CN108062481A - A kind of intelligent encryption method of logistics information - Google Patents

A kind of intelligent encryption method of logistics information Download PDF

Info

Publication number
CN108062481A
CN108062481A CN201711467002.1A CN201711467002A CN108062481A CN 108062481 A CN108062481 A CN 108062481A CN 201711467002 A CN201711467002 A CN 201711467002A CN 108062481 A CN108062481 A CN 108062481A
Authority
CN
China
Prior art keywords
mrow
client
mobile terminal
logistics
msub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711467002.1A
Other languages
Chinese (zh)
Other versions
CN108062481B (en
Inventor
王艳玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Wanli University
Zhejiang Wanli College
Original Assignee
Zhejiang Wanli College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Wanli College filed Critical Zhejiang Wanli College
Priority to CN201711467002.1A priority Critical patent/CN108062481B/en
Publication of CN108062481A publication Critical patent/CN108062481A/en
Application granted granted Critical
Publication of CN108062481B publication Critical patent/CN108062481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Biomedical Technology (AREA)
  • Bioethics (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of intelligent encryption methods of logistics information, client obtains the face recognition parameter of characterization validated user identity with the parameter of its validated user face predeterminated position of acquisition for mobile terminal, pass through the corresponding infrared data for gathering facial preset position area, the infrared circle parameter of face of another characterization validated user identity and the authentication index whether correct identification operator's identity is legal are obtained, to accurately identify identity security of the client with its validated user of mobile terminal based on multiple identities identification parameter;Using the validated user face-image randomly selected as the encrypted carrier image of logistics information, and each width carrier image is handled based on the encryption secret key obtained by validated user facial parameters, client is effectively ensured to be used in the encryption for logistics Air Way Bill No. all carrier images of selection and obtained all encryption secret keys with mobile terminal, utilization rate when improving carrier image and encrypting secret key encryption, ensures that client inputs the safety of logistics Air Way Bill No..

Description

A kind of intelligent encryption method of logistics information
Technical field
The present invention relates to logistics field more particularly to a kind of intelligent encryption methods of logistics information.
Background technology
Existing logistics system mainly includes logistics management platform, logistics vehicles and the visitor for customer inquiries logistics information Family terminal.With the intelligent development of mobile terminal device, more and more intelligent mobile terminals are used by client, this is also The logistics information of customer inquiries target item provides hardware support.The mobile terminal of existing customer inquiry logistics information again may be used To be referred to as client's mobile terminal.Client is connected to the object of logistics company in the client possessed by oneself with mobile terminal After flow tube platform, simply enter article corresponding logistics waybill number, it is possible to understand the logistics information of article, such as Article currently have been conveyed into where, consignor's name of article, consignor's telephone number, consignee's name and consignee connection It is the logistics informations such as phone.
However, there is no the standards realized well to its operator's identity with mobile terminal by the existing customer in logistics system Logistics Air Way Bill No. when effect being truly had to demonstrate,prove, while also not being inquired about client is effectively encrypted, this will cause anyone, bag Logistics waybill number may be stolen by illegal operation client with mobile terminal by including illegal person, until illegally getting correspondence Logistics information, seriously affect logistics activity it is normal safety carry out.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of intelligent encryption of logistics information for the above-mentioned prior art Method.
Technical solution is used by the present invention solves above-mentioned technical problem:A kind of intelligent encryption method of logistics information, For including the logistics system that client is formed with mobile terminal, logistics mobile terminal and logistics management platform, feature It is, the intelligent encryption method of the logistics information in turn includes the following steps 1 to step 12:
Step 1, client start for the first time its it is legal possess client's mobile terminal when, client is being started with mobile terminal The face-image of active user's preset number is immediately obtained afterwards, establishes the face image data storehouse for its validated user;
Wherein, the preset number is labeled as N, and the face image data storehouse of validated user is labeled as PictureUser, face Portion image data base PictureUserI-th interior of face-image is labeled as Picturei, 1≤i≤N;
Step 2, client with mobile terminal according to presetting the characteristic parameter of facial positions for its validated user and obtained The face image data storehouse of validated user is taken, builds validated user facial characteristics parameter database, is obtained for the validated user Face recognition parameter;
Wherein, the validated user preset facial positions facial characteristics parameter include validated user face-image in a left side Side eyebrow area value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye socket of the eye Area value;
The client is δ with the face recognition parameter tags of the validated user of mobile terminalUser, the validated user face Image PictureiInterior left side eyebrow area value is labeled asRight side eyebrow area value is labeled asUpper mouth Labial surface product value is labeled asLower lip area value is labeled asLeft eye orbital surface product value is labeled asIt is and right Eye socket area value is labeled as
Step 3, client gathers the infrared data that the validated user presets facial positions with mobile terminal respectively, and structure closes The facial infrared data storehouse of method user obtains the infrared discrimination parameter of face for the validated user;
Wherein, the left side eyebrow area infrared data in the facial infrared data storehouse of the validated user, right side eyebrow area are red Outer data, upper lip area infrared data, lower lip area infrared data, left eye socket of the eye area's infrared data and right eye socket of the eye area infrared data It is respectively provided with N number of, r-th of left side eyebrow area infrared data of the validated user is marked to be labeled asLegal use R-th of right side eyebrow area infrared data at family is labeled asR-th of infrared number in upper lip area of validated user According to labeled asR-th of lower lip area infrared data of validated user is labeled asIt is legal R-th of left eye socket of the eye area infrared data of user is labeled asR-th of infrared number in right eye socket of the eye area of validated user According to labeled asThe infrared discrimination parameter of face of the validated user is labeled as ρUser
Step 4, client is joined with mobile terminal according to the face recognition parameter of gained its validated user and the infrared discriminating of face Number, obtains the authentication index of its validated user;Wherein, the authentication index for marking the validated user is ζUser
Step 5, client randomly selects preset number with mobile terminal in the face image data storehouse of its validated user Carrier image of several face-images as embedded logistics Air Way Bill No. information to form carrier image sequence, and is moved by client Dynamic terminal is corresponding respectively to obtain the encryption secret key for each width carrier image;
Wherein, the carrier image total number in the carrier image sequence is M, and jth width carries in the carrier image sequence Body image tagged is JPGj, carrier image JPGjCorresponding encryption secret key is
Wherein,WithIt is corresponding respectively to represent carrier image JPGjThe left side eyebrow area of interior validated user The right side eyebrow area value of value and the validated user;WithIt is corresponding respectively to represent carrier image JPGjInterior legal use The left eye orbital surface product value at family and the right eye frame area value of the validated user;
Step 6, after logistics generates logistics waybill with mobile terminal for article to be sent, and it is sent respectively to client's shifting Dynamic terminal and logistics management platform;With mobile terminal when having detected that operator inputs logistics Air Way Bill No., client moves client Dynamic terminal corresponds to the authentication index for getting current operator in the way of step 1 to step 4, and is moved by the client When dynamic terminal judges that its validated user is equal with the authentication index of current operator, client goes to step 7 with mobile terminal; When the client judges that the authentication index of its validated user and current operator are unequal with mobile terminal, client's movement Terminal forbids current operator to perform the operation for inputting logistics Air Way Bill No. on client's mobile terminal;
Step 7, client is handled with mobile terminal for the logistics Air Way Bill No. that current operator is inputted, and formation has The new logistics Air Way Bill No. of the multiple of carrier image number in step 5 obtains the M groups number with group number number;Wherein, the visitor Family mobile terminal processing inputs logistics Air Way Bill No. and includes the following steps 7-1 and step to obtain the process of new logistics Air Way Bill No. 7-2:
Step 7-1, when client's mobile terminal judges inputted logistics Air Way Bill No. for the multiple of the carrier image number, Current logistics Air Way Bill No. is divided into M groups by client with mobile terminal according to sequencing from left to right;
Step 7-2, client judge that inputted logistics Air Way Bill No. is not the multiple of the carrier image number with mobile terminal When, the client carries out zero padding processing with mobile terminal in the leftmost side of the logistics Air Way Bill No., so that treated for zero padding Logistics Air Way Bill No. is the multiple of the carrier image number, is then again transported zero padding treated logistics with mobile terminal by client Odd numbers is divided into M groups according to sequencing from left to right;
Step 8, client with mobile terminal to each width carrier image in the carrier image sequence according to from left to right Sequencing is numbered successively, obtains several numbered carrier images of tool of the preset number;
Step 9, client is digital according to corresponding order is numbered by the obtained M groups with mobile terminal, successively by each group Digital inset utilizes the corresponding encryption secret key of the carrier image into carrier image sequence in the carrier image of reference numeral To being embedded with the load figure image encryption of number, correspondence obtains the embedding close image of the preset number;
Step 10, client with mobile terminal according to the logistics waybill inquiry instruction of current operator, by each embedding close figure It, then again will be corresponding each embedding after the prefixed time interval being successfully transmitted after all embedding close images as being sent to logistics management platform The decryption secret key of close image is sent to logistics management platform;Wherein, for same embedding close image, decryption secret key and encryption are secret Key is identical;
Step 11, logistics management platform is decrypted using each decryption secret key of reception for corresponding each embedding close image, To obtain number embedded in embedding close image, and according to sequence integration from left to right, decryption logistics Air Way Bill No. is obtained, and is gone back It manages to obtain the organic stream Air Way Bill No. that client is inputted with the current operator at mobile terminal in original place;
Wherein, when decryption logistics Air Way Bill No. leftmost side bit digital is digital zero, the logistics management platform is deleted should The digital zero of digital zero and its rear position of position in left-most position, until there is nonzero digit, and with place The Air Way Bill No. of current state after reason is as organic stream Air Way Bill No.;Decryption logistics Air Way Bill No. leftmost side bit digital is not several During word zero, then using current waybill number as organic stream Air Way Bill No.;
Step 12, the organic stream Air Way Bill No. that logistics management platform is obtained according to reduction treatment is inquired about, and will The real-time logistics information of the corresponding organic stream Air Way Bill No. feeds back to client's mobile terminal.
Optionally, in the intelligent encryption method of the logistics information, the client with mobile terminal be smart mobile phone or Tablet computer.
Further, in the intelligent encryption method of the logistics information, the organic stream Air Way Bill No. is the number of 13 Word.
Compared with prior art, the advantage of the invention is that:
First, in logistics field, the present invention passes through the left side eyebrow by client with mobile terminal its validated user face Area value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye orbital surface product value As the diacritical point between difference user's face, and pass through the relation calculated between these facial specific positions, obtain to have The face recognition parameter of effect characterization validated user face, so as to can be with by face recognition parameter for client's mobile terminal Judge whether for the operator that it is operated be validated user, in turn ensures that the current operator of client's mobile terminal exactly Identity whether threaten current logistics information safety;
Secondly, by the relation between infrared data corresponding to each region of fusion calculation face, obtaining one being capable of table The infrared discrimination parameter of face of validated user facial characteristics is levied, so that client can be known with mobile terminal by face Other parameter and the infrared discrimination parameter of face are handled, and are referred to obtaining the authentication that correctly whether identification operator's identity is legal Number, so as to fulfill the safety of logistics information is protected with the angle of mobile terminal from client;
Again, the face-image for its validated user that the present invention is randomly selected for client by the use of mobile terminal is as carrier figure As after, client utilizes left side eyebrow area value, the right side eyebrow that validated user is presented in every width carrier image with mobile terminal The encryption secret key value to being applied to the width carrier image is calculated in area value, left eye orbital surface product value and right eye frame area value, So as to which use is encrypted for logistics Air Way Bill No. information with mobile terminal for client, other illegal persons is avoided to attempt to pass through Conjecture or other modes steal logistics Air Way Bill No. information, have prevented leaking for logistics Air Way Bill No. information, ensure that logistics information is pacified Entirely;
Finally, the present invention by way of zero padding is taken to handle with mobile terminal by client by the current operation of identity security The logistics Air Way Bill No. that person is inputted is changed to adapt to the form of carrier image number multiple, and it is whole with movement that client is thus effectively ensured End can be used for all carrier images of selection and obtained all encryption secret keys at the encryption for logistics Air Way Bill No. In reason, not only increase carrier image and encrypt utilization rate when secret key is encrypted, and also assure that client inputs object Flow the safety of Air Way Bill No..
Description of the drawings
Fig. 1 is the flow diagram of the intelligent encryption method of logistics information in inventive embodiments.
Specific embodiment
The present invention is described in further detail below in conjunction with attached drawing embodiment.
As shown in Figure 1, in the present embodiment logistics information intelligent encryption method, for including client with mobile terminal, object The logistics system that stream mobile terminal and logistics management platform are formed, client's mobile terminal and logistics mobile terminal are equal Logistics management platform is wirelessly communicated to connect, client can be selected with mobile terminal using smart mobile phone or tablet electricity Brain, the client in the present embodiment select smart mobile phone with mobile terminal;The intelligent encryption method of the logistics information is included such as successively Lower step 1 is to step 12:
Step 1, client start for the first time its it is legal possess client's mobile terminal when, client is being started with mobile terminal The face-image of active user's preset number is immediately obtained afterwards, establishes the face image data storehouse for its validated user;
Wherein, N, the face-image number of validated user are labeled as the preset number of acquired active user's face-image Picture is labeled as according to storehouseUser, face image data storehouse PictureUserI-th interior of face-image is labeled as Picturei, 1 ≤i≤N;In the present embodiment, preset number N=10;For the face image data storehouse for the validated user established, in the conjunction There is the face-image of N width validated users altogether, so that the client in the present embodiment moves in the face image data storehouse of method user Dynamic terminal is handled;
Step 2, client with mobile terminal according to presetting the characteristic parameter of facial positions for its validated user and obtained The face image data storehouse of validated user is taken, builds validated user facial characteristics parameter database, is obtained for the validated user Face recognition parameter;
Wherein, validated user preset facial positions facial characteristics parameter include validated user face-image in left side eyebrow Hair side product value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye orbital surface product Value;
Client is δ with the face recognition parameter tags of the validated user of mobile terminalUser, validated user face-image PictureiInterior left side eyebrow area value is labeled asRight side eyebrow area value is labeled asUpper lip face Product value is labeled asLower lip area value is labeled asLeft eye orbital surface product value is labeled asAnd right eye Orbital surface product value is labeled as
In reality scene, since everyone facial appearance is difficult to reach approximate identical, interpersonal face Portion's image will necessarily be distinct, and is usually more that these are main special in facial eyebrow, lip and eye socket Facial positions.Based on this, in the present embodiment by by face left side eyebrow area value, right side eyebrow area value, upper lip face Product value, lower lip area value, left eye orbital surface product value and right eye orbital surface product value are as the differentiation between difference different user face Point, and pass through the relation calculated between these facial specific positions, to obtain being capable of the face of Efficient Characterization validated user face Identification parameter, so as to judge the behaviour for its operation exactly by face recognition parameter for client's mobile terminal Whether author is its validated user;
Step 3, client gathers the infrared data that the validated user presets facial positions with mobile terminal respectively, and structure closes The facial infrared data storehouse of method user obtains the infrared discrimination parameter of face for the validated user;
Wherein, the left side eyebrow area infrared data in the facial infrared data storehouse of validated user, the infrared number in right side eyebrow area According to, upper lip area infrared data, lower lip area infrared data, left eye socket of the eye area's infrared data and right eye socket of the eye area infrared data have Have N number of, r-th of left side eyebrow area infrared data of validated user is labeled asR-th of validated user is right Side eyebrow area infrared data is labeled asR-th of upper lip area infrared data of validated user is labeled asR-th of lower lip area infrared data of validated user is labeled asThe r of validated user A left eye socket of the eye area infrared data is labeled asR-th of right eye socket of the eye area infrared data of validated user is labeled asThe infrared discrimination parameter of face of validated user is labeled as ρUser
Step 4, client is joined with mobile terminal according to the face recognition parameter of gained its validated user and the infrared discriminating of face Number, obtains the authentication index of its validated user;Wherein, the authentication index of validated user is labeled as ζUser
In view of in actual life, the difference of each user's own bodies function, the body temperature of each user itself is different, often As soon as the temperature of user's face position is also different, the infrared data emitted so as to each user's difference facial positions It has differences;Therefore, the present embodiment by by face left side eyebrow area, right side eyebrow area, upper lip area, lower lip area, a left side Temperature infrared situation corresponding to eye socket area and right eye socket of the eye area is as the difference distinguished between different user face Parameter, then by the relation between infrared data corresponding to above-mentioned each region of fusion calculation face, obtaining one being capable of table Levy the parameter of validated user facial characteristics, that is, the obtained infrared discrimination parameter of face in the present embodiment, so as to so that It obtains client to be handled by face recognition parameter and the infrared discrimination parameter of the face with mobile terminal, correctly to be known The whether legal authentication parameter of other operator's identity uses movement eventually to get to authentication index so as to fulfill from client The angle at end protects the safety of logistics information;
Step 5, client randomly selects preset number with mobile terminal in the face image data storehouse of its validated user Carrier image of several face-images as embedded logistics Air Way Bill No. information to form carrier image sequence, and is moved by client Dynamic terminal is corresponding respectively to obtain the encryption secret key for each width carrier image;That is, for each width carrier image, client The encryption secret key of the correspondence width carrier image can be all obtained with mobile terminal;
Wherein, the carrier image total number in carrier image sequence is M, jth width carrier image mark in carrier image sequence It is denoted as JPGj, carrier image JPGjCorresponding encryption secret key is
Wherein,WithIt is corresponding respectively to represent carrier image JPGjThe left side eyebrow area of interior validated user The right side eyebrow area value of value and the validated user;WithIt is corresponding respectively to represent carrier image JPGjInterior legal use The left eye orbital surface product value at family and the right eye frame area value of the validated user;
The face-image for its validated user that the present invention is randomly selected for client by the use of mobile terminal as after carrier image, Client utilizes left side eyebrow area value, the right side eyebrow area that validated user is presented in every width carrier image with mobile terminal Value, left eye orbital surface product value and right eye frame area value, are calculated the encryption secret key value to being applied to the width carrier image, so as to Use can be encrypted for logistics Air Way Bill No. information with mobile terminal for client, other illegal persons is avoided to attempt to pass through conjecture Or other modes steal logistics Air Way Bill No. information, have prevented leaking for logistics Air Way Bill No. information, ensure that logistics information safety;
Step 6, after logistics generates logistics waybill with mobile terminal for article to be sent, and it is sent respectively to client's shifting Dynamic terminal and logistics management platform;With mobile terminal when having detected that operator inputs logistics Air Way Bill No., client moves client Dynamic terminal corresponds to the authentication index for getting current operator in the way of step 1 to step 4, and is moved by the client When dynamic terminal judges that its validated user is equal with the authentication index of current operator, show that current operator's identity is credible, Client goes to step 7 with mobile terminal at this time;Certainly, client judges its validated user and the body of current operator with mobile terminal When part verification index is unequal, illustrates that the identity of current operator is suspicious, close danger is stolen there are logistics information, at this time client With mobile terminal forbid current operator performed on client's mobile terminal input logistics Air Way Bill No. operation;
Step 7, client is handled with mobile terminal for the logistics Air Way Bill No. that current operator is inputted, and formation has The new logistics Air Way Bill No. of the multiple of carrier image number in step 5 obtains the M groups number with group number number;Wherein, Ke Huyong Mobile terminal processing inputs logistics Air Way Bill No. and includes the following steps 7-1 and step 7-2 to obtain the process of new logistics Air Way Bill No.:
Step 7-1, when client's mobile terminal judges inputted logistics Air Way Bill No. for the multiple of the carrier image number, Current logistics Air Way Bill No. is divided into M groups by client with mobile terminal according to sequencing from left to right;Wherein, the present embodiment In described logistics Air Way Bill No. using 13 bit digitals composition;
Step 7-2, client with mobile terminal to judge inputted logistics Air Way Bill No. be not the multiple of carrier image number when, visitor Family carries out zero padding processing with mobile terminal in the leftmost side of logistics Air Way Bill No., so that zero padding treated logistics Air Way Bill No. is carries The multiple of body picture number, then again by client with mobile terminal by zero padding treated logistics Air Way Bill No. according to from left to right Sequencing is divided into M groups;
The logistics Air Way Bill No. inputted is changed to adapt to by way of zero padding is taken to handle with mobile terminal by client The form of carrier image number multiple, can be all carrier images of selection with mobile terminal it is possible thereby to which client is effectively ensured And obtained all encryption secret keys are used in the encryption for logistics Air Way Bill No., are not only increased carrier image and are added Utilization rate when close secret key is encrypted, and also assure that client inputs the safety of logistics Air Way Bill No.;
Step 8, client with mobile terminal to each width carrier image in carrier image sequence according to priority from left to right Order is numbered successively, obtains several numbered carrier images of tool of preset number;
Step 9, client is digital according to corresponding order is numbered by obtained M groups with mobile terminal, successively by each group number It is embedded into carrier image sequence in the carrier image of reference numeral, and using the corresponding encryption secret key pair of carrier image embedded with number The load figure image encryption of word, correspondence obtain the embedding close image of preset number;
Step 10, client sends out each embedding close image with mobile terminal according to the logistics waybill inquiry instruction of current operator Logistics management platform is given, it then again will corresponding each embedding close figure after the prefixed time interval being successfully transmitted after all embedding close images The decryption secret key of picture is sent to logistics management platform;Wherein, for same embedding close image, decryption secret key is with encrypting secret key phase Together;Wherein, client is stored with the prefixed time interval value in advance with mobile terminal and logistics management platform;
Step 11, logistics management platform is decrypted using each decryption secret key of reception for corresponding each embedding close image, To obtain number embedded in embedding close image, and according to sequence integration from left to right, decryption logistics Air Way Bill No. is obtained, and is gone back It manages to obtain the organic stream Air Way Bill No. that client is inputted with the current operator at mobile terminal in original place;Original object described herein It is also 13 bit digitals to flow Air Way Bill No.;
Wherein, when it is digital zero to decrypt logistics Air Way Bill No. leftmost side bit digital, logistics management platform deletes the leftmost side The digital zero of digital zero and its rear position of position on position, until there is nonzero digit, and with treated The Air Way Bill No. of current state is as organic stream Air Way Bill No.;When it is not digital zero to decrypt logistics Air Way Bill No. leftmost side bit digital, Then using current waybill number as organic stream Air Way Bill No.;
Step 12, the organic stream Air Way Bill No. that logistics management platform is obtained according to reduction treatment is inquired about, and will be corresponding The real-time logistics information of the organic stream Air Way Bill No. feeds back to client's mobile terminal.
Although the preferred embodiment of the present invention described in detail above, it is to be clearly understood that for this field Technical staff for, the invention may be variously modified and varied.That is made within the spirit and principles of the invention appoints What modification, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (3)

1. a kind of intelligent encryption method of logistics information, for including client with mobile terminal, logistics mobile terminal and object The logistics system that flow tube platform is formed, which is characterized in that the intelligent encryption method of the logistics information includes as follows successively Step 1 is to step 12:
Step 1, client start for the first time its it is legal possess client's mobile terminal when, client is stood upon actuation with mobile terminal The face-image of active user's preset number is obtained, establishes the face image data storehouse for its validated user;
Wherein, the preset number is labeled as N, and the face image data storehouse of validated user is labeled as PictureUser, face-image Database PictureUserI-th interior of face-image is labeled as Picturei, 1≤i≤N;
Step 2, client presets the characteristic parameter of facial positions and acquired conjunction with mobile terminal according to for its validated user The face image data storehouse of method user builds validated user facial characteristics parameter database, obtains the face for the validated user Portion's identification parameter;
Wherein, the validated user preset facial positions facial characteristics parameter include validated user face-image in left side eyebrow Hair side product value, right side eyebrow area value, upper lip area value, lower lip area value, left eye orbital surface product value and right eye orbital surface product Value;
The client is δ with the face recognition parameter tags of the validated user of mobile terminalUser, the validated user face-image PictureiInterior left side eyebrow area value is labeled asRight side eyebrow area value is labeled asUpper lip face Product value is labeled asLower lip area value is labeled asLeft eye orbital surface product value is labeled asAnd right eye socket of the eye Area value is labeled as
<mrow> <msub> <mi>&amp;delta;</mi> <mrow> <mi>U</mi> <mi>s</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <msqrt> <mrow> <mo>(</mo> <mfrac> <mrow> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> <mo>-</mo> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mrow> <mrow> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>O</mi> <mi>r</mi> <mi>b</mi> <mi>i</mi> <mi>t</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> <mo>-</mo> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>O</mi> <mi>r</mi> <mi>b</mi> <mi>i</mi> <mi>t</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mrow> </mfrac> <mo>)</mo> </mrow> </msqrt> </mrow> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <msqrt> <mrow> <mo>(</mo> <mfrac> <mrow> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>L</mi> <mi>i</mi> <mi>p</mi> <mi>s</mi> <mo>_</mo> <mi>U</mi> <mi>p</mi> </mrow> </msubsup> <mo>-</mo> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>L</mi> <mi>i</mi> <mi>p</mi> <mi>s</mi> <mo>_</mo> <mi>D</mi> <mi>o</mi> <mi>w</mi> <mi>n</mi> </mrow> </msubsup> </mrow> <mrow> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> <mo>-</mo> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>i</mi> </msub> </mrow> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mrow> </mfrac> <mo>)</mo> </mrow> </msqrt> </mrow> </mfrac> <mo>;</mo> </mrow>
Step 3, client gathers the infrared data that the validated user presets facial positions with mobile terminal respectively, builds legal use The facial infrared data storehouse at family obtains the infrared discrimination parameter of face for the validated user;
Wherein, the left side eyebrow area infrared data in the facial infrared data storehouse of the validated user, the infrared number in right side eyebrow area According to, upper lip area infrared data, lower lip area infrared data, left eye socket of the eye area's infrared data and right eye socket of the eye area infrared data have Have N number of, r-th of left side eyebrow area infrared data of the validated user is marked to be labeled asValidated user R-th of right side eyebrow area infrared data is labeled asR-th of upper lip area infrared data mark of validated user It is denoted asR-th of lower lip area infrared data of validated user is labeled asValidated user R-th of left eye socket of the eye area infrared data be labeled asR-th of right eye socket of the eye area infrared data mark of validated user ForThe infrared discrimination parameter of face of the validated user is labeled as ρUser
<mrow> <msub> <mi>&amp;rho;</mi> <mrow> <mi>U</mi> <mi>s</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>r</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <mrow> <mo>(</mo> <mfrac> <mrow> <msubsup> <mi>Infrared</mi> <mi>r</mi> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> </mrow> <mrow> <msubsup> <mi>Infrared</mi> <mi>r</mi> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mrow> </mfrac> <mo>)</mo> </mrow> <mo>&amp;CenterDot;</mo> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>r</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <mrow> <mo>(</mo> <mfrac> <mrow> <msubsup> <mi>Infrared</mi> <mi>r</mi> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>o</mi> <mi>x</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> </mrow> <mrow> <msubsup> <mi>Infrared</mi> <mi>r</mi> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>o</mi> <mi>x</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mrow> </mfrac> <mo>)</mo> </mrow> </mrow> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>r</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <mrow> <mo>(</mo> <mfrac> <mrow> <msubsup> <mi>Infrared</mi> <mi>r</mi> <mrow> <mi>L</mi> <mi>i</mi> <mi>p</mi> <mi>s</mi> <mo>_</mo> <mi>U</mi> <mi>p</mi> </mrow> </msubsup> </mrow> <mrow> <msubsup> <mi>Infrared</mi> <mi>r</mi> <mrow> <mi>L</mi> <mi>i</mi> <mi>p</mi> <mi>s</mi> <mo>_</mo> <mi>D</mi> <mi>o</mi> <mi>w</mi> <mi>n</mi> </mrow> </msubsup> </mrow> </mfrac> <mo>)</mo> </mrow> </mrow> </mfrac> <mo>;</mo> <mn>1</mn> <mo>&amp;le;</mo> <mi>r</mi> <mo>&amp;le;</mo> <mi>N</mi> <mo>;</mo> </mrow>
Step 4, client obtains with mobile terminal according to the face recognition parameter and the infrared discrimination parameter of face of its validated user of gained To the authentication index of its validated user;Wherein, the authentication index for marking the validated user is ζUser
<mrow> <msub> <mi>&amp;zeta;</mi> <mrow> <mi>U</mi> <mi>s</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> <mo>=</mo> <mfrac> <msub> <mi>&amp;delta;</mi> <mrow> <mi>U</mi> <mi>s</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> <msub> <mi>&amp;rho;</mi> <mrow> <mi>U</mi> <mi>s</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mfrac> <mo>;</mo> </mrow>
Step 5, client randomly selects in the face image data storehouse of its validated user several of preset number with mobile terminal Carrier image of the face-image as embedded logistics Air Way Bill No. information, to form carrier image sequence, and it is whole with movement by client End is corresponding respectively to obtain the encryption secret key for each width carrier image;
Wherein, the carrier image total number in the carrier image sequence is M, jth width carrier figure in the carrier image sequence As being labeled as JPGj, carrier image JPGjCorresponding encryption secret key is
<mrow> <msub> <mi>Key</mi> <mrow> <msub> <mi>JPG</mi> <mi>j</mi> </msub> </mrow> </msub> <mo>=</mo> <mfrac> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>j</mi> </msub> </mrow> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>j</mi> </msub> </mrow> <mrow> <mi>E</mi> <mi>y</mi> <mi>e</mi> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>w</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mfrac> <mo>&amp;CenterDot;</mo> <mfrac> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>j</mi> </msub> </mrow> <mrow> <mi>O</mi> <mi>r</mi> <mi>b</mi> <mi>i</mi> <mi>t</mi> <mo>_</mo> <mi>L</mi> </mrow> </msubsup> <msubsup> <mi>S</mi> <mrow> <msub> <mi>Picture</mi> <mi>j</mi> </msub> </mrow> <mrow> <mi>O</mi> <mi>r</mi> <mi>b</mi> <mi>i</mi> <mi>t</mi> <mo>_</mo> <mi>R</mi> </mrow> </msubsup> </mfrac> <mo>;</mo> </mrow>
Wherein,WithIt is corresponding respectively to represent carrier image JPGjThe left side eyebrow area value of interior validated user and The right side eyebrow area value of the validated user;WithIt is corresponding respectively to represent carrier image JPGjInterior validated user The right eye frame area value of left eye orbital surface product value and the validated user;
Step 6, after logistics generates logistics waybill with mobile terminal for article to be sent, and it is whole with movement to be sent respectively to client End and logistics management platform;For client with mobile terminal when having detected that operator inputs logistics Air Way Bill No., client is whole with movement End corresponds to the authentication index for getting current operator in the way of step 1 to step 4, and whole with movement by the client When end judges that its validated user is equal with the authentication index of current operator, client goes to step 7 with mobile terminal;It is described When client judges that the authentication index of its validated user and current operator are unequal with mobile terminal, client's mobile terminal Current operator is forbidden to perform the operation of input logistics Air Way Bill No. on client's mobile terminal;
Step 7, client is handled with mobile terminal for the logistics Air Way Bill No. that current operator is inputted, and being formed has step The new logistics Air Way Bill No. of the multiple of carrier image number in 5 obtains the M groups number with group number number;Wherein, the client uses Mobile terminal processing inputs logistics Air Way Bill No. and includes the following steps 7-1 and step 7-2 to obtain the process of new logistics Air Way Bill No.:
Step 7-1, when client's mobile terminal judges inputted logistics Air Way Bill No. for the multiple of the carrier image number, client Current logistics Air Way Bill No. is divided into M groups according to sequencing from left to right with mobile terminal;
Step 7-2, client with mobile terminal to judge inputted logistics Air Way Bill No. be not the multiple of the carrier image number when, institute It states client and carries out zero padding processing in the leftmost side of the logistics Air Way Bill No. with mobile terminal, so that zero padding treated logistics fortune Odd numbers is the multiple of the carrier image number, and then by client, with mobile terminal, by zero padding, treated that logistics Air Way Bill No. is pressed again M groups are divided into according to sequencing from left to right;
Step 8, client with mobile terminal to each width carrier image in the carrier image sequence according to priority from left to right Order is numbered successively, obtains several numbered carrier images of tool of the preset number;
Step 9, client is digital according to corresponding order is numbered by the obtained M groups with mobile terminal, successively by each group number It is embedded into carrier image sequence in the carrier image of reference numeral, and it is embedding using the corresponding encryption secret key pair of the carrier image There is the load figure image encryption of number, correspondence obtains the embedding close image of the preset number;
Step 10, client sends out each embedding close image with mobile terminal according to the logistics waybill inquiry instruction of current operator Logistics management platform is given, it then again will corresponding each embedding close figure after the prefixed time interval being successfully transmitted after all embedding close images The decryption secret key of picture is sent to logistics management platform;Wherein, for same embedding close image, decryption secret key is with encrypting secret key phase Together;
Step 11, logistics management platform is decrypted using each decryption secret key of reception for corresponding each embedding close image, with The embedded number into embedding close image, and according to sequence integration from left to right, obtain decryption logistics Air Way Bill No., and also original place Reason obtains the organic stream Air Way Bill No. that client is inputted with the current operator at mobile terminal;
Wherein, when decryption logistics Air Way Bill No. leftmost side bit digital is digital zero, it is most left that the logistics management platform deletes this The digital zero of digital zero and its rear position of position on side position, until there is nonzero digit, and with processing after Current state Air Way Bill No. as organic stream Air Way Bill No.;Decryption logistics Air Way Bill No. leftmost side bit digital is not digital zero When, then using current waybill number as organic stream Air Way Bill No.;
Step 12, the organic stream Air Way Bill No. that logistics management platform is obtained according to reduction treatment is inquired about, and will be corresponding The real-time logistics information of the organic stream Air Way Bill No. feeds back to client's mobile terminal.
2. the intelligent encryption method of logistics information according to claim 1, which is characterized in that the client is with mobile terminal Smart mobile phone or tablet computer.
3. the intelligent encryption method of logistics information according to claim 1, which is characterized in that the organic stream Air Way Bill No. is The number of 13.
CN201711467002.1A 2017-12-29 2017-12-29 Intelligent encryption method for logistics information Active CN108062481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711467002.1A CN108062481B (en) 2017-12-29 2017-12-29 Intelligent encryption method for logistics information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711467002.1A CN108062481B (en) 2017-12-29 2017-12-29 Intelligent encryption method for logistics information

Publications (2)

Publication Number Publication Date
CN108062481A true CN108062481A (en) 2018-05-22
CN108062481B CN108062481B (en) 2021-06-29

Family

ID=62140781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711467002.1A Active CN108062481B (en) 2017-12-29 2017-12-29 Intelligent encryption method for logistics information

Country Status (1)

Country Link
CN (1) CN108062481B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286831A (en) * 2018-10-08 2019-01-29 宁波大学 A kind of intelligent video wireless security connection control method
CN111639348A (en) * 2020-05-14 2020-09-08 瀚高基础软件股份有限公司 Management method and device of database keys
CN112288447A (en) * 2020-10-30 2021-01-29 北京每日优鲜电子商务有限公司 Article information display method and device, electronic equipment and computer readable medium
CN112668955A (en) * 2020-09-03 2021-04-16 浙江万里学院 Intelligent settlement method for modern logistics expenses

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103802528A (en) * 2014-01-27 2014-05-21 辛红 Confidentiality express waybill and using method thereof
CN105184537A (en) * 2015-10-08 2015-12-23 浙江万里学院 Cloud logistics management method and system for monitoring cargo states in real time
CN105225089A (en) * 2015-10-08 2016-01-06 浙江万里学院 A kind of logistics monitoring method and system obtaining goods real time kinematics track

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103802528A (en) * 2014-01-27 2014-05-21 辛红 Confidentiality express waybill and using method thereof
CN105184537A (en) * 2015-10-08 2015-12-23 浙江万里学院 Cloud logistics management method and system for monitoring cargo states in real time
CN105225089A (en) * 2015-10-08 2016-01-06 浙江万里学院 A kind of logistics monitoring method and system obtaining goods real time kinematics track

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286831A (en) * 2018-10-08 2019-01-29 宁波大学 A kind of intelligent video wireless security connection control method
CN109286831B (en) * 2018-10-08 2021-04-16 宁波大学 Intelligent video wireless safety access control method
CN111639348A (en) * 2020-05-14 2020-09-08 瀚高基础软件股份有限公司 Management method and device of database keys
CN112668955A (en) * 2020-09-03 2021-04-16 浙江万里学院 Intelligent settlement method for modern logistics expenses
CN112668955B (en) * 2020-09-03 2023-09-22 浙江万里学院 Modern logistics cost intelligent settlement method
CN112288447A (en) * 2020-10-30 2021-01-29 北京每日优鲜电子商务有限公司 Article information display method and device, electronic equipment and computer readable medium

Also Published As

Publication number Publication date
CN108062481B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN108062481A (en) A kind of intelligent encryption method of logistics information
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
CN105429761B (en) A kind of key generation method and device
CN106788972B (en) Train ticket self-service ticket buying and taking system based on block chain identity authentication
CN103400082A (en) File encryption/decryption method and system
US10929849B2 (en) Method and a system for performing 3D-based identity verification of individuals with mobile devices
CN105354509B (en) The processing method and processing system of picture
WO2017012175A1 (en) Identity authentication method, identity authentication system, terminal and server
CN109816832B (en) Unlocking method and device
CN106330464A (en) Identity authentication method, device and system
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
US10282532B2 (en) Secure storage of fingerprint related elements
CN105631271B (en) Unlocking method, tripper and wearable smart machine and terminal
CN205883297U (en) Number of account login system based on people&#39;s face and fingerprint identification
CN107864124A (en) A kind of end message method for security protection, terminal and bluetooth lock
CN105262733A (en) Fingerprint authentication method, cloud server, fingerprint identification method and terminal
CN105139205A (en) Payment verification method, terminal and server
CN108270962A (en) terminal and its method for controlling camera operation
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN109906626A (en) The messaging sessions of safety
CN104537539A (en) Method for activating and forbidding anti-counterfeit label based on two-dimension code recognition technology
CN104835039A (en) Data label generation method
US11586717B2 (en) Method and electronic device for authenticating a user
CN105653993A (en) Password inputting method, apparatus and electronic device
CN100429957C (en) Indentifying method for telecommunication smart card and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant