CN108062481A - A kind of intelligent encryption method of logistics information - Google Patents
A kind of intelligent encryption method of logistics information Download PDFInfo
- Publication number
- CN108062481A CN108062481A CN201711467002.1A CN201711467002A CN108062481A CN 108062481 A CN108062481 A CN 108062481A CN 201711467002 A CN201711467002 A CN 201711467002A CN 108062481 A CN108062481 A CN 108062481A
- Authority
- CN
- China
- Prior art keywords
- mrow
- client
- mobile terminal
- logistics
- msub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Operations Research (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of intelligent encryption methods of logistics information, client obtains the face recognition parameter of characterization validated user identity with the parameter of its validated user face predeterminated position of acquisition for mobile terminal, pass through the corresponding infrared data for gathering facial preset position area, the infrared circle parameter of face of another characterization validated user identity and the authentication index whether correct identification operator's identity is legal are obtained, to accurately identify identity security of the client with its validated user of mobile terminal based on multiple identities identification parameter;Using the validated user face-image randomly selected as the encrypted carrier image of logistics information, and each width carrier image is handled based on the encryption secret key obtained by validated user facial parameters, client is effectively ensured to be used in the encryption for logistics Air Way Bill No. all carrier images of selection and obtained all encryption secret keys with mobile terminal, utilization rate when improving carrier image and encrypting secret key encryption, ensures that client inputs the safety of logistics Air Way Bill No..
Description
Technical field
The present invention relates to logistics field more particularly to a kind of intelligent encryption methods of logistics information.
Background technology
Existing logistics system mainly includes logistics management platform, logistics vehicles and the visitor for customer inquiries logistics information
Family terminal.With the intelligent development of mobile terminal device, more and more intelligent mobile terminals are used by client, this is also
The logistics information of customer inquiries target item provides hardware support.The mobile terminal of existing customer inquiry logistics information again may be used
To be referred to as client's mobile terminal.Client is connected to the object of logistics company in the client possessed by oneself with mobile terminal
After flow tube platform, simply enter article corresponding logistics waybill number, it is possible to understand the logistics information of article, such as
Article currently have been conveyed into where, consignor's name of article, consignor's telephone number, consignee's name and consignee connection
It is the logistics informations such as phone.
However, there is no the standards realized well to its operator's identity with mobile terminal by the existing customer in logistics system
Logistics Air Way Bill No. when effect being truly had to demonstrate,prove, while also not being inquired about client is effectively encrypted, this will cause anyone, bag
Logistics waybill number may be stolen by illegal operation client with mobile terminal by including illegal person, until illegally getting correspondence
Logistics information, seriously affect logistics activity it is normal safety carry out.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of intelligent encryption of logistics information for the above-mentioned prior art
Method.
Technical solution is used by the present invention solves above-mentioned technical problem:A kind of intelligent encryption method of logistics information,
For including the logistics system that client is formed with mobile terminal, logistics mobile terminal and logistics management platform, feature
It is, the intelligent encryption method of the logistics information in turn includes the following steps 1 to step 12:
Step 1, client start for the first time its it is legal possess client's mobile terminal when, client is being started with mobile terminal
The face-image of active user's preset number is immediately obtained afterwards, establishes the face image data storehouse for its validated user;
Wherein, the preset number is labeled as N, and the face image data storehouse of validated user is labeled as PictureUser, face
Portion image data base PictureUserI-th interior of face-image is labeled as Picturei, 1≤i≤N;
Step 2, client with mobile terminal according to presetting the characteristic parameter of facial positions for its validated user and obtained
The face image data storehouse of validated user is taken, builds validated user facial characteristics parameter database, is obtained for the validated user
Face recognition parameter;
Wherein, the validated user preset facial positions facial characteristics parameter include validated user face-image in a left side
Side eyebrow area value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye socket of the eye
Area value;
The client is δ with the face recognition parameter tags of the validated user of mobile terminalUser, the validated user face
Image PictureiInterior left side eyebrow area value is labeled asRight side eyebrow area value is labeled asUpper mouth
Labial surface product value is labeled asLower lip area value is labeled asLeft eye orbital surface product value is labeled asIt is and right
Eye socket area value is labeled as
Step 3, client gathers the infrared data that the validated user presets facial positions with mobile terminal respectively, and structure closes
The facial infrared data storehouse of method user obtains the infrared discrimination parameter of face for the validated user;
Wherein, the left side eyebrow area infrared data in the facial infrared data storehouse of the validated user, right side eyebrow area are red
Outer data, upper lip area infrared data, lower lip area infrared data, left eye socket of the eye area's infrared data and right eye socket of the eye area infrared data
It is respectively provided with N number of, r-th of left side eyebrow area infrared data of the validated user is marked to be labeled asLegal use
R-th of right side eyebrow area infrared data at family is labeled asR-th of infrared number in upper lip area of validated user
According to labeled asR-th of lower lip area infrared data of validated user is labeled asIt is legal
R-th of left eye socket of the eye area infrared data of user is labeled asR-th of infrared number in right eye socket of the eye area of validated user
According to labeled asThe infrared discrimination parameter of face of the validated user is labeled as ρUser:
Step 4, client is joined with mobile terminal according to the face recognition parameter of gained its validated user and the infrared discriminating of face
Number, obtains the authentication index of its validated user;Wherein, the authentication index for marking the validated user is ζUser:
Step 5, client randomly selects preset number with mobile terminal in the face image data storehouse of its validated user
Carrier image of several face-images as embedded logistics Air Way Bill No. information to form carrier image sequence, and is moved by client
Dynamic terminal is corresponding respectively to obtain the encryption secret key for each width carrier image;
Wherein, the carrier image total number in the carrier image sequence is M, and jth width carries in the carrier image sequence
Body image tagged is JPGj, carrier image JPGjCorresponding encryption secret key is
Wherein,WithIt is corresponding respectively to represent carrier image JPGjThe left side eyebrow area of interior validated user
The right side eyebrow area value of value and the validated user;WithIt is corresponding respectively to represent carrier image JPGjInterior legal use
The left eye orbital surface product value at family and the right eye frame area value of the validated user;
Step 6, after logistics generates logistics waybill with mobile terminal for article to be sent, and it is sent respectively to client's shifting
Dynamic terminal and logistics management platform;With mobile terminal when having detected that operator inputs logistics Air Way Bill No., client moves client
Dynamic terminal corresponds to the authentication index for getting current operator in the way of step 1 to step 4, and is moved by the client
When dynamic terminal judges that its validated user is equal with the authentication index of current operator, client goes to step 7 with mobile terminal;
When the client judges that the authentication index of its validated user and current operator are unequal with mobile terminal, client's movement
Terminal forbids current operator to perform the operation for inputting logistics Air Way Bill No. on client's mobile terminal;
Step 7, client is handled with mobile terminal for the logistics Air Way Bill No. that current operator is inputted, and formation has
The new logistics Air Way Bill No. of the multiple of carrier image number in step 5 obtains the M groups number with group number number;Wherein, the visitor
Family mobile terminal processing inputs logistics Air Way Bill No. and includes the following steps 7-1 and step to obtain the process of new logistics Air Way Bill No.
7-2:
Step 7-1, when client's mobile terminal judges inputted logistics Air Way Bill No. for the multiple of the carrier image number,
Current logistics Air Way Bill No. is divided into M groups by client with mobile terminal according to sequencing from left to right;
Step 7-2, client judge that inputted logistics Air Way Bill No. is not the multiple of the carrier image number with mobile terminal
When, the client carries out zero padding processing with mobile terminal in the leftmost side of the logistics Air Way Bill No., so that treated for zero padding
Logistics Air Way Bill No. is the multiple of the carrier image number, is then again transported zero padding treated logistics with mobile terminal by client
Odd numbers is divided into M groups according to sequencing from left to right;
Step 8, client with mobile terminal to each width carrier image in the carrier image sequence according to from left to right
Sequencing is numbered successively, obtains several numbered carrier images of tool of the preset number;
Step 9, client is digital according to corresponding order is numbered by the obtained M groups with mobile terminal, successively by each group
Digital inset utilizes the corresponding encryption secret key of the carrier image into carrier image sequence in the carrier image of reference numeral
To being embedded with the load figure image encryption of number, correspondence obtains the embedding close image of the preset number;
Step 10, client with mobile terminal according to the logistics waybill inquiry instruction of current operator, by each embedding close figure
It, then again will be corresponding each embedding after the prefixed time interval being successfully transmitted after all embedding close images as being sent to logistics management platform
The decryption secret key of close image is sent to logistics management platform;Wherein, for same embedding close image, decryption secret key and encryption are secret
Key is identical;
Step 11, logistics management platform is decrypted using each decryption secret key of reception for corresponding each embedding close image,
To obtain number embedded in embedding close image, and according to sequence integration from left to right, decryption logistics Air Way Bill No. is obtained, and is gone back
It manages to obtain the organic stream Air Way Bill No. that client is inputted with the current operator at mobile terminal in original place;
Wherein, when decryption logistics Air Way Bill No. leftmost side bit digital is digital zero, the logistics management platform is deleted should
The digital zero of digital zero and its rear position of position in left-most position, until there is nonzero digit, and with place
The Air Way Bill No. of current state after reason is as organic stream Air Way Bill No.;Decryption logistics Air Way Bill No. leftmost side bit digital is not several
During word zero, then using current waybill number as organic stream Air Way Bill No.;
Step 12, the organic stream Air Way Bill No. that logistics management platform is obtained according to reduction treatment is inquired about, and will
The real-time logistics information of the corresponding organic stream Air Way Bill No. feeds back to client's mobile terminal.
Optionally, in the intelligent encryption method of the logistics information, the client with mobile terminal be smart mobile phone or
Tablet computer.
Further, in the intelligent encryption method of the logistics information, the organic stream Air Way Bill No. is the number of 13
Word.
Compared with prior art, the advantage of the invention is that:
First, in logistics field, the present invention passes through the left side eyebrow by client with mobile terminal its validated user face
Area value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye orbital surface product value
As the diacritical point between difference user's face, and pass through the relation calculated between these facial specific positions, obtain to have
The face recognition parameter of effect characterization validated user face, so as to can be with by face recognition parameter for client's mobile terminal
Judge whether for the operator that it is operated be validated user, in turn ensures that the current operator of client's mobile terminal exactly
Identity whether threaten current logistics information safety;
Secondly, by the relation between infrared data corresponding to each region of fusion calculation face, obtaining one being capable of table
The infrared discrimination parameter of face of validated user facial characteristics is levied, so that client can be known with mobile terminal by face
Other parameter and the infrared discrimination parameter of face are handled, and are referred to obtaining the authentication that correctly whether identification operator's identity is legal
Number, so as to fulfill the safety of logistics information is protected with the angle of mobile terminal from client;
Again, the face-image for its validated user that the present invention is randomly selected for client by the use of mobile terminal is as carrier figure
As after, client utilizes left side eyebrow area value, the right side eyebrow that validated user is presented in every width carrier image with mobile terminal
The encryption secret key value to being applied to the width carrier image is calculated in area value, left eye orbital surface product value and right eye frame area value,
So as to which use is encrypted for logistics Air Way Bill No. information with mobile terminal for client, other illegal persons is avoided to attempt to pass through
Conjecture or other modes steal logistics Air Way Bill No. information, have prevented leaking for logistics Air Way Bill No. information, ensure that logistics information is pacified
Entirely;
Finally, the present invention by way of zero padding is taken to handle with mobile terminal by client by the current operation of identity security
The logistics Air Way Bill No. that person is inputted is changed to adapt to the form of carrier image number multiple, and it is whole with movement that client is thus effectively ensured
End can be used for all carrier images of selection and obtained all encryption secret keys at the encryption for logistics Air Way Bill No.
In reason, not only increase carrier image and encrypt utilization rate when secret key is encrypted, and also assure that client inputs object
Flow the safety of Air Way Bill No..
Description of the drawings
Fig. 1 is the flow diagram of the intelligent encryption method of logistics information in inventive embodiments.
Specific embodiment
The present invention is described in further detail below in conjunction with attached drawing embodiment.
As shown in Figure 1, in the present embodiment logistics information intelligent encryption method, for including client with mobile terminal, object
The logistics system that stream mobile terminal and logistics management platform are formed, client's mobile terminal and logistics mobile terminal are equal
Logistics management platform is wirelessly communicated to connect, client can be selected with mobile terminal using smart mobile phone or tablet electricity
Brain, the client in the present embodiment select smart mobile phone with mobile terminal;The intelligent encryption method of the logistics information is included such as successively
Lower step 1 is to step 12:
Step 1, client start for the first time its it is legal possess client's mobile terminal when, client is being started with mobile terminal
The face-image of active user's preset number is immediately obtained afterwards, establishes the face image data storehouse for its validated user;
Wherein, N, the face-image number of validated user are labeled as the preset number of acquired active user's face-image
Picture is labeled as according to storehouseUser, face image data storehouse PictureUserI-th interior of face-image is labeled as Picturei, 1
≤i≤N;In the present embodiment, preset number N=10;For the face image data storehouse for the validated user established, in the conjunction
There is the face-image of N width validated users altogether, so that the client in the present embodiment moves in the face image data storehouse of method user
Dynamic terminal is handled;
Step 2, client with mobile terminal according to presetting the characteristic parameter of facial positions for its validated user and obtained
The face image data storehouse of validated user is taken, builds validated user facial characteristics parameter database, is obtained for the validated user
Face recognition parameter;
Wherein, validated user preset facial positions facial characteristics parameter include validated user face-image in left side eyebrow
Hair side product value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye orbital surface product
Value;
Client is δ with the face recognition parameter tags of the validated user of mobile terminalUser, validated user face-image
PictureiInterior left side eyebrow area value is labeled asRight side eyebrow area value is labeled asUpper lip face
Product value is labeled asLower lip area value is labeled asLeft eye orbital surface product value is labeled asAnd right eye
Orbital surface product value is labeled as
In reality scene, since everyone facial appearance is difficult to reach approximate identical, interpersonal face
Portion's image will necessarily be distinct, and is usually more that these are main special in facial eyebrow, lip and eye socket
Facial positions.Based on this, in the present embodiment by by face left side eyebrow area value, right side eyebrow area value, upper lip face
Product value, lower lip area value, left eye orbital surface product value and right eye orbital surface product value are as the differentiation between difference different user face
Point, and pass through the relation calculated between these facial specific positions, to obtain being capable of the face of Efficient Characterization validated user face
Identification parameter, so as to judge the behaviour for its operation exactly by face recognition parameter for client's mobile terminal
Whether author is its validated user;
Step 3, client gathers the infrared data that the validated user presets facial positions with mobile terminal respectively, and structure closes
The facial infrared data storehouse of method user obtains the infrared discrimination parameter of face for the validated user;
Wherein, the left side eyebrow area infrared data in the facial infrared data storehouse of validated user, the infrared number in right side eyebrow area
According to, upper lip area infrared data, lower lip area infrared data, left eye socket of the eye area's infrared data and right eye socket of the eye area infrared data have
Have N number of, r-th of left side eyebrow area infrared data of validated user is labeled asR-th of validated user is right
Side eyebrow area infrared data is labeled asR-th of upper lip area infrared data of validated user is labeled asR-th of lower lip area infrared data of validated user is labeled asThe r of validated user
A left eye socket of the eye area infrared data is labeled asR-th of right eye socket of the eye area infrared data of validated user is labeled asThe infrared discrimination parameter of face of validated user is labeled as ρUser:
Step 4, client is joined with mobile terminal according to the face recognition parameter of gained its validated user and the infrared discriminating of face
Number, obtains the authentication index of its validated user;Wherein, the authentication index of validated user is labeled as ζUser:
In view of in actual life, the difference of each user's own bodies function, the body temperature of each user itself is different, often
As soon as the temperature of user's face position is also different, the infrared data emitted so as to each user's difference facial positions
It has differences;Therefore, the present embodiment by by face left side eyebrow area, right side eyebrow area, upper lip area, lower lip area, a left side
Temperature infrared situation corresponding to eye socket area and right eye socket of the eye area is as the difference distinguished between different user face
Parameter, then by the relation between infrared data corresponding to above-mentioned each region of fusion calculation face, obtaining one being capable of table
Levy the parameter of validated user facial characteristics, that is, the obtained infrared discrimination parameter of face in the present embodiment, so as to so that
It obtains client to be handled by face recognition parameter and the infrared discrimination parameter of the face with mobile terminal, correctly to be known
The whether legal authentication parameter of other operator's identity uses movement eventually to get to authentication index so as to fulfill from client
The angle at end protects the safety of logistics information;
Step 5, client randomly selects preset number with mobile terminal in the face image data storehouse of its validated user
Carrier image of several face-images as embedded logistics Air Way Bill No. information to form carrier image sequence, and is moved by client
Dynamic terminal is corresponding respectively to obtain the encryption secret key for each width carrier image;That is, for each width carrier image, client
The encryption secret key of the correspondence width carrier image can be all obtained with mobile terminal;
Wherein, the carrier image total number in carrier image sequence is M, jth width carrier image mark in carrier image sequence
It is denoted as JPGj, carrier image JPGjCorresponding encryption secret key is
Wherein,WithIt is corresponding respectively to represent carrier image JPGjThe left side eyebrow area of interior validated user
The right side eyebrow area value of value and the validated user;WithIt is corresponding respectively to represent carrier image JPGjInterior legal use
The left eye orbital surface product value at family and the right eye frame area value of the validated user;
The face-image for its validated user that the present invention is randomly selected for client by the use of mobile terminal as after carrier image,
Client utilizes left side eyebrow area value, the right side eyebrow area that validated user is presented in every width carrier image with mobile terminal
Value, left eye orbital surface product value and right eye frame area value, are calculated the encryption secret key value to being applied to the width carrier image, so as to
Use can be encrypted for logistics Air Way Bill No. information with mobile terminal for client, other illegal persons is avoided to attempt to pass through conjecture
Or other modes steal logistics Air Way Bill No. information, have prevented leaking for logistics Air Way Bill No. information, ensure that logistics information safety;
Step 6, after logistics generates logistics waybill with mobile terminal for article to be sent, and it is sent respectively to client's shifting
Dynamic terminal and logistics management platform;With mobile terminal when having detected that operator inputs logistics Air Way Bill No., client moves client
Dynamic terminal corresponds to the authentication index for getting current operator in the way of step 1 to step 4, and is moved by the client
When dynamic terminal judges that its validated user is equal with the authentication index of current operator, show that current operator's identity is credible,
Client goes to step 7 with mobile terminal at this time;Certainly, client judges its validated user and the body of current operator with mobile terminal
When part verification index is unequal, illustrates that the identity of current operator is suspicious, close danger is stolen there are logistics information, at this time client
With mobile terminal forbid current operator performed on client's mobile terminal input logistics Air Way Bill No. operation;
Step 7, client is handled with mobile terminal for the logistics Air Way Bill No. that current operator is inputted, and formation has
The new logistics Air Way Bill No. of the multiple of carrier image number in step 5 obtains the M groups number with group number number;Wherein, Ke Huyong
Mobile terminal processing inputs logistics Air Way Bill No. and includes the following steps 7-1 and step 7-2 to obtain the process of new logistics Air Way Bill No.:
Step 7-1, when client's mobile terminal judges inputted logistics Air Way Bill No. for the multiple of the carrier image number,
Current logistics Air Way Bill No. is divided into M groups by client with mobile terminal according to sequencing from left to right;Wherein, the present embodiment
In described logistics Air Way Bill No. using 13 bit digitals composition;
Step 7-2, client with mobile terminal to judge inputted logistics Air Way Bill No. be not the multiple of carrier image number when, visitor
Family carries out zero padding processing with mobile terminal in the leftmost side of logistics Air Way Bill No., so that zero padding treated logistics Air Way Bill No. is carries
The multiple of body picture number, then again by client with mobile terminal by zero padding treated logistics Air Way Bill No. according to from left to right
Sequencing is divided into M groups;
The logistics Air Way Bill No. inputted is changed to adapt to by way of zero padding is taken to handle with mobile terminal by client
The form of carrier image number multiple, can be all carrier images of selection with mobile terminal it is possible thereby to which client is effectively ensured
And obtained all encryption secret keys are used in the encryption for logistics Air Way Bill No., are not only increased carrier image and are added
Utilization rate when close secret key is encrypted, and also assure that client inputs the safety of logistics Air Way Bill No.;
Step 8, client with mobile terminal to each width carrier image in carrier image sequence according to priority from left to right
Order is numbered successively, obtains several numbered carrier images of tool of preset number;
Step 9, client is digital according to corresponding order is numbered by obtained M groups with mobile terminal, successively by each group number
It is embedded into carrier image sequence in the carrier image of reference numeral, and using the corresponding encryption secret key pair of carrier image embedded with number
The load figure image encryption of word, correspondence obtain the embedding close image of preset number;
Step 10, client sends out each embedding close image with mobile terminal according to the logistics waybill inquiry instruction of current operator
Logistics management platform is given, it then again will corresponding each embedding close figure after the prefixed time interval being successfully transmitted after all embedding close images
The decryption secret key of picture is sent to logistics management platform;Wherein, for same embedding close image, decryption secret key is with encrypting secret key phase
Together;Wherein, client is stored with the prefixed time interval value in advance with mobile terminal and logistics management platform;
Step 11, logistics management platform is decrypted using each decryption secret key of reception for corresponding each embedding close image,
To obtain number embedded in embedding close image, and according to sequence integration from left to right, decryption logistics Air Way Bill No. is obtained, and is gone back
It manages to obtain the organic stream Air Way Bill No. that client is inputted with the current operator at mobile terminal in original place;Original object described herein
It is also 13 bit digitals to flow Air Way Bill No.;
Wherein, when it is digital zero to decrypt logistics Air Way Bill No. leftmost side bit digital, logistics management platform deletes the leftmost side
The digital zero of digital zero and its rear position of position on position, until there is nonzero digit, and with treated
The Air Way Bill No. of current state is as organic stream Air Way Bill No.;When it is not digital zero to decrypt logistics Air Way Bill No. leftmost side bit digital,
Then using current waybill number as organic stream Air Way Bill No.;
Step 12, the organic stream Air Way Bill No. that logistics management platform is obtained according to reduction treatment is inquired about, and will be corresponding
The real-time logistics information of the organic stream Air Way Bill No. feeds back to client's mobile terminal.
Although the preferred embodiment of the present invention described in detail above, it is to be clearly understood that for this field
Technical staff for, the invention may be variously modified and varied.That is made within the spirit and principles of the invention appoints
What modification, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.
Claims (3)
1. a kind of intelligent encryption method of logistics information, for including client with mobile terminal, logistics mobile terminal and object
The logistics system that flow tube platform is formed, which is characterized in that the intelligent encryption method of the logistics information includes as follows successively
Step 1 is to step 12:
Step 1, client start for the first time its it is legal possess client's mobile terminal when, client is stood upon actuation with mobile terminal
The face-image of active user's preset number is obtained, establishes the face image data storehouse for its validated user;
Wherein, the preset number is labeled as N, and the face image data storehouse of validated user is labeled as PictureUser, face-image
Database PictureUserI-th interior of face-image is labeled as Picturei, 1≤i≤N;
Step 2, client presets the characteristic parameter of facial positions and acquired conjunction with mobile terminal according to for its validated user
The face image data storehouse of method user builds validated user facial characteristics parameter database, obtains the face for the validated user
Portion's identification parameter;
Wherein, the validated user preset facial positions facial characteristics parameter include validated user face-image in left side eyebrow
Hair side product value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye orbital surface product
Value;
The client is δ with the face recognition parameter tags of the validated user of mobile terminalUser, the validated user face-image
PictureiInterior left side eyebrow area value is labeled asRight side eyebrow area value is labeled asUpper lip face
Product value is labeled asLower lip area value is labeled asLeft eye orbital surface product value is labeled asAnd right eye socket of the eye
Area value is labeled as
<mrow>
<msub>
<mi>&delta;</mi>
<mrow>
<mi>U</mi>
<mi>s</mi>
<mi>e</mi>
<mi>r</mi>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>N</mi>
</munderover>
<msqrt>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
<mo>-</mo>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mrow>
<mrow>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>O</mi>
<mi>r</mi>
<mi>b</mi>
<mi>i</mi>
<mi>t</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
<mo>-</mo>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>O</mi>
<mi>r</mi>
<mi>b</mi>
<mi>i</mi>
<mi>t</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
</msqrt>
</mrow>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>N</mi>
</munderover>
<msqrt>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>L</mi>
<mi>i</mi>
<mi>p</mi>
<mi>s</mi>
<mo>_</mo>
<mi>U</mi>
<mi>p</mi>
</mrow>
</msubsup>
<mo>-</mo>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>L</mi>
<mi>i</mi>
<mi>p</mi>
<mi>s</mi>
<mo>_</mo>
<mi>D</mi>
<mi>o</mi>
<mi>w</mi>
<mi>n</mi>
</mrow>
</msubsup>
</mrow>
<mrow>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
<mo>-</mo>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
</msqrt>
</mrow>
</mfrac>
<mo>;</mo>
</mrow>
Step 3, client gathers the infrared data that the validated user presets facial positions with mobile terminal respectively, builds legal use
The facial infrared data storehouse at family obtains the infrared discrimination parameter of face for the validated user;
Wherein, the left side eyebrow area infrared data in the facial infrared data storehouse of the validated user, the infrared number in right side eyebrow area
According to, upper lip area infrared data, lower lip area infrared data, left eye socket of the eye area's infrared data and right eye socket of the eye area infrared data have
Have N number of, r-th of left side eyebrow area infrared data of the validated user is marked to be labeled asValidated user
R-th of right side eyebrow area infrared data is labeled asR-th of upper lip area infrared data mark of validated user
It is denoted asR-th of lower lip area infrared data of validated user is labeled asValidated user
R-th of left eye socket of the eye area infrared data be labeled asR-th of right eye socket of the eye area infrared data mark of validated user
ForThe infrared discrimination parameter of face of the validated user is labeled as ρUser:
<mrow>
<msub>
<mi>&rho;</mi>
<mrow>
<mi>U</mi>
<mi>s</mi>
<mi>e</mi>
<mi>r</mi>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>r</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>N</mi>
</munderover>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msubsup>
<mi>Infrared</mi>
<mi>r</mi>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
</mrow>
<mrow>
<msubsup>
<mi>Infrared</mi>
<mi>r</mi>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
<mo>&CenterDot;</mo>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>r</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>N</mi>
</munderover>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msubsup>
<mi>Infrared</mi>
<mi>r</mi>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>o</mi>
<mi>x</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
</mrow>
<mrow>
<msubsup>
<mi>Infrared</mi>
<mi>r</mi>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>o</mi>
<mi>x</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>r</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>N</mi>
</munderover>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msubsup>
<mi>Infrared</mi>
<mi>r</mi>
<mrow>
<mi>L</mi>
<mi>i</mi>
<mi>p</mi>
<mi>s</mi>
<mo>_</mo>
<mi>U</mi>
<mi>p</mi>
</mrow>
</msubsup>
</mrow>
<mrow>
<msubsup>
<mi>Infrared</mi>
<mi>r</mi>
<mrow>
<mi>L</mi>
<mi>i</mi>
<mi>p</mi>
<mi>s</mi>
<mo>_</mo>
<mi>D</mi>
<mi>o</mi>
<mi>w</mi>
<mi>n</mi>
</mrow>
</msubsup>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
</mrow>
</mfrac>
<mo>;</mo>
<mn>1</mn>
<mo>&le;</mo>
<mi>r</mi>
<mo>&le;</mo>
<mi>N</mi>
<mo>;</mo>
</mrow>
Step 4, client obtains with mobile terminal according to the face recognition parameter and the infrared discrimination parameter of face of its validated user of gained
To the authentication index of its validated user;Wherein, the authentication index for marking the validated user is ζUser:
<mrow>
<msub>
<mi>&zeta;</mi>
<mrow>
<mi>U</mi>
<mi>s</mi>
<mi>e</mi>
<mi>r</mi>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<msub>
<mi>&delta;</mi>
<mrow>
<mi>U</mi>
<mi>s</mi>
<mi>e</mi>
<mi>r</mi>
</mrow>
</msub>
<msub>
<mi>&rho;</mi>
<mrow>
<mi>U</mi>
<mi>s</mi>
<mi>e</mi>
<mi>r</mi>
</mrow>
</msub>
</mfrac>
<mo>;</mo>
</mrow>
Step 5, client randomly selects in the face image data storehouse of its validated user several of preset number with mobile terminal
Carrier image of the face-image as embedded logistics Air Way Bill No. information, to form carrier image sequence, and it is whole with movement by client
End is corresponding respectively to obtain the encryption secret key for each width carrier image;
Wherein, the carrier image total number in the carrier image sequence is M, jth width carrier figure in the carrier image sequence
As being labeled as JPGj, carrier image JPGjCorresponding encryption secret key is
<mrow>
<msub>
<mi>Key</mi>
<mrow>
<msub>
<mi>JPG</mi>
<mi>j</mi>
</msub>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>j</mi>
</msub>
</mrow>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>j</mi>
</msub>
</mrow>
<mrow>
<mi>E</mi>
<mi>y</mi>
<mi>e</mi>
<mi>b</mi>
<mi>r</mi>
<mi>o</mi>
<mi>w</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mfrac>
<mo>&CenterDot;</mo>
<mfrac>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>j</mi>
</msub>
</mrow>
<mrow>
<mi>O</mi>
<mi>r</mi>
<mi>b</mi>
<mi>i</mi>
<mi>t</mi>
<mo>_</mo>
<mi>L</mi>
</mrow>
</msubsup>
<msubsup>
<mi>S</mi>
<mrow>
<msub>
<mi>Picture</mi>
<mi>j</mi>
</msub>
</mrow>
<mrow>
<mi>O</mi>
<mi>r</mi>
<mi>b</mi>
<mi>i</mi>
<mi>t</mi>
<mo>_</mo>
<mi>R</mi>
</mrow>
</msubsup>
</mfrac>
<mo>;</mo>
</mrow>
Wherein,WithIt is corresponding respectively to represent carrier image JPGjThe left side eyebrow area value of interior validated user and
The right side eyebrow area value of the validated user;WithIt is corresponding respectively to represent carrier image JPGjInterior validated user
The right eye frame area value of left eye orbital surface product value and the validated user;
Step 6, after logistics generates logistics waybill with mobile terminal for article to be sent, and it is whole with movement to be sent respectively to client
End and logistics management platform;For client with mobile terminal when having detected that operator inputs logistics Air Way Bill No., client is whole with movement
End corresponds to the authentication index for getting current operator in the way of step 1 to step 4, and whole with movement by the client
When end judges that its validated user is equal with the authentication index of current operator, client goes to step 7 with mobile terminal;It is described
When client judges that the authentication index of its validated user and current operator are unequal with mobile terminal, client's mobile terminal
Current operator is forbidden to perform the operation of input logistics Air Way Bill No. on client's mobile terminal;
Step 7, client is handled with mobile terminal for the logistics Air Way Bill No. that current operator is inputted, and being formed has step
The new logistics Air Way Bill No. of the multiple of carrier image number in 5 obtains the M groups number with group number number;Wherein, the client uses
Mobile terminal processing inputs logistics Air Way Bill No. and includes the following steps 7-1 and step 7-2 to obtain the process of new logistics Air Way Bill No.:
Step 7-1, when client's mobile terminal judges inputted logistics Air Way Bill No. for the multiple of the carrier image number, client
Current logistics Air Way Bill No. is divided into M groups according to sequencing from left to right with mobile terminal;
Step 7-2, client with mobile terminal to judge inputted logistics Air Way Bill No. be not the multiple of the carrier image number when, institute
It states client and carries out zero padding processing in the leftmost side of the logistics Air Way Bill No. with mobile terminal, so that zero padding treated logistics fortune
Odd numbers is the multiple of the carrier image number, and then by client, with mobile terminal, by zero padding, treated that logistics Air Way Bill No. is pressed again
M groups are divided into according to sequencing from left to right;
Step 8, client with mobile terminal to each width carrier image in the carrier image sequence according to priority from left to right
Order is numbered successively, obtains several numbered carrier images of tool of the preset number;
Step 9, client is digital according to corresponding order is numbered by the obtained M groups with mobile terminal, successively by each group number
It is embedded into carrier image sequence in the carrier image of reference numeral, and it is embedding using the corresponding encryption secret key pair of the carrier image
There is the load figure image encryption of number, correspondence obtains the embedding close image of the preset number;
Step 10, client sends out each embedding close image with mobile terminal according to the logistics waybill inquiry instruction of current operator
Logistics management platform is given, it then again will corresponding each embedding close figure after the prefixed time interval being successfully transmitted after all embedding close images
The decryption secret key of picture is sent to logistics management platform;Wherein, for same embedding close image, decryption secret key is with encrypting secret key phase
Together;
Step 11, logistics management platform is decrypted using each decryption secret key of reception for corresponding each embedding close image, with
The embedded number into embedding close image, and according to sequence integration from left to right, obtain decryption logistics Air Way Bill No., and also original place
Reason obtains the organic stream Air Way Bill No. that client is inputted with the current operator at mobile terminal;
Wherein, when decryption logistics Air Way Bill No. leftmost side bit digital is digital zero, it is most left that the logistics management platform deletes this
The digital zero of digital zero and its rear position of position on side position, until there is nonzero digit, and with processing after
Current state Air Way Bill No. as organic stream Air Way Bill No.;Decryption logistics Air Way Bill No. leftmost side bit digital is not digital zero
When, then using current waybill number as organic stream Air Way Bill No.;
Step 12, the organic stream Air Way Bill No. that logistics management platform is obtained according to reduction treatment is inquired about, and will be corresponding
The real-time logistics information of the organic stream Air Way Bill No. feeds back to client's mobile terminal.
2. the intelligent encryption method of logistics information according to claim 1, which is characterized in that the client is with mobile terminal
Smart mobile phone or tablet computer.
3. the intelligent encryption method of logistics information according to claim 1, which is characterized in that the organic stream Air Way Bill No. is
The number of 13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711467002.1A CN108062481B (en) | 2017-12-29 | 2017-12-29 | Intelligent encryption method for logistics information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711467002.1A CN108062481B (en) | 2017-12-29 | 2017-12-29 | Intelligent encryption method for logistics information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108062481A true CN108062481A (en) | 2018-05-22 |
CN108062481B CN108062481B (en) | 2021-06-29 |
Family
ID=62140781
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711467002.1A Active CN108062481B (en) | 2017-12-29 | 2017-12-29 | Intelligent encryption method for logistics information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108062481B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286831A (en) * | 2018-10-08 | 2019-01-29 | 宁波大学 | A kind of intelligent video wireless security connection control method |
CN111639348A (en) * | 2020-05-14 | 2020-09-08 | 瀚高基础软件股份有限公司 | Management method and device of database keys |
CN112288447A (en) * | 2020-10-30 | 2021-01-29 | 北京每日优鲜电子商务有限公司 | Article information display method and device, electronic equipment and computer readable medium |
CN112668955A (en) * | 2020-09-03 | 2021-04-16 | 浙江万里学院 | Intelligent settlement method for modern logistics expenses |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103802528A (en) * | 2014-01-27 | 2014-05-21 | 辛红 | Confidentiality express waybill and using method thereof |
CN105184537A (en) * | 2015-10-08 | 2015-12-23 | 浙江万里学院 | Cloud logistics management method and system for monitoring cargo states in real time |
CN105225089A (en) * | 2015-10-08 | 2016-01-06 | 浙江万里学院 | A kind of logistics monitoring method and system obtaining goods real time kinematics track |
-
2017
- 2017-12-29 CN CN201711467002.1A patent/CN108062481B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103802528A (en) * | 2014-01-27 | 2014-05-21 | 辛红 | Confidentiality express waybill and using method thereof |
CN105184537A (en) * | 2015-10-08 | 2015-12-23 | 浙江万里学院 | Cloud logistics management method and system for monitoring cargo states in real time |
CN105225089A (en) * | 2015-10-08 | 2016-01-06 | 浙江万里学院 | A kind of logistics monitoring method and system obtaining goods real time kinematics track |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286831A (en) * | 2018-10-08 | 2019-01-29 | 宁波大学 | A kind of intelligent video wireless security connection control method |
CN109286831B (en) * | 2018-10-08 | 2021-04-16 | 宁波大学 | Intelligent video wireless safety access control method |
CN111639348A (en) * | 2020-05-14 | 2020-09-08 | 瀚高基础软件股份有限公司 | Management method and device of database keys |
CN112668955A (en) * | 2020-09-03 | 2021-04-16 | 浙江万里学院 | Intelligent settlement method for modern logistics expenses |
CN112668955B (en) * | 2020-09-03 | 2023-09-22 | 浙江万里学院 | Modern logistics cost intelligent settlement method |
CN112288447A (en) * | 2020-10-30 | 2021-01-29 | 北京每日优鲜电子商务有限公司 | Article information display method and device, electronic equipment and computer readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN108062481B (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108062481A (en) | A kind of intelligent encryption method of logistics information | |
CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
CN105429761B (en) | A kind of key generation method and device | |
CN106788972B (en) | Train ticket self-service ticket buying and taking system based on block chain identity authentication | |
CN103400082A (en) | File encryption/decryption method and system | |
US10929849B2 (en) | Method and a system for performing 3D-based identity verification of individuals with mobile devices | |
CN105354509B (en) | The processing method and processing system of picture | |
WO2017012175A1 (en) | Identity authentication method, identity authentication system, terminal and server | |
CN109816832B (en) | Unlocking method and device | |
CN106330464A (en) | Identity authentication method, device and system | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
US10282532B2 (en) | Secure storage of fingerprint related elements | |
CN105631271B (en) | Unlocking method, tripper and wearable smart machine and terminal | |
CN205883297U (en) | Number of account login system based on people's face and fingerprint identification | |
CN107864124A (en) | A kind of end message method for security protection, terminal and bluetooth lock | |
CN105262733A (en) | Fingerprint authentication method, cloud server, fingerprint identification method and terminal | |
CN105139205A (en) | Payment verification method, terminal and server | |
CN108270962A (en) | terminal and its method for controlling camera operation | |
US7177425B2 (en) | Device and method for securing information associated with a subscriber in a communication apparatus | |
CN109906626A (en) | The messaging sessions of safety | |
CN104537539A (en) | Method for activating and forbidding anti-counterfeit label based on two-dimension code recognition technology | |
CN104835039A (en) | Data label generation method | |
US11586717B2 (en) | Method and electronic device for authenticating a user | |
CN105653993A (en) | Password inputting method, apparatus and electronic device | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |