating the popularization of the real-name system of the express.

Description

A kind of method for realizing express delivery secret protection in logistics progress
Technical field
The present invention relates to logistics security technical field, in particular it relates to one kind realizes express delivery privacy guarantor in logistics progress The method of shield.
Background technology
During existing logistics transportation, the express delivery list being attached on quick despatch describes the personal letter of user in detail Breath, such as name and the cell-phone number of dispensing address and article receiving and sending people, these personal information are directly exposed without being encrypted guarantor Shield, so easily causes the problem of leakage of personal information.By search keyword in Baidu " buying express delivery list ", as a result show 727,000 result, at the same much dealing website to express delivery odd numbers marked price, integrity degree according to information solicitation, whether Scanned it is divided into different class.The reason for causing this phenomenon mainly has two:One is a lack of information protection measure, and two are Lack the effective supervision to practitioner, as express delivery practitioner's quality is uneven, and can touch daily in a large number Express delivery list, under the temptation of interests, define a black interests chain, as soon as buyer need to only find flower less than yuan, One can be bought and included the express delivery list that posts part and address of the addressee, telephone number, express delivery odd numbers, sign for the time, while arriving official Can find out that information is all correct according to odd numbers information on the net.
As can be seen here, most reason of express delivery privacy leakage is being carried out due to the express delivery practitioner of basic unit of company Express delivery list information is peddled, and due to have ignored this source, is not carried out authority restriction to courier, is caused courier permissible See the complete information on express delivery list, while reading information, courier can be carried out making a copy of, it is impossible to be realized to fast well Pass the protection of information.This will be unfavorable for the popularization of express delivery system of real name:After express delivery system of real name is implemented, more personal core letters Breath will be placed on express delivery list, if can not contain that courier peddles the present situation of express delivery list, the private information security of customer will Threatened by serious.
Content of the invention
For aforementioned problem of the prior art, the invention provides a kind of realize express delivery secret protection in logistics progress Method, its application when fitting is sent out carries out different layers from the key set of Cloud Server to the distribution information of user and privacy information Secondary re-encryption, then passes through management of the Cloud Server to key set, authorizes different deciphering for different decoding request persons Authority, so when part is sent, can limit the decrypted rights of courier so as to can only apply the part of key solution from Cloud Server Close acquisition distribution information, thus can not only avoid express delivery information by directly exposed, prevent from, by unauthorized person direct access, may be used also The privacy information of customer is obtained to prevent courier from taking advantage of one's position, such that it is able to realize the safeguard protection of express delivery privacy, suppression The illegal act of system dealing express delivery list, beneficial to the popularization of express delivery system of real name.Further, since mix during re-encryption employing MAC algorithm, hash algorithm and symmetric encipherment algorithm, can ensure the safety of final gained express delivery information ciphertext, be easy to actually push away Wide and application.
A kind of the technical solution used in the present invention, there is provided method for realizing express delivery secret protection in logistics progress, bag Containing following steps:S101. in express delivery fitting, re-encryption is carried out to express delivery information:Express delivery information is being divided into privacy by first terminal Information m1With distribution information m2Afterwards, to Cloud Server, express delivery odd numbers, acquisition request key corresponding with the express delivery odd numbers are sent Collection, the key set includes internal layer symmetric key k1, MAC key k2With outer layer symmetric key k3, then according to acquisition is defined as below Express delivery information ciphertext e:
E=E (MAC (m1,k2)||E(m1,k1)||H(E(m1,k1)||MAC(m1,k2))||m2,k3)
In formula, E (m, k) is the symmetric encipherment algorithm for applying key k to be encrypted information m, the ciphertext of output information m, H (m) For hash algorithm, the hash value of output information m, MAC (m, k) is the MAC algorithm for applying key k to process information m, output The MAC value of information m, " | | " represent before and after two byte streams concatenation;S102. first terminal sends the express delivery information to Cloud Server Ciphertext e, while express delivery information ciphertext e/ and the express delivery odd numbers are converted into the graphic code for being attached on quick despatch; S103. Cloud Server stores the express delivery odd numbers and corresponding key set and express delivery information ciphertext e;S104. in express delivery Local deciphering is carried out to the graphic code:Second terminal after the graphic code is scanned, obtain express delivery information ciphertext e/ and The express delivery odd numbers, then sends the express delivery odd numbers for obtaining to Cloud Server, and acquisition request is corresponding close with the express delivery odd numbers The outer layer symmetric key k that key is concentrated3, finally apply the outer layer symmetric key k3Outer layer solution is carried out to express delivery information ciphertext e Close, obtain distribution information m2.
Optimizing, express delivery odd numbers is being sent to Cloud Server, acquisition request key set corresponding with the express delivery odd numbers In step, comprise the steps:S201. first terminal sends first key request message, the first key to Cloud Server Terminal iidentification of the request message comprising first terminal, the first checking information and the express delivery odd numbers;S202. Cloud Server is according to institute The terminal iidentification of first terminal and first checking information checking first terminal whether lawful registration is stated, if lawful registration, Subsequent step S203 to S206 is executed, and otherwise first key request failure message is fed back to first terminal;S203. Cloud Server with Machine generates internal layer symmetric key k1, MAC key k2With outer layer symmetric key k3, constitute key set corresponding with the express delivery odd numbers; S204. Cloud Server application locally preserve and key described in the RSA public key encryption that uploaded in registration by first terminal Collection, obtains key set ciphertext;S205. Cloud Server feeds back the key set ciphertext to first terminal;S206. first terminal application Key set ciphertext described in a local RSA private key pair is decrypted, and obtains the key set, a RSA private key and institute It is the key pair being mutually paired to state a RAS public key.
Optimize further, also comprised the steps before step S201:S301. first terminal includes in generation The key of the first RSA public key and a RAS private key sends the first login request message, institute to rear to Cloud Server State terminal iidentification of first login request message comprising the first terminal and first checking information;S302. Cloud Server According to first checking information, first terminal being verified, if being verified, subsequent step S303 to S307 is executed, no First registration failure message is then fed back;S303. Cloud Server feeds back public key certificate to first terminal;S304. first terminal application The public key certificate obtains a RSA public key cryptography to a RSA public key encryption;S305. first terminal is by described first RSA public key cryptography is sent to Cloud Server;S306. public key certificate described in Cloud Server application is to a RSA public key cryptography It is decrypted, obtains a RSA public key;S307. Cloud Server stores the terminal iidentification of the first terminal and corresponding First checking information and a RSA public key, complete the lawful registration of first terminal.
Optimize, in the express delivery odd numbers for sending acquisition to Cloud Server, acquisition request is corresponding close with the express delivery odd numbers The outer layer symmetric key k that key is concentrated3The step of in, comprise the steps:S401. second terminal is close to Cloud Server transmission second Key request message, terminal iidentification of second secret key request message comprising second terminal, the second checking information and the express delivery Odd numbers;S402. according to the terminal iidentification of the second terminal and second checking information, Cloud Server verifies that second terminal is No lawful registration, if lawful registration, executes subsequent step S403 to S406, otherwise feeds back the second key request to second terminal Failed message;S403. Cloud Server finds outer in key set corresponding with the express delivery odd numbers according to the express delivery odd numbers Layer symmetric key k3;S404. Cloud Server application locally preserve and the 2nd RSA public key that uploaded in registration by second terminal Encrypt the outer layer symmetric key k3, obtain outer layer symmetric key ciphertext;S405. Cloud Server is described outer to second terminal feedback Layer symmetric key ciphertext;S406. outer layer symmetric key ciphertext described in the 2nd local RSA private key pair of second terminal application is solved Close, obtain the outer layer symmetric key k3, the 2nd RSA private key and the 2nd RAS public key are the key pair of pairing.
Optimize further, also comprised the steps before step S401:S501. second terminal includes in generation The key of the 2nd RSA public key and the 2nd RAS private key sends the second login request message, institute to rear to Cloud Server State terminal iidentification of second login request message comprising the second terminal and second checking information;S502. Cloud Server According to second checking information, second terminal being verified, if being verified, subsequent step S503 to S507 is executed, no Second registration failure message is then fed back;S503. Cloud Server feeds back public key certificate to second terminal;S504. second terminal application The public key certificate obtains the 2nd RSA public key cryptography to the 2nd RSA public key encryption;S505. second terminal is by described second RSA public key cryptography is sent to Cloud Server;S506. public key certificate described in Cloud Server application is to the 2nd RSA public key cryptography It is decrypted, obtains the 2nd RSA public key;S507. Cloud Server stores the terminal iidentification of the second terminal and corresponding Second checking information and the 2nd RSA public key, complete the lawful registration of second terminal.
Optimize further, after step S403, also comprise the steps:Cloud Server judgement receives described Whether the time of the second secret key request message exceed effectively deciphering duration T, if not less than continuing executing with step S404, otherwise Terminating subsequent step, directly terminal feedback the second key request failed message is trusted to second;Or Cloud Server judges to receive Whether number of times to second secret key request message exceedes effectively deciphering times N, if not less than continuing executing with step S404, otherwise terminates subsequent step, directly trusts terminal feedback the second key request failed message to second.
Optimize in detail, effective deciphering duration T is defined as follows:
T=x t1+s·t2+t3
In formula, x is the terminal number in express delivery path, and s is the mileage number in express delivery path, and unit is kilometer, t1Be in transfer Maximum of standing stay time, t2For most long transport duration, t under unit kilometer3For sending part station to send the maximum duration of express mail with charge free, described fast Pass path be according to distribution information m2Middle fitting station and the transportation route that sends the distance between part station and cook up.
Optimize in detail, effective deciphering times N is defined as follows:
In formula, x is the terminal number in express delivery path, and it is to calculate intermediate value that M () is bracket function, n, and t is and second terminal Courier's length of service of association, unit be year, the express delivery path be according to distribution information m2Middle fitting station with send part station it Between distance and the transportation route cooked up.Optimize in detail further, the bracket function is round function, cuts Decimal bracket function is removed, is clipped decimal and round up and function or clip the downward bracket function of decimal.
Optimize, the graphic code is Quick Response Code or bar code.
To sum up, using a kind of method for realizing express delivery secret protection in logistics progress provided by the present invention, with such as Lower beneficial effect:(1) its when fitting is sent out application from distribution information and the privacy information of the key set to user of Cloud Server The re-encryption of different levels is carried out, is then passed through management of the Cloud Server to key set, different decoding request persons can be directed to Different decrypted rights are authorized, the decrypted rights of courier so when part is sent, can be limited so as to can only apply from cloud service The part of key deciphering of device obtains distribution information, thus can not only avoid express delivery information by directly exposed, prevent by juridical-person Member direct access, be also prevented from courier take advantage of one's position obtain customer privacy information;(2) internal layer encryption is being carried out When, as the MAC value of privacy information is mixed with confidential information to be added, so privacy information can be judged by MAC value verification Whether it is tampered, ensures the transportation safety of quick despatch (especially valuables);(3) contribute to specification express delivery industry so that buy The illegal act for selling express delivery list is effectively contained;(4) can avoid forging express delivery list, i.e., the two dimension for generating by AES Code can be very good to contain that express delivery odd numbers forges this infringement;(5) contribute to the enforcement of express delivery system of real name;(6) whole side Method is designed for mobile platform, and selected cryptographic algorithm, hash algorithm all increase on the basis of safety is ensured as much as possible Efficiency, it is ensured that the service efficiency of method;(7) due to during re-encryption mixing employ MAC algorithm, hash algorithm and right Claim AES, the safety of final gained express delivery information ciphertext can be ensured, is easy to actual promotion and application.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Accompanying drawing to be used needed for technology description is had to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, acceptable Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the method flow diagram for realizing express delivery secret protection in logistics progress that the present invention is provided.
Fig. 2 be the present invention provide in fitting first terminal acquisition request key set information exchange flow chart.
Fig. 3 is the information exchange flow chart that the first terminal before fitting that the present invention is provided completes to register.
Fig. 4 be the present invention provide when part is sent second terminal acquisition request outer layer symmetric key information exchange flow process Figure.
Fig. 5 is the information exchange flow chart that the second terminal before part is sent that the present invention is provided completes to register.
Specific embodiment
Hereinafter with reference to accompanying drawing, realizing soon in logistics progress for present invention offer is described in detail by way of example The method for passing secret protection.Here it should be noted that the explanation for these way of example is used to help understand the present invention, But do not constitute limitation of the invention.
The terms "and/or", only a kind of incidence relation of description affiliated partner, represents there may be three kinds of passes System, for example, A and/or B, can represent:, while there are A and tri- kinds of situations of B, the terms in individualism A, individualism B "/and " it is another kind of affiliated partner relation of description, represent there may be two kinds of relations, for example, and A/ and B, can represent:Individually deposit In two kinds of situations of A, individualism A and B, in addition, character "/" herein, typicallys represent forward-backward correlation and closes to liking a kind of "or" System.
Embodiment one
Fig. 1 shows the method flow diagram for realizing express delivery secret protection in logistics progress that the present invention is provided, and Fig. 2 is illustrated The present invention provide in fitting first terminal acquisition request key set information exchange flow chart, Fig. 3 shows the present invention There is provided first terminal before fitting complete register information exchange flow chart, Fig. 4 show the present invention provide when part is sent The information exchange flow chart of second terminal acquisition request outer layer symmetric key, Fig. 5 show that the present invention provides the before part is sent Two terminals complete the information exchange flow chart that registers.The described of the present embodiment offer realizes express delivery secret protection in logistics progress Method, comprise the steps.
S101. in express delivery fitting, re-encryption is carried out to express delivery information:Express delivery information is being divided into privacy letter by first terminal Breath m1With distribution information m2Afterwards, to Cloud Server transmission express delivery odd numbers, acquisition request key set corresponding with the express delivery odd numbers, The key set includes internal layer symmetric key k1, MAC key k2With outer layer symmetric key k3, then according to it is fast that acquisition is defined as below Pass information ciphertext e:
E=E (MAC (m1,k2)||E(m1,k1)||H(E(m1,k1)||MAC(m1,k2))||m2,k3)
In formula, E (m, k) is the symmetric encipherment algorithm for applying key k to be encrypted information m, the ciphertext of output information m, H (m) For hash algorithm, the hash value of output information m, MAC (m, k) is the MAC algorithm for applying key k to process information m, output The MAC value of information m, " | | " represent before and after two byte streams concatenation.
In step S101, the first terminal for express delivery fitting station and complete lawful registration in Cloud Server side Express delivery application terminal, after typing express delivery information, can be, but not limited to divide express delivery information by filling up a form automatically For privacy information m1With distribution information m2, and re-encryption process is carried out, and the graphic code for being attached on quick despatch is generated, which can With but be not limited to the electronic equipments such as desktop computer, notebook computer, panel computer or smart mobile phone.The Cloud Server is used for Management is encrypted/is deciphered to express delivery information, only allow courier to obtain during express transportation for sending joining for part dispensing Deliver letters breath m2, and to privacy information m1Maintained secrecy.Distribution information m2It is the information required for during dispensing express delivery, Which can be, but not limited to comprising the information such as addressee's surname, posting address, addressee's telephone number, origin and destination.Institute State privacy information m1It is not need during dispensing express delivery but need to occur in the information on express delivery list, which can be, but not limited to Comprising sender's name, sender telephone number, sender address, sender's organization, sender's ID (identity number) card No., the name of an article With information such as addressee's names.The express delivery odd numbers is the numbering for carrying on express delivery list.The key set be for first eventually Middle privacy information m is divided in side to express delivery information1With distribution information m2The re-encryption for carrying out different levels, wherein, the internal layer pair Claim key k1For as the key for being used when internal layer is encrypted, the MAC key k2For being made as when MAC is processed Key, the outer layer symmetric key k3For as the key for being used when outer layer is encrypted.
MAC (Message Authentication Codes, the message authentication code) is a kind of message authentication scheme, main It is used for the protection integrity of message and the certification of message source in unsafe communication environment, by this kind of protection, Neng Goufang Only message is distorted in transmission or storing process without permission, and which can be, but not limited to as HMAC (Hash-based Message Authentication Code, Hash operation message authentication code).It is a kind of open based on the algorithm of the HMAC Algorithm, the algorithm is a kind of verification method of the message integrity based on key, and its safety is built upon hash algorithm base On plinth, it requires communicating pair shared key, engagement arithmetic and carries out Hash computing to message, forms the message of regular length Authentication code (i.e. MAC value), communicating pair determines the integrity of message by the verification of authentication code, and this algorithm can be used to do Digital signature and authentication of message are used.The hash algorithm also known as one-way Hash algorithm, also known as Hash function (also referred to as hash letter Number or hash algorithm), it is a kind of function of the output string for arbitrarily long input information string being changing into fixing length, its output string (also referred to as hash value) is referred to as the Hash Value of the information.The symmetric encipherment algorithm is one kind when encryption is with deciphering using identical close The AES of key, in the present embodiment respectively as internal layer encryption and outer layer the used algorithm of encryption, its can but do not limit Calculated using such as PRESENT algorithm, CLEFIA algorithm, SKINNY algorithm, Midori algorithm, Rectangle algorithm or KTANTAN The packet symmetric cryptographic algorithm of the lightweights such as method.Thus by aforementioned re-encryption, the express delivery information that can obtain high security is close Text.
Optimize, as shown in Fig. 2 sending express delivery odd numbers to Cloud Server, acquisition request is corresponding with the express delivery odd numbers Key set the step of in, comprise the steps:S201. first terminal sends first key request message, institute to Cloud Server State terminal iidentification of the first key request message comprising first terminal, the first checking information and the express delivery odd numbers;S202. cloud takes Business device verifies first terminal whether lawful registration according to the terminal iidentification of the first terminal and first checking information, if closing Method is registered, then execute subsequent step S203 to S206, otherwise feed back first key request failure message to first terminal;S203. Cloud Server generates internal layer symmetric key k at random1, MAC key k2With outer layer symmetric key k3, constitute and the express delivery odd numbers pair The key set that answers;S204. a Cloud Server application RSA public key that is local preserving and being uploaded in registration by first terminal adds The close key set, obtains key set ciphertext;S205. Cloud Server feeds back the key set ciphertext to first terminal;S206. Key set ciphertext described in the local RSA private key pair of one terminal applies is decrypted, the acquisition key set, and described first RSA private key and a RAS public key are the key pair being mutually paired.
In step S201, the terminal iidentification of the first terminal is can be, but not limited to as IP address or identification number Deng identifier.First checking information can be, but not limited to include account/password pair, the job information of the first courier, refer to The information such as stricture of vagina identification information, recognition of face information and/or Application on Voiceprint Recognition information, first courier is and the first terminal The user of binding, the job information can be, but not limited to include name, position and the length of service etc..In step S202, The method of lawful registration is such as first terminal to be verified according to the terminal iidentification of the first terminal and first checking information Under:Corresponding checking information is locally being searched according to the terminal iidentification of the first terminal, whether is then verifying the checking information Mate with first checking information, if mating, judge terminal of the first terminal as lawful registration, otherwise judge first terminal For illegal terminal.Thus by abovementioned steps, institute safely can be safely interacted between first terminal and Cloud Server Key set is stated, prevents from being intercepted and captured by illegal means.
Optimize further, as shown in figure 3, also comprising the steps before step S201:S301. first terminal The key comprising a RSA public key and a RAS private key being generated to rear, the first registration is sent to Cloud Server and ask Message is sought, first login request message includes the terminal iidentification of the first terminal and first checking information;S302. Cloud Server is verified to first terminal according to first checking information, if being verified, executes subsequent step S303 To S307, the first registration failure message is otherwise fed back;S303. Cloud Server feeds back public key certificate to first terminal;S304. first Public key certificate described in terminal applies obtains a RSA public key cryptography to a RSA public key encryption;S305. first terminal will The first RSA public key cryptography is sent to Cloud Server;S306. public key certificate described in Cloud Server application is to a RSA Public key cryptography is decrypted, and obtains a RSA public key;S307. Cloud Server stores the terminal iidentification of the first terminal And corresponding first checking information and a RSA public key, complete the lawful registration of first terminal.
S102. first terminal sends express delivery information ciphertext e to Cloud Server, while by express delivery information ciphertext e/ The graphic code for being attached on quick despatch is converted into the express delivery odd numbers.
In step s 102, the graphic code is can be, but not limited to as Quick Response Code or bar code.When the graphic code is two During dimension code, can be, but not limited to using QR code (i.e. in a kind of square matrix code by the invention of Japanese Denso-Wave company in 1994, QR Spelling is Quick Response, i.e., from inventor, the rapid-action meaning, wishes that QR code can allow its content quickly be decoded; 1850 capitalizations or 2710 numerals or 1108 bytes, or more than 500 Chinese character can at most be accommodated;Highest can error correction 30% Code word data so that the QR code being stained can also be read correctly) or PDF417 code (PDF417 bar code be by the U.S. SYMBOL public affairs Department's invention, PDF spelling is that Portable Data File, the meaning is " portable data file ", constitutes Quick Response Code each Bar code character is by 4 bars and 4 skies totally 17 module compositions, therefore referred to as PDF417 bar code;Can at most accommodate 1850 characters or The binary data of 1108 bytes, can accommodate 2710 numerals if numeral is only represented;The error correcting capability of PDF417 is divided into 9 Level, rank is higher, and correction capability is stronger, due to this error correction so that 417 bar codes being stained can also be read correctly) etc. The two-dimensional encoded mode of form is encoded to express delivery information ciphertext e.As optimized, in the present embodiment, using QR Code is encoded to express delivery information ciphertext e, it is possible to use the extremely huge data capacity of QR code and extremely strong error correcting capability, The quantity of information for being carried graphic code is big as far as possible, and high accuracy be read, meet application demand.Additionally, will be described Express delivery information ciphertext e and the express delivery odd numbers are converted into graphic code, follow-up second terminal can be facilitated directly to scan acquisition described Express delivery odd numbers, without the need for manually typing.
S103. Cloud Server stores the express delivery odd numbers and corresponding key set and express delivery information ciphertext e.
S104. in express delivery, local deciphering is carried out to the graphic code:Second terminal after the graphic code is scanned, Express delivery information ciphertext e/ and the express delivery odd numbers being obtained, the express delivery odd numbers for obtaining then being sent to Cloud Server, request is obtained Take the outer layer symmetric key k in key set corresponding with the express delivery odd numbers3, finally apply the outer layer symmetric key k3To institute Stating express delivery information ciphertext e carries out outer layer deciphering, obtains distribution information m2.
In step S104, the second terminal be express delivery terminal or send part station and complete legal note in server side The express delivery application terminal of volume, is attached to graphic code on quick despatch for reading, and obtains express delivery information ciphertext e and described fast Odd numbers is passed, then applies the outer layer symmetric key k from Cloud Server3Outer layer solution is carried out to express delivery information ciphertext e Close, obtain distribution information m2, dispensing task is completed so as to courier, which can be, but not limited to as desktop computer, notebook The electronic equipment such as computer, panel computer or smart mobile phone.Additionally, but the graphic code comprising the express delivery odd numbers when, described the Two terminals directly scan acquisition express delivery odd numbers, otherwise need to be manually entered express delivery odd numbers.
Optimize, as shown in figure 4, in the express delivery odd numbers for sending acquisition to Cloud Server, acquisition request and the express delivery list Outer layer symmetric key k in number corresponding key set3The step of in, comprise the steps:S401. second terminal is to Cloud Server The second secret key request message is sent, terminal iidentification of second secret key request message comprising second terminal, the second checking information With the express delivery odd numbers;S402. Cloud Server is according to terminal iidentification and second checking information checking of the second terminal Second terminal whether lawful registration, if lawful registration, executes subsequent step S403 to S406, otherwise to second terminal feedback the Two key request failed messages;S403. Cloud Server finds corresponding close with the express delivery odd numbers according to the express delivery odd numbers The outer layer symmetric key k that key is concentrated3;S404. Cloud Server application locally preserve and uploaded in registration by second terminal Outer layer symmetric key k described in 2nd RSA public key encryption3, obtain outer layer symmetric key ciphertext;S405. Cloud Server is whole to second The end feedback outer layer symmetric key ciphertext;S406. outer layer described in the 2nd local RSA private key pair of second terminal application is symmetrically close Key ciphertext is decrypted, and obtains the outer layer symmetric key k3, the 2nd RSA private key and the 2nd RAS public key are pairing Key pair.
In step S401, the terminal iidentification of the second terminal is can be, but not limited to as IP address or identification number Deng identifier.Second checking information can be, but not limited to include account/password pair, the job information of the second courier, refer to The information such as stricture of vagina identification information, recognition of face information and/or Application on Voiceprint Recognition information, second courier is and the second terminal Bound user, the job information can be, but not limited to include name, position and the length of service etc..In step S402 In, the terminal iidentification according to the second terminal and second checking information verify second terminal whether lawful registration Method is as follows:Corresponding checking information is locally being searched according to the terminal iidentification of the second terminal, is then verifying the checking letter Whether breath mate with second checking information, judges terminal of the second terminal as lawful registration if the coupling, otherwise judgement the Two terminals are illegal terminal.Thus by abovementioned steps, can safely between second terminal and Cloud Server safely The interaction outer layer symmetric key k3, prevent from being intercepted and captured by illegal means.
Optimize further, as shown in figure 5, also comprising the steps before step S401:S501. second terminal The key comprising the 2nd RSA public key and the 2nd RAS private key being generated to rear, the second registration is sent to Cloud Server and ask Message is sought, second login request message includes the terminal iidentification of the second terminal and second checking information;S502. Cloud Server is verified to second terminal according to second checking information, if being verified, executes subsequent step S503 To S507, the second registration failure message is otherwise fed back;S503. Cloud Server feeds back public key certificate to second terminal;S504. second Public key certificate described in terminal applies obtains the 2nd RSA public key cryptography to the 2nd RSA public key encryption;S505. second terminal will The 2nd RSA public key cryptography is sent to Cloud Server;S506. public key certificate described in Cloud Server application is to the 2nd RSA Public key cryptography is decrypted, and obtains the 2nd RSA public key;S507. Cloud Server stores the terminal iidentification of the second terminal And corresponding second checking information and the 2nd RSA public key, complete the lawful registration of second terminal.
Optimize further, after step S403, also comprise the steps:Cloud Server judgement receives described Whether the time of the second secret key request message exceed effectively deciphering duration T, if not less than continuing executing with step S404, otherwise Terminating subsequent step, directly terminal feedback the second key request failed message is trusted to second;Or Cloud Server judges to receive Whether number of times to second secret key request message exceedes effectively deciphering times N, if not less than continuing executing with step S404, otherwise terminates subsequent step, directly trusts terminal feedback the second key request failed message to second.Arranged by aforementioned Apply, the decryption oprerations behavior that can be directed to the express delivery information ciphertext carries out time or the restriction on number of times, prevents courier indiscriminate Use decryption mechanisms.
Optimize in detail, effective deciphering duration T is defined as follows:
T=x t1+s·t2+t3
In formula, x is the terminal number in express delivery path, and s is the mileage number in express delivery path, and unit is kilometer, t1Be in transfer Maximum of standing stay time, t2For most long transport duration, t under unit kilometer3For sending part station to send the maximum duration of express mail with charge free, described fast Pass path be according to distribution information m2Middle fitting station and the transportation route that sends the distance between part station and cook up.Described join Deliver letters breath m2By Cloud Server according to the outer layer symmetric key k for finding3Carry out outer layer deciphering to be obtained to express delivery information ciphertext e Take.
Optimize in detail, effective deciphering times N is defined as follows:
In formula, x is the terminal number in express delivery path, and it is to calculate intermediate value that M () is bracket function, n, and t is and second terminal Courier's length of service of association, unit be year, the express delivery path be according to distribution information m2Middle fitting station with send part station it Between distance and the transportation route cooked up.Distribution information m2By Cloud Server according to the outer layer symmetric key k for finding3Right It is acquired that express delivery information ciphertext e carries out outer layer deciphering.Courier's length of service is can be, but not limited to according to the sheet in registration Second checking information that ground is preserved is obtained, and can so avoid " glib person " courier from excessively abusing decryption mechanisms.Enter one Step optimizes in detail, and the bracket function is round function, clip decimal bracket function, clip decimal rounds up Function or clip the downward bracket function of decimal.
After step S104, courier can be according to the surname of the addressee in the distribution information, addressee The information such as telephone number and dispensing address executes dispensing task.Thus can not only avoid express delivery information by directly exposed, prevent By unauthorized person direct access, it is also prevented from courier and takes advantage of one's position obtaining the privacy information of customer, such that it is able to reality The safeguard protection of existing express delivery privacy, the illegal act of suppression dealing express delivery list, beneficial to the popularization of express delivery system of real name.
To sum up, the method for realizing express delivery secret protection in logistics progress provided by the present embodiment, with beneficial as follows Effect:(1) its application when fitting is sent out is carried out not to the distribution information of user and privacy information from the key set of Cloud Server The re-encryption of same level, then passes through management of the Cloud Server to key set, can authorize not for different decoding request persons Same decrypted rights, so when part is sent, can limit the decrypted rights of courier so as to can only apply the portion from Cloud Server Point secret key decryption obtains distribution information, thus can not only avoid express delivery information by directly exposed, prevent direct by unauthorized person Obtain, be also prevented from courier take advantage of one's position obtain customer privacy information;(2) when internal layer encryption is carried out, due to The MAC value of privacy information is mixed with confidential information to be added, so can judge whether privacy information is usurped by MAC value verification Change, ensure the transportation safety of quick despatch (especially valuables);(3) contribute to specification express delivery industry so that dealing express delivery list Illegal act effectively contained;(4) can avoid forging express delivery list, i.e., the Quick Response Code for generating by AES can be very Good containment express delivery odd numbers forges this infringement;(5) contribute to the enforcement of express delivery system of real name;(6) whole method is for shifting Moving platform is designed, and selected cryptographic algorithm, hash algorithm all increase efficiency on the basis of safety is ensured as much as possible, it is ensured that The service efficiency of method;(7) due to during re-encryption mixing employ MAC algorithm, hash algorithm and symmetric cryptography and calculate Method, can ensure the safety of final gained express delivery information ciphertext, be easy to actual promotion and application.
As described above, the present invention preferably can be realized.For a person skilled in the art, according to the religion of the present invention Leading, designs the method that express delivery secret protection is realized in logistics progress of multi-form and do not need performing creative labour.? In the case of principle and spirit without departing from the present invention, these embodiments are changed, change, replace, integrating and modification still falls Enter in protection scope of the present invention.

Claims (10)

1. a kind of method for realizing express delivery secret protection in logistics progress, it is characterised in that comprise the steps of:
S101. in express delivery fitting, re-encryption is carried out to express delivery information:Express delivery information is being divided into privacy information m by first terminal1With Distribution information m2Afterwards, to Cloud Server transmission express delivery odd numbers, acquisition request key set corresponding with the express delivery odd numbers, described close Key collection includes internal layer symmetric key k1, MAC key k2With outer layer symmetric key k3, then according to acquisition express delivery information is defined as below Ciphertext e:
E=E (MAC (m1,k2)||E(m1,k1)||H(E(m1,k1)||MAC(m1,k2))||m2,k3)
In formula, E (m, k) is the symmetric encipherment algorithm for applying key k to be encrypted information m, the ciphertext of output information m, H (m) For hash algorithm, the hash value of output information m, MAC (m, k) is the MAC algorithm for applying key k to process information m, output The MAC value of information m, " | | " represent before and after two byte streams concatenation;
S102. first terminal sends express delivery information ciphertext e to Cloud Server, while by express delivery information ciphertext e/ and institute State express delivery odd numbers and be converted into the graphic code for being attached on quick despatch;
S103. Cloud Server stores the express delivery odd numbers and corresponding key set and express delivery information ciphertext e;
S104. in express delivery, local deciphering is carried out to the graphic code:Second terminal is obtained after the graphic code is scanned Express delivery information ciphertext e/ and the express delivery odd numbers, then to Cloud Server send obtain express delivery odd numbers, acquisition request with Outer layer symmetric key k in the corresponding key set of the express delivery odd numbers3, finally apply the outer layer symmetric key k3To described fast Passing information ciphertext e carries out outer layer deciphering, obtains distribution information m2.
2. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 1, it is characterised in that to In the step of Cloud Server sends express delivery odd numbers, acquisition request key set corresponding with the express delivery odd numbers, comprise the steps:
S201. first terminal sends first key request message to Cloud Server, and the first key request message includes first The terminal iidentification of terminal, the first checking information and the express delivery odd numbers;
S202. whether Cloud Server verifies first terminal according to the terminal iidentification of the first terminal and first checking information Lawful registration, if lawful registration, executes subsequent step S203 to S206, otherwise loses to first terminal feedback first key request Lose message;
S203. Cloud Server generates internal layer symmetric key k at random1, MAC key k2With outer layer symmetric key k3, constitute fast with described Pass the corresponding key set of odd numbers;
S204. described in a Cloud Server application RSA public key encryption that is local preserving and being uploaded in registration by first terminal Key set, obtains key set ciphertext;
S205. Cloud Server feeds back the key set ciphertext to first terminal;
S206. key set ciphertext described in the local RSA private key pair of first terminal application is decrypted, and obtains the key Collection, a RSA private key and a RAS public key are the key pair being mutually paired.
3. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 2, it is characterised in that in institute Also comprise the steps before stating step S201:
S301. first terminal is generating the key comprising a RSA public key and a RAS private key to rear, takes to cloud Business device sends the first login request message, and first login request message is comprising the terminal iidentification of the first terminal and described First checking information;
S302. Cloud Server is verified to first terminal according to first checking information, if being verified, is executed follow-up Step S303 to S307, otherwise feeds back the first registration failure message;
S303. Cloud Server feeds back public key certificate to first terminal;
S304. public key certificate described in first terminal application obtains a RSA public key cryptography to a RSA public key encryption;
S305. first terminal sends a RSA public key cryptography to Cloud Server;
S306. public key certificate described in Cloud Server application is decrypted to a RSA public key cryptography, obtains described first RSA public key;
S307. Cloud Server stores terminal iidentification and corresponding first checking information and a RSA public key of the first terminal, Complete the lawful registration of first terminal.
4. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 1, it is characterised in that to Cloud Server sends the express delivery odd numbers for obtaining, the outer layer symmetric key in acquisition request key set corresponding with the express delivery odd numbers k3The step of in, comprise the steps:
S401. second terminal sends the second secret key request message to Cloud Server, and second secret key request message includes second The terminal iidentification of terminal, the second checking information and the express delivery odd numbers;
S402. whether Cloud Server verifies second terminal according to the terminal iidentification of the second terminal and second checking information Lawful registration, if lawful registration, executes subsequent step S403 to S406, otherwise feeds back the mistake of the second key request to second terminal Lose message;
S403. the outer layer that Cloud Server is found according to the express delivery odd numbers in key set corresponding with the express delivery odd numbers is symmetrical Key k3
S404. described in Cloud Server application the 2nd RSA public key encryption that is local preserving and being uploaded in registration by second terminal Outer layer symmetric key k3, obtain outer layer symmetric key ciphertext;
S405. Cloud Server feeds back the outer layer symmetric key ciphertext to second terminal;
S406. outer layer symmetric key ciphertext described in the 2nd local RSA private key pair of second terminal application is decrypted, and obtains described Outer layer symmetric key k3, the 2nd RSA private key and the 2nd RAS public key are the key pair of pairing.
5. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 4, it is characterised in that in institute Also comprise the steps before stating step S401:
S501. second terminal is generating the key comprising the 2nd RSA public key and the 2nd RAS private key to rear, takes to cloud Business device sends the second login request message, and second login request message is comprising the terminal iidentification of the second terminal and described Second checking information;
S502. Cloud Server is verified to second terminal according to second checking information, if being verified, is executed follow-up Step S503 to S507, otherwise feeds back the second registration failure message;
S503. Cloud Server feeds back public key certificate to second terminal;
S504. public key certificate described in second terminal application obtains the 2nd RSA public key cryptography to the 2nd RSA public key encryption;
S505. second terminal sends the 2nd RSA public key cryptography to Cloud Server;
S506. public key certificate described in Cloud Server application is decrypted to the 2nd RSA public key cryptography, obtains described second RSA public key;
S507. Cloud Server stores terminal iidentification and corresponding second checking information and the 2nd RSA public key of the second terminal, Complete the lawful registration of second terminal.
6. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 4, it is characterised in that in institute After stating step S403, also comprise the steps:
Cloud Server judges whether the time for receiving second secret key request message exceedes effectively deciphering duration T, if not surpassing Crossing, then step S404 is continued executing with, otherwise terminate subsequent step, directly the failure of the second key request of terminal feedback is trusted to second Message;
Or Cloud Server judges whether the number of times for receiving second secret key request message exceedes effectively deciphering times N, if Not less than, then step S404 is continued executing with, otherwise termination subsequent step, directly trusts the second key request of terminal feedback to second Failed message.
7. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 6, it is characterised in that described Effectively deciphering duration T is defined as follows:
T=x t1+s·t2+t3
In formula, x is the terminal number in express delivery path, and s is the mileage number in express delivery path, and unit is kilometer, t1Be in terminal Maximum stay time, t2For most long transport duration, t under unit kilometer3For sending part station to send the maximum duration of express mail, the express delivery with charge free Path be according to distribution information m2Middle fitting station and the transportation route that sends the distance between part station and cook up.
8. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 6, it is characterised in that described Effectively deciphering times N is defined as follows:
N=2x, or
In formula, x is the terminal number in express delivery path, and it is to calculate intermediate value that M () is bracket function, n, and t is and second terminal Courier's length of service of association, unit be year, the express delivery path be according to distribution information m2Middle fitting station with send part station it Between distance and the transportation route cooked up.
9. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 8, it is characterised in that described Bracket function be round function, clip decimal bracket function, clip decimal round up function or clip decimal to Lower bracket function.
10. a kind of method for realizing express delivery secret protection in logistics progress as claimed in claim 1, it is characterised in that institute Graphic code is stated for Quick Response Code or bar code.
CN201610837887.9A 2016-09-21 2016-09-21 A method of realizing express delivery secret protection in logistics progress Active CN106453268B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610837887.9A CN106453268B (en) 2016-09-21 2016-09-21 A method of realizing express delivery secret protection in logistics progress

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610837887.9A CN106453268B (en) 2016-09-21 2016-09-21 A method of realizing express delivery secret protection in logistics progress

Publications (2)

Publication Number Publication Date
CN106453268A true CN106453268A (en) 2017-02-22
CN106453268B CN106453268B (en) 2019-06-07

Family

ID=58167449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610837887.9A Active CN106453268B (en) 2016-09-21 2016-09-21 A method of realizing express delivery secret protection in logistics progress

Country Status (1)

Country Link
CN (1) CN106453268B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273947A (en) * 2017-06-06 2017-10-20 北京洋浦伟业科技发展有限公司 The information processing method and device of user profile in hiding article transport list
CN107358283A (en) * 2017-06-19 2017-11-17 上海斐讯数据通信技术有限公司 A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal
CN107704907A (en) * 2017-10-20 2018-02-16 东莞市美盈森环保科技有限公司 A kind of express transportation method based on identification code, system and express delivery packaging
CN108537314A (en) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 Product marketing system and method based on Quick Response Code
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
CN109063492A (en) * 2018-07-05 2018-12-21 北京小米智能科技有限公司 Information processing method and device
CN109104279A (en) * 2018-08-31 2018-12-28 国网河北省电力有限公司沧州供电分公司 A kind of encryption method of electric power data, system and terminal device
CN109711199A (en) * 2019-01-04 2019-05-03 杭州卓凯科技有限公司 Shipping platform order information encryption method on line
CN109995506A (en) * 2019-04-09 2019-07-09 司法鉴定科学研究院 Skinny algorithm optimal implementation method, system, terminal, storage medium
CN110084199A (en) * 2019-04-28 2019-08-02 李有春 A kind of logistics system of face identification system and face identification system
CN111552270A (en) * 2020-04-29 2020-08-18 北京汽车股份有限公司 Safety authentication and data transmission method and device for vehicle-mounted diagnosis
CN112561422A (en) * 2020-12-04 2021-03-26 中国联合网络通信集团有限公司 Commodity transportation method, user side and key management platform based on internet unmanned aerial vehicle
CN113254979A (en) * 2021-06-26 2021-08-13 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium
CN113904832A (en) * 2021-09-30 2022-01-07 平安银行股份有限公司 Data encryption method, device, equipment and storage medium
CN114640501A (en) * 2022-02-14 2022-06-17 杭州锘崴信息科技有限公司 Super-fusion security monitoring and control system and method based on privacy computing platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489086A (en) * 2013-09-04 2014-01-01 章玺 Authority control system and method of logistics information
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN105279626A (en) * 2015-09-22 2016-01-27 电子科技大学 Double-line architecture express delivery information protection method based on mobile terminal
CN105354693A (en) * 2015-11-04 2016-02-24 中南大学 Logistics industry-oriented system and method for cascade protection of user privacy information
CN105656920A (en) * 2016-02-03 2016-06-08 深圳支付界科技有限公司 Method and system for encryption and decryption of mailing data based on expressage

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489086A (en) * 2013-09-04 2014-01-01 章玺 Authority control system and method of logistics information
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN105279626A (en) * 2015-09-22 2016-01-27 电子科技大学 Double-line architecture express delivery information protection method based on mobile terminal
CN105354693A (en) * 2015-11-04 2016-02-24 中南大学 Logistics industry-oriented system and method for cascade protection of user privacy information
CN105656920A (en) * 2016-02-03 2016-06-08 深圳支付界科技有限公司 Method and system for encryption and decryption of mailing data based on expressage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韦茜 等: "基于RSA算法的快递信息隐私保护应用", 《电子技术应用》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
US11194917B2 (en) 2017-03-31 2021-12-07 Beijing Jingdong Shangke Information Technology Co., Ltd. Information encryption method and device
CN108664798B (en) * 2017-03-31 2021-06-29 北京京东尚科信息技术有限公司 Information encryption method and device
CN107273947A (en) * 2017-06-06 2017-10-20 北京洋浦伟业科技发展有限公司 The information processing method and device of user profile in hiding article transport list
CN107358283A (en) * 2017-06-19 2017-11-17 上海斐讯数据通信技术有限公司 A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal
CN107704907A (en) * 2017-10-20 2018-02-16 东莞市美盈森环保科技有限公司 A kind of express transportation method based on identification code, system and express delivery packaging
CN108537314A (en) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 Product marketing system and method based on Quick Response Code
CN109063492B (en) * 2018-07-05 2020-11-13 北京小米智能科技有限公司 Information processing method and device
CN109063492A (en) * 2018-07-05 2018-12-21 北京小米智能科技有限公司 Information processing method and device
CN109104279B (en) * 2018-08-31 2021-11-16 国网河北省电力有限公司沧州供电分公司 Encryption method and system for electric power data and terminal equipment
CN109104279A (en) * 2018-08-31 2018-12-28 国网河北省电力有限公司沧州供电分公司 A kind of encryption method of electric power data, system and terminal device
CN109711199A (en) * 2019-01-04 2019-05-03 杭州卓凯科技有限公司 Shipping platform order information encryption method on line
CN109995506A (en) * 2019-04-09 2019-07-09 司法鉴定科学研究院 Skinny algorithm optimal implementation method, system, terminal, storage medium
CN109995506B (en) * 2019-04-09 2022-09-02 司法鉴定科学研究院 Skinny algorithm optimization implementation method, system, terminal and storage medium
CN110084199A (en) * 2019-04-28 2019-08-02 李有春 A kind of logistics system of face identification system and face identification system
CN111552270A (en) * 2020-04-29 2020-08-18 北京汽车股份有限公司 Safety authentication and data transmission method and device for vehicle-mounted diagnosis
CN112561422A (en) * 2020-12-04 2021-03-26 中国联合网络通信集团有限公司 Commodity transportation method, user side and key management platform based on internet unmanned aerial vehicle
CN112561422B (en) * 2020-12-04 2023-07-25 中国联合网络通信集团有限公司 Commodity transportation method based on network-connected unmanned aerial vehicle, user and key management platform
CN113254979A (en) * 2021-06-26 2021-08-13 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium
CN113904832A (en) * 2021-09-30 2022-01-07 平安银行股份有限公司 Data encryption method, device, equipment and storage medium
CN113904832B (en) * 2021-09-30 2023-10-17 平安银行股份有限公司 Data encryption method, device, equipment and storage medium
CN114640501A (en) * 2022-02-14 2022-06-17 杭州锘崴信息科技有限公司 Super-fusion security monitoring and control system and method based on privacy computing platform
CN114640501B (en) * 2022-02-14 2023-06-23 杭州锘崴信息科技有限公司 Super-fusion safety supervision and control system and method based on privacy computing platform

Also Published As

Publication number Publication date
CN106453268B (en) 2019-06-07

Similar Documents

Publication Publication Date Title
CN106453268A (en) Method for realizing express privacy protection in the logistics process
US20230020193A1 (en) Quantum-safe networking
CN105719120B (en) A method of encryption express delivery list privacy information
CN103379098B (en) Content sharing method, device and network system thereof
US8621221B1 (en) Method and system for event notification for wireless PDA devices
US20200313882A1 (en) Method for realizing network electronic identity identification information protection based on key dispersion calculation
CN102546171B (en) Secure element authentication method
CN110874464A (en) Method and equipment for managing user identity authentication data
CN103634114B (en) The verification method and system of intelligent code key
Cheng Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm
US20140177830A1 (en) Method and system for providing a public key/secret key pair for encrypting and decrypting data
CN106576043A (en) Virally distributable trusted messaging
CN102769623B (en) Two-factor authentication method based on digital certificate and biological identification information
CN104243494B (en) A kind of data processing method
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN104022883A (en) Individual information protection online shopping technology based on logistics network
CN103973714B (en) Email account generation method and system
CN105373906A (en) Method, system, server, and terminal device for achieving transaction service
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN106127441A (en) A kind of network system preventing personal information from leaking and implementation method
CN108777673B (en) Bidirectional identity authentication method in block chain
Bhandari et al. Enhancement of MD5 Algorithm for Secured Web Development.
Suryotrisongko et al. A novel mobile payment scheme based on secure quick response payment with minimal infrastructure for cooperative enterprise in developing countries
CN116976890A (en) Multi-sign encryption transaction system of block chain
Akinyede et al. Development of a secure mobile e-banking system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant