CN108710931B - Mailing address information privacy protection method based on two-dimensional code - Google Patents

Mailing address information privacy protection method based on two-dimensional code Download PDF

Info

Publication number
CN108710931B
CN108710931B CN201810423981.9A CN201810423981A CN108710931B CN 108710931 B CN108710931 B CN 108710931B CN 201810423981 A CN201810423981 A CN 201810423981A CN 108710931 B CN108710931 B CN 108710931B
Authority
CN
China
Prior art keywords
address
mail
receiver
information
address information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810423981.9A
Other languages
Chinese (zh)
Other versions
CN108710931A (en
Inventor
李晓东
杨金林
刘晶
金鑫
赵耿
张克君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
School Of Electronic Technology Central Office Of Communist Party Of China
Original Assignee
School Of Electronic Technology Central Office Of Communist Party Of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by School Of Electronic Technology Central Office Of Communist Party Of China filed Critical School Of Electronic Technology Central Office Of Communist Party Of China
Priority to CN201810423981.9A priority Critical patent/CN108710931B/en
Publication of CN108710931A publication Critical patent/CN108710931A/en
Application granted granted Critical
Publication of CN108710931B publication Critical patent/CN108710931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

A mailing address information privacy protection method based on two-dimensional code comprises the following working processes: (1) a software tool locally generates a random verification code at a user, generates hierarchical nested encrypted address information A according to the address and the verification code, and displays the verification code for the user to send to a receiver; (2) the two-dimensional code A is attached to the surface of the package; (3) scanning the two-dimensional code and decrypting the corresponding address part in the A by each level of sorting equipment of the mail transmitting party to obtain a next level address; (4) the terminal submitter scans the two-dimensional code and decrypts the two-dimensional code by using special reading equipment to obtain the terminal address, the contact telephone and the verification code of the mail receiver; (5) the deliverer and the mail receiver can perform mutual authentication through the authentication code; (6) the contact telephone decrypted by the special reading equipment is invisible and can only be dialed or sent by a terminal submitter. The invention can prevent the unauthorized party from obtaining the address information except the service requirement, and is used for protecting the address information from being illegally obtained and utilized.

Description

Mailing address information privacy protection method based on two-dimensional code
Technical Field
The invention relates to the field of information security, in particular to a mailing address information privacy protection method based on two-dimensional codes.
Background
The rapid development of the Internet has led to online electronic shopping becoming one of the main shopping modes in people's daily life. The online electronic shopping needs to deliver commodities to the hands of users through express delivery. The traditional method is to stick the address information of the user on the surface of the package, which may cause the leakage of sensitive information of the user, such as the specific living position, mobile phone number and name of the user, which may be utilized by lawless persons to gain the trust of the user so as to cheat or hijack the user, or be obtained by other people for advertising.
The invention aims to enhance the safety of the use of sensitive address information, particularly enhance the protection of the sensitive address information in the logistics process and prevent the sensitive address information from being acquired by others for illegal purposes.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method for protecting logistics address information. The method can prevent the address information of the user from being illegally stolen in the logistics process.
The technical problem to be solved by the invention can be realized by the following technical scheme: a mail address information privacy protection method based on two-dimensional codes is used for protecting address information from being illegally acquired and utilized, and comprises the following working procedures:
(1) according to the method, the address is embedded and encrypted in a grading manner according to the grade to generate the two-dimensional code, so that different authorized parties can only see part of address information which is required to be seen by the service, and the privacy of the address can be protected from being illegally obtained and utilized;
(2) the hierarchical nested encryption adopts a public key encryption technology, a user can encrypt address information according to a public key, and only a decoding module with a corresponding private key is held to decrypt and obtain the address information;
(3) the hierarchical nested encryption uses the public key corresponding to the previous address to encrypt the next address, so that the decoding module with the private key corresponding to the previous address can correctly decrypt and obtain the next address in the mail transmission process.
By adopting the method, after the special reading equipment used by the submitter of the terminal address decrypts and obtains the terminal address, the contact telephone of the mail receiver can not be displayed and only dialing or sending short messages can be carried out, so that the contact telephone of the receiver can not be revealed to anyone.
By adopting the method, the receiver of the mail can verify whether the person who delivers the mail at home is a legal logistics person or not by the VA part of the verification code which is transmitted to the terminal address of the receiver of the mail by a mail sender through a network or other modes.
By adopting the method, the deliverer of the mail terminal address can verify whether the person receiving the mail is a legal mail receiver or not by using the verification code VB in the terminal address.
The mail delivery mode comprises the following steps: express delivery, parcel mailing, and cargo logistics transportation.
The public key encryption technology adds a random number with a fixed length after an encrypted plaintext is encrypted before encryption, then encrypts the plaintext, and removes the random number added at the last after decryption to obtain a real plaintext, so that exhaustive attack on address information can be prevented.
A mailing address information privacy protection method based on two-dimensional codes specifically comprises the following steps:
(1) a software tool locally generates a random verification code at a user, generates hierarchical nested encrypted address information A according to the address and the verification code, and displays the verification code for the user to send to a receiver;
(2) the two-dimensional code A is attached to the surface of the package;
(3) scanning the two-dimensional code and decrypting the corresponding address part in the A by each level of sorting equipment of the mail transmitting party to obtain a next level address;
(4) the terminal submitter scans the two-dimensional code and decrypts the two-dimensional code by using special reading equipment to obtain the terminal address, the contact telephone and the verification code of the mail receiver;
(5) the deliverer and the mail receiver can perform mutual authentication through the authentication code;
(6) the contact telephone decrypted by the special reading equipment is invisible and can only be dialed or sent by a terminal submitter.
Compared with the prior art, the invention has the advantages that:
(1) the invention adopts public key encryption technology, users can encrypt their address information by using published public keys before mailing, only a decoding module provided with private keys distributed by relevant departments of the country or a trust center of a third party can decrypt the address information, and the private keys in the decoding module can not be exported and copied, so that the method has the characteristics of linearity, high protection strength, independence from express companies and capability of tracing afterwards.
(2) The invention divides the address information of the mail into a plurality of parts according to the physical distribution address level (such as country, province and city), adopts different keys for encryption, and different postmen can only decrypt the address part which is needed to be known by the business in the process of mail delivery, thereby the granularity of privacy protection is thinner.
Drawings
FIG. 1 is a schematic diagram of hierarchical nested encryption;
FIG. 2 is a schematic diagram of a dedicated reading device;
FIG. 3 is a schematic illustration of mailing address encryption.
Detailed Description
The invention is further described with reference to the following figures and detailed description.
A user's logistics receiving address information is encrypted and then pasted on the surface of a mail package in a two-dimensional code mode, only a special reading device with a decryption key can read the two-dimensional code and decrypt to obtain a mail address information plaintext, the mail address information plaintext is divided into a plurality of parts according to logistics address grades, as shown in figure 1, different keys are adopted for hierarchical nested encryption, and in the whole logistics mailing process, different middle sorting or terminal decoding modules can only decrypt respective address parts. The logistics address level is established according to the geographical area and adopts a tree structure.
The typical working process of the method is as follows:
(1) before a user sends a mail (such as after shopping on the internet), a software tool locally generates a random verification code, wherein the verification code can be a number, a character, a Chinese character or a pattern, the verification code is divided into two parts VA and VB, and the user stores the verification code and sends the verification code to a mail receiver (the mail receiver can also be the user) through a network or other modes for later authentication. Meanwhile, the software tool generates hierarchical nested encrypted address information according to the verification code and the input mailing address, the address is divided into a plurality of levels from large to small, such as country, province, city, district and terminal information, wherein the terminal information comprises the terminal address (such as a district, a building number and a room number), contact information (such as a contact telephone and a name of a user) and the verification code. When generating hierarchical nested encrypted address information, terminal information A is used first0Upper address A of1Corresponding public key encrypts end information to obtain C0Reuse of A1Upper address A of2Corresponding public key handle A1Encrypted to obtain C1Then using A2Upper address A of3Corresponding public key handle A2Encrypted to obtain C2By analogy, the address A is finally setn-1Upper address A of (e.g. country)nCorresponding (e.g. global) public key holder An-1Encrypted to obtain Cn-1And a isnAnd Cn-1、Cn-2、...、C1Together form a, which is not encrypted because the top-level address An sensitivity is negligible;
(2) the user transmits the A to a sender (such as a merchant), and the sender converts the A into a two-dimensional code by using a tool and pastes the two-dimensional code on the surface of a package to be delivered to a transmitter (such as a logistics enterprise);
(3) the processing equipment of the conveying side firstly scans the two-dimensional code on the surface of the package to obtain AnAnd Cn-1Then has AnDecryption C of decoding module of corresponding private keyn-1Obtaining An-1And transporting the package to An-1Address to An-1After the address, has An-1The decoding module of the corresponding private key decrypts through the decryption Cn-2Obtain a Secondary Address An-2Thereby, it is possible to obtainAnd so on until the package is shipped to address A1
(4)A1The address submitter uses a dedicated reading device which, by having a corresponding A1The decoding module of the private key corresponding to the address decrypts through the decryption C1The method comprises the steps of obtaining terminal information of a mail receiver, wherein a contact telephone contained in the terminal information can only be used for a presenter to dial or send a short message to the mail receiver (the contact telephone presenter is not visible specifically) through a special reading device, the presenter finds the mail receiver according to a terminal address, proves that the sender is a legal presenter of a package by showing a verification code VA, and can be used for the recipient to verify that the receiver is the legal presenter of the package before opening a door, and meanwhile, the presenter can verify that the current receiver is legal through the verification code VB.
In the above steps, the encryption of the logistics address adopts an asymmetric encryption algorithm, that is, the encrypted key and the decrypted key are different and cannot be derived from each other, wherein the encrypted key is public and is called a public key, and the decrypted key is secret and is called a private key. When the asymmetric cipher algorithm is used for encryption, a random number with a fixed length is added to an encrypted plaintext, then the encrypted plaintext is encrypted, and after decryption, the random number added at the last is removed to obtain a real plaintext.
In the above step, the verification code is optional, that is, the user may let the software tool generate the verification code in step (1) and use it for the bidirectional authentication between the presenter and the mail receiver in step (4), or may select only the VA part or VB part of the generated verification code and perform the unidirectional authentication between the presenter and the mail receiver in step (4), or may select not to generate the verification code and not perform the authentication in step (4).
In step (4), as shown in fig. 2, the special reading device used by the submitter may be composed of a two-dimensional code scanning module, a decoding module, a communication module, an input module, a screen display module, and a control processing module. The two-dimensional code scanning module is used for scanning the two-dimensional code, the decoding module is used for decrypting information obtained by scanning by using a private key of the decoding module, the communication module is used for communicating with a mobile phone and a fixed telephone of a mail receiver, and the input module, the screen display module and the control processing module are respectively used for inputting, displaying information and controlling the whole. The dedicated reading device has fingerprint or password protection to ensure that its user is the intended user of the transmitting party.
And (3) safety analysis:
(1) because the mail posting address is encrypted locally by a software tool by using the public key corresponding to each level of corresponding address, an unauthorized person (including a sales platform) cannot decrypt the address information of the mail receiver.
(2) Because the mail posting address adopts hierarchical nested encryption, no matter the sorting equipment or the sorter in the logistics process or the deliverer of the terminal, only the information which is required to be obtained by each logistics service can be obtained, but other address information which is not required to be obtained cannot be obtained. Specifically, the sorting equipment or the sorter can only obtain the address of the next level of the address where the sorting equipment or the sorter is located, but cannot obtain the address information of the next level, and the sorting equipment or the sorter cannot decrypt the mail address information beyond the address range where the sorting equipment or the sorter is located (for example, the sorting equipment or the sorter in Henan province cannot decrypt the address information mailed to Hebei province).
(3) Because the private key in the decoding module can not be exported from the decoding module through normal operation or illegal means once being written in, even if many decoding modules have the private key corresponding to the same address, logistics company personnel can not copy the decoding module or obtain the private key to bypass the decoding module to carry out the decryption operation of the mail address.
(4) Since the special reading device used by the submitter of the terminal address cannot display the contact telephone of the mail receiver and can only dial or send short messages, the contact telephone of the receiver cannot be revealed to anyone.
(5) Because the verification code is randomly generated by the software tool locally by the user, the receiver can verify that the mail delivered to the door is legal logistics personnel by using the VA part in the verification code, so that illegal personnel can be prevented from cheating the trust of the receiver into the house or other private spaces by the logistics personnel, or cheating by using counterfeit packages; by using the VB part in the verification code, the submitter of the terminal address can verify whether the person receiving the mail is a legal mail receiver, so as to avoid falsely claiming the mail.
(6) The encryption algorithm of the address information is encrypted by adopting an asymmetric encryption algorithm, and since addresses at all levels are possibly exhausted, such as province and city addresses, an illegal attacker can acquire real address information by utilizing exhaustion attack, namely, a public key is used for encrypting all possible addresses and comparing the addresses with the encrypted addresses to be attacked, but in the previous step, when the asymmetric encryption algorithm is used for encryption, a random number with a fixed length is added after the encrypted plaintext, then encryption is carried out, the random number added at the last is removed after decryption to acquire the real plaintext, so that the attacker cannot utilize the public key to encrypt and compare the possible address information to acquire the real address information, and the encryption of the address information can resist the previous exhaustion attack.
(7) Because the decoding module must be authenticated by relevant national departments or a third-party trust center and has a unique number, the decoding module can be ensured to be only taken by legal logistics companies or personnel with professional qualifications. And because the decoding equipment can only carry out decryption operation and can not derive the private key, the private key can not be revealed.
(8) Sensitive information evidences contacted by the decoding modules can be stored in the remote server at regular time, so that if a mail posting address of a user is leaked, which decoding module is contacted with the information can be tracked according to the address, and related logistics personnel can be tracked.
To illustrate that the method of the present invention can be implemented, a specific implementation in a home shopping express scenario is shown in fig. 3.
The third party trust center formulates address lists of all levels of express delivery addresses except terminal addresses according to three levels of provinces (or direct prefecture cities), cities (or regions) and streets, wherein the province (or direct prefecture cities) level addresses comprise: hebei province, Henan province, Jilin province, Shandong province, Shanxi province, Beijing City, Shanghai City, etc., and the city (or district) level address includes: zhengzhou city, three gorges city, Anyang city, Shenyang city, Dalian city, Beijing Haishen district, Beijing Chaoyang district, etc., and the block level addresses include: the third-party trust center generates a public and private key pair corresponding to each address according to an RSA asymmetric cryptographic algorithm with 1024-bit cipher text length for each address, and finally, the third-party trust center issues address lists at all levels and corresponding public keys thereof.
The express company submits the decoding module to a third-party trust center and declares the working address of the decoding module, and the third-party trust center injects the unique number and the private key corresponding to the working address of the decoding module into the decoding module after authenticating that the decoding module meets the safety requirement of the third-party trust center. For example: if the address of the decoding module is Beijing city, it has a private key corresponding to Beijing city, and it can decrypt and obtain the addresses of the areas in Beijing city in the logistics address by using the private key.
The user appoints the mail address, the input end address and the contact information through the address lists of all levels and selects whether to need the verification code, the tool software generates the mail address information of hierarchical nested encryption, and simultaneously the tool software displays the generated verification code to the user. The user stores the verification code, if the user does not receive the mail, the verification code is sent to the mail receiver through the network or other ways, and the user sends the encrypted mail address information to the merchant. The encrypted mail address information has the following format: the first level address number is a country number (no encryption, 1 byte), the second level address number (a number in province or the city of the direct jurisdiction) is encrypted by a public key corresponding to the first level address after being added with 128 bits of random numbers, the ciphertext is 1024 bits and occupies 128 bytes, the third level address number is similar to the fourth level address number in encryption, the tail end information is encrypted by a public key corresponding to the fourth level address (the number in the street) after being added with 128 bits of random numbers, the ciphertext is 1024 bits and occupies 128 bytes, wherein the tail end information is not more than 80 Chinese characters, letters and numbers (maximally 160 bytes) and consists of 4 parts, the first part is address detailed information, the second part is mail receiver names (not more than 10 Chinese characters and maximally 20 bytes), the third part is mail receiver numbers (11 decimal digits, 11 bytes), the fourth part is verification codes (4 bytes, 1-2 bytes are VA part and 3-4 bytes are VB part), so the total length of the encrypted mail address information is 513 bytes.
The merchant converts the encrypted mail address information into a two-dimensional code by using a downloaded two-dimensional code generating tool, and attaches the two-dimensional code to the surface of the package of the user commodity. Wherein the two-dimensional code may be encoded using a QRcode that is capable of holding about 2 kbytes of information and thus sufficient to hold encrypted mail address information.
After receiving the mail given by the merchant, the express company firstly scans the two-dimensional code, obtains a first-level address according to a first byte in the scanned information, decrypts a ciphertext of a second-level address by using a decoding module with a private key corresponding to the first-level address to obtain the second-level address, and sends the mail to the second-level address. The sorter or the sorting equipment of the second-level address (such as Henan province) head office obtains the third-level address by scanning the two-dimensional code and decrypting the 2 nd to 129 th bytes in the scanned information by using a decoding module (such as a decoding module with a Henan province private key) with a private key corresponding to the second-level address and removing the 16 byte (128 bits) random number attached to the tail, and so on until the street terminal courier scans the two-dimensional code on the mail by using a held special reading device, the decoding module in the special reading device has the private key corresponding to the street, so that the 386 rd and 513 th bytes in the scanned information are decrypted to obtain the terminal information. The special reading device can only display the first, second and fourth parts of the terminal information, and the third part (the mobile phone number of the mail receiver) can only be dialed or sent with short messages and cannot be seen through the display screen of the special reading device.
After the terminal courier finds the address of the mail receiver, the mail receiver can verify the validity of the terminal courier through the VA part of the inquiry verification code, and the terminal courier can verify the validity of the mail receiver through the VB part of the inquiry verification code.
The method for protecting the password realizes automatic invalidation and password protection when a decoding module is lost or people try to continue using illegally after leaving the work by a method of feeding the dog.
And the decoding module needs to upload audit information at regular time, otherwise, the decoding module fails automatically.
The decoding module has a unique key (which can be composed of multi-stage keys) of the decoding module, and regular or emergency updating of the key is realized.

Claims (6)

1. A mail address information privacy protection method based on two-dimensional codes is used for protecting address information from being illegally acquired and utilized, and is characterized in that: the method comprises the following working procedures:
(1) according to the method, the address is embedded and encrypted in a grading manner according to the grade to generate the two-dimensional code, so that different authorized parties can only see part of address information which is required to be seen by the service, and the privacy of the address can be protected from being illegally obtained and utilized; before mailing, a user locally generates a random verification code by a software tool, wherein the verification code can be a number, a character, a Chinese character or a pattern, the verification code is divided into two parts VA and VB, and the user saves one verification code and sends the verification code to a mail receiver through a network or other modes for later authentication; meanwhile, the software tool generates hierarchical nested encrypted address information according to the verification code and the input mailing address, the address is divided into a plurality of levels from large to small, the levels comprise country, province, city, district and terminal information, and the terminal information comprises a terminal address, contact information and the verification code; when generating hierarchical nested encrypted address information, terminal information A is used first0Upper address A of1Corresponding public key encrypts end information to obtain C0Reuse of A1Upper address A of2Corresponding public key handle A1Encrypted to obtain C1Then using A2Upper address A of3Corresponding public key handle A2Encrypted to obtain C2By analogy, the address A is finally setn-1Upper address A ofnCorresponding public key handle An-1Encrypted to obtain Cn-1And a isnAnd Cn-1、Cn-2、...、C1Together form a, which is not encrypted because the top-level address An sensitivity is negligible;
(2) the hierarchical nested encryption adopts a public key encryption technology, a user can encrypt address information according to a public key, and only a decoding module with a corresponding private key is held to decrypt and obtain the address information; the decoding module is authenticated by related national departments or a third-party trust center and has a unique number, so that the decoding module can be only taken by legal logistics companies or personnel with professional qualifications, and the private key cannot be derived because the decoding equipment can only carry out decryption operation, so that the private key cannot be leaked;
(3) the hierarchical nested encryption uses a public key corresponding to the previous address to encrypt the next address, so that a decoding module with a private key corresponding to the previous address can correctly decrypt and obtain the next address in the mail transmission process; the processing equipment of the conveying side firstly scans the two-dimensional code on the surface of the package to obtain AnAnd Cn-1Then has AnDecryption C of decoding module of corresponding private keyn-1Obtaining An-1And transporting the package to An-1Address to An-1After the address, has An-1The decoding module of the corresponding private key decrypts through the decryption Cn-2Obtain a Secondary Address An-2And so on until the package is shipped to address A1;A1The address submitter uses a dedicated reading device which, by having a corresponding A1The decoding module of the private key corresponding to the address decrypts through the decryption C1The method comprises the steps of obtaining terminal information of a mail receiver, wherein a contact telephone contained in the terminal information can only be used for a presenter to dial or send a short message to the mail receiver through a special reading device, the presenter finds the mail receiver according to a terminal address, the presenter proves that the presenter is a legal presenter of a package to the receiver through a presentation verification code VA, the receiver can verify that the receiver is a legal presenter of the package before opening a door, and meanwhile, the presenter can verify that the current receiver is legal through a verification code VB.
2. The two-dimensional code-based privacy protection method for mailing address information of claim 1, wherein: by adopting the method, after the special reading equipment used by the submitter of the terminal address decrypts and obtains the terminal address, the contact telephone of the mail receiver can not be displayed and only dialing or sending short messages can be carried out, so that the contact telephone of the receiver can not be revealed to anyone.
3. The two-dimensional code-based privacy protection method for mailing address information of claim 1, wherein: by adopting the method, the receiver of the mail can verify whether the person who delivers the mail at home is a legal logistics person or not by the VA part of the verification code which is transmitted to the terminal address of the receiver of the mail by a mail sender through a network or other modes.
4. The two-dimensional code-based privacy protection method for mailing address information of claim 1, wherein: by adopting the method, the deliverer of the mail terminal address can verify whether the person receiving the mail is a legal mail receiver or not by using the verification code VB in the terminal address.
5. The two-dimensional code-based privacy protection method for mailing address information of claim 1, wherein: the mail delivery method comprises the following steps: express delivery, parcel mailing, and cargo logistics transportation.
6. The two-dimensional code-based privacy protection method for mailing address information of claim 1, wherein: the public key encryption technology adds a random number with a fixed length to an encrypted plaintext before encryption, then encrypts the plaintext, and removes the random number added at the last after decryption to obtain a real plaintext, so that exhaustive attack on address information can be prevented.
CN201810423981.9A 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code Active CN108710931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810423981.9A CN108710931B (en) 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810423981.9A CN108710931B (en) 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code

Publications (2)

Publication Number Publication Date
CN108710931A CN108710931A (en) 2018-10-26
CN108710931B true CN108710931B (en) 2021-08-17

Family

ID=63867830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810423981.9A Active CN108710931B (en) 2018-05-07 2018-05-07 Mailing address information privacy protection method based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN108710931B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610096A (en) * 2019-09-04 2019-12-24 广东外语外贸大学 Express information protection method
CN115118453A (en) * 2022-05-19 2022-09-27 成都安美勤信息技术股份有限公司 Mailing sensitive information privacy protection method based on commercial cipher algorithm
CN117034326B (en) * 2023-10-08 2024-01-30 园信(北京)科技有限公司 Block chain-based super zip code using method, device and system and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
CN105354693A (en) * 2015-11-04 2016-02-24 中南大学 Logistics industry-oriented system and method for cascade protection of user privacy information

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080118070A1 (en) * 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
CN102420834A (en) * 2011-12-29 2012-04-18 公安部第三研究所 Generation and verification control method for network identity code in electronic network identity card
CN103401676B (en) * 2013-07-16 2016-06-29 中国人民解放军海军工程大学 Method based on the logistics personal information intimacy protection system of Quick Response Code
US20160192194A1 (en) * 2014-12-29 2016-06-30 Gongming Yang Secure way to build internet credit system and protect private information
CN104933371B (en) * 2015-06-04 2018-06-22 南京邮电大学 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code
CN107104969B (en) * 2017-04-27 2020-12-25 山西大学 Method for protecting personal privacy information in express by applying dynamic encryption mechanism
CN107609406A (en) * 2017-08-09 2018-01-19 南京邮电大学 A kind of express delivery address encryption method based on geocoding

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
CN105354693A (en) * 2015-11-04 2016-02-24 中南大学 Logistics industry-oriented system and method for cascade protection of user privacy information

Also Published As

Publication number Publication date
CN108710931A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN107104969B (en) Method for protecting personal privacy information in express by applying dynamic encryption mechanism
CN105719120B (en) A method of encryption express delivery list privacy information
CN104933371B (en) Logistics personal information intimacy protection system based on multi-layer security Quick Response Code
CN108229188B (en) Method for signing file and verifying file by using identification key
CN100559751C (en) False key encrypt method and system
CN1283827A (en) Universal electronic information network authentication system and method
CN108710931B (en) Mailing address information privacy protection method based on two-dimensional code
CN105354693A (en) Logistics industry-oriented system and method for cascade protection of user privacy information
CN105321054A (en) Logistic receiving and dispatching method and system capable of protecting privacy
GB2423854A (en) Portable security transaction protocol
CN105450395A (en) Information encryption and decryption processing method and system
CN107437105B (en) Multi-role full-scene NFC and QR code safe express delivery system and use method
CN105554032A (en) Identity real-name authentication method and authentication system based on express sending
CN101201886A (en) Three-he-code for recognizing commodity
US20080130876A1 (en) Method for Private-Key Encryption of Messages, and Application to an Installation
CN109660359B (en) Method and equipment for generating HD (high definition) wallet business card and method for generating HD wallet trusted address
CN107333262A (en) A kind of system and method based on CN39 code authentication phone numbers
US20100017623A1 (en) Executable software security system
CN1849774A (en) Message security
US7219229B2 (en) Protected communication system
CN110634072B (en) Block chain transaction system based on multi-signature and hardware encryption
CN105490814B (en) A kind of ticketing service real name identification method and system based on three-dimension code
KR20100114321A (en) Digital content transaction-breakdown the method thereof
CN115118453A (en) Mailing sensitive information privacy protection method based on commercial cipher algorithm
CN105933314A (en) Android system email S/MIME function support method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant