CN109460672A - A kind of order encryption method of online shopping mall - Google Patents
A kind of order encryption method of online shopping mall Download PDFInfo
- Publication number
- CN109460672A CN109460672A CN201811228581.9A CN201811228581A CN109460672A CN 109460672 A CN109460672 A CN 109460672A CN 201811228581 A CN201811228581 A CN 201811228581A CN 109460672 A CN109460672 A CN 109460672A
- Authority
- CN
- China
- Prior art keywords
- order
- encryption
- user
- password
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
Abstract
The invention discloses a kind of order encryption methods of online shopping mall; this method comprises: being order encryption by using the mode that family is encryption order setting password; after user selects the order for needing to encrypt; the information of the encryption order of user's selection is hidden; the problem of order information for being not desired to be seen by other people so as to avoid user is seen by other people in all cases, preferably protects the privacy of user.
Description
(1) technical field
The present invention relates to field of computer technology, specifically, the present invention relates to a kind of order encryption sides of online shopping mall
Method.
(2) background technique
With the fast development of internet, this shopping way of shopping online increasingly has been favored by people, and more
Come more people using also will appear many problems while shopping online, wherein confidentiality be exactly one allow very much people pay close attention to
Problem, when user uses online shopping mall it is possible that such case: orders of some purchase commodity of user are not want to allow him
What people saw, but worry to lend other people in mobile phone, other people it is close from oneself when these order informations can be seen by people, touch
The privacy of user is violated.
(3) summary of the invention
Technical problem: the object of the present invention is to provide a kind of order encryption methods, to solve user to the guarantor of certain orders
Close property demand, avoids user and does not want the problem of goods orders for allowing other people to see are seen by other people, protect the privacy of user.
Technical solution:
The order encryption method of the online shopping mall proposed according to the present invention, includes the following steps:
The password of step 1) setting encryption order: being that password is arranged in the order for needing to encrypt by user, system saves user
The encryption order password of setting;
Step 2) selection encryption order: the order for needing to encrypt is selected by user;
The concealed encrypted order of step 3): user in step 2 is selected the order encrypted is needed to encrypt;
Optionally further comprising: user can select the order for needing to encrypt in the order list, but be not limited only to this place.
Optionally further comprising: in each place that can be encrypted for order, each order information corresponds to an order and adds
Close mark, user can select to need the order encrypted or user that can touch by special gesture by the trigger action to mark
The order that hair operation or input spcial character selection need to encrypt, but the method for needing the order encrypted is selected to be not limited only to these
Method.
Optionally, after the order for selecting needs to encrypt user encrypts, further includes: in the order list
Hide the information for the order that the needs that user selects encrypt.
Optionally, after the order for selecting needs to encrypt user encrypts, further includes: display encryption order
Mark, to prompt user to there is the order of encryption, but the mode for the order for prompting user to there is encryption is not limited only to this mode.
Optionally, after the display encrypts order note identification, further includes: receive user and encrypt order mark to the display
The trigger action of knowledge, and show based on the trigger action order of all encryptions.
Optionally further comprising: after obtaining user to the triggering of display encryption order note identification, show Password Input frame, and receive
The password that user inputs in the Password Input frame, and the encryption order password of the judgement password received and system preservation
It is whether consistent, if the two unanimously if show encrypted order.
Optionally, after the display encrypted order, further includes: display encryption order list, in lists
Show the information of all encryption orders.
Optionally, after the display encrypted order, further includes: the corresponding display one of each encryption order takes
Disappear order encryption identification, to remind user that can cancel the encrypted state of the corresponding encryption order of mark, but is not limited only to this mode.
Optionally, after the display suppression order encryption identification, further includes: receive user and ordered to any encryption
The trigger action of single corresponding encryption identification of cancelling an order, and corresponding encryption cancellation of order will be identified based on the trigger action
Encryption.
Optionally, it is described will identify the encryption of corresponding encryption cancellation of order after, further includes: show in the order list
The information for identifying corresponding encryption order removes the information of corresponding encryption order in encryption order list.
The utility model has the advantages that
The order encryption method of online shopping mall of the invention, by selecting the order information of encryption to be hidden user,
The order information that encryption only can be just shown when inputting proper password, efficiently solves user to the secrecy of certain orders
Property demand, preferably protects the privacy of user.
(4) Detailed description of the invention
Fig. 1 is the flow diagram of the order encryption method of online shopping mall of the present invention.
(5) specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing:
As shown in Figure 1, encrypting order cipher leaf in setting, there is the input frame of input encryption order password, for user setting
Crypted password, and provide ACK button, clicks ACK button after the good password of user setting, if the password of user's input meet it is close
Code rule, then system saves password of this password as encryption order, if not meeting password rule, user password is prompted not conform to
Reason needs to change password.After setting password, user can see that each order information item includes one in the order list page
A corresponding button for being added to encryption order, if user clicks this button, system will hide this in information list page and order
Single item of information, the order encrypted in this way will not be shown in the order list.
Further, system provides the button of encryption order, if user wants to see encryption order or wants to release
The hidden state of order is encrypted, user clicks encryption Order button, and system can prompt user to input encryption order password, Yong Huru
Fruit has input correctly encryption order password, then can enter encryption order list page, user can see encrypted herein
Order information, and each encrypted order item corresponding one releases the button that order encrypts, if some encryption of user is ordered
This button of individual event, then the order list page will show this order information item again, and this encryption will be removed by encrypting order page
Item of information.
Above by description of listed embodiment, the basic ideas and basic principles of the present invention are elaborated.But this hair
It is bright to be not limited to above-mentioned listed embodiment.It is all based on equivalent variations made by technical solution of the present invention, improve and deliberately
Equal behaviors are deteriorated, are within the scope of protection of the invention.
Claims (11)
1. a kind of order encryption method of online shopping mall, which comprises the steps of:
The password of step 1) setting encryption order: being that password is arranged in the order for needing to encrypt by user, system saves user setting
Encryption order password;
Step 2) selection encryption order: the order for needing to encrypt is selected by user;
The concealed encrypted order of step 3): user in step 2 is selected the order encrypted is needed to be hidden.
2. the method according to claim 1, wherein further include: user can select to need to add in the order list
Close order, but it is not limited only to this place.
3. the method according to claim 1, wherein further include: in each place that can be encrypted for order, often
The mark of the corresponding order encryption of a order information, user can select to need what is encrypted to order by the trigger action to mark
List or user can be operated or be inputted the order that spcial character selection needs to encrypt by special gesture trigger, but select to need to add
The method of close order is not limited only to these methods.
4. the method according to claim 1, wherein selecting the order for needing to encrypt progress hidden user described
After hiding, further includes: hide the information for the order that the needs that user selects encrypt in the order list.
5. the method according to claim 1, wherein selecting the order for needing to encrypt progress hidden user described
After hiding, further includes: display encryption order note identification to prompt user to there is the order of encryption, but prompts user to there is encryption
The mode of order is not limited only to this mode.
6. according to the method described in claim 5, it is characterized in that, after the display encrypts order note identification, further includes: connect
User is received to the trigger action of the display encryption order note identification, and shows the order of all encryptions based on the trigger action.
7. according to the method described in claim 6, it is characterized by further comprising: obtaining user to display encryption order note identification
It after triggering, shows Password Input frame, and receives the password that user inputs in the Password Input frame, and judgement receives
Whether password and the encryption order password that system saves consistent, if the two unanimously if show encrypted order.
8. the method according to the description of claim 7 is characterized in that after the display encrypted order, further includes:
Display encryption order list shows the information of all encryption orders in lists.
9. the method according to the description of claim 7 is characterized in that after the display encrypted order, further includes:
Each encryption order one encryption identification of cancelling an order of corresponding display, to remind user that can cancel the corresponding encryption order of mark
Encrypted state, but it is not limited only to this mode.
10. according to the method described in claim 9, it is characterized in that, also being wrapped after the display suppression order encryption identification
It includes: receiving user to any trigger action for encrypting the corresponding encryption identification of cancelling an order of order, and be based on the triggering
Operation will identify corresponding encryption cancellation of order encryption.
11. according to the method described in claim 10, it is characterized in that, corresponding encryption cancellation of order encryption will be identified described
Later, further includes: show the information for identifying corresponding encryption order in the order list, remove and correspond in encryption order list
Encryption order information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811228581.9A CN109460672A (en) | 2018-10-18 | 2018-10-18 | A kind of order encryption method of online shopping mall |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811228581.9A CN109460672A (en) | 2018-10-18 | 2018-10-18 | A kind of order encryption method of online shopping mall |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109460672A true CN109460672A (en) | 2019-03-12 |
Family
ID=65608105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811228581.9A Pending CN109460672A (en) | 2018-10-18 | 2018-10-18 | A kind of order encryption method of online shopping mall |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109460672A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815312A (en) * | 2020-06-24 | 2020-10-23 | 霓检有限公司 | Payment method and device and payee server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594589A (en) * | 2009-06-30 | 2009-12-02 | 中兴通讯股份有限公司 | Be used to protect the method and system of privacy of user |
CN104463004A (en) * | 2013-09-24 | 2015-03-25 | 北京三星通信技术研究有限公司 | Method and device for protecting interface content |
CN107169819A (en) * | 2017-04-28 | 2017-09-15 | 杭州集盒网络技术有限公司 | Purchaser record methods of exhibiting based on credible friend |
CN107944978A (en) * | 2017-12-18 | 2018-04-20 | 徐州汇尔康食品有限公司 | A kind of electric business order management system |
-
2018
- 2018-10-18 CN CN201811228581.9A patent/CN109460672A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594589A (en) * | 2009-06-30 | 2009-12-02 | 中兴通讯股份有限公司 | Be used to protect the method and system of privacy of user |
CN104463004A (en) * | 2013-09-24 | 2015-03-25 | 北京三星通信技术研究有限公司 | Method and device for protecting interface content |
CN107169819A (en) * | 2017-04-28 | 2017-09-15 | 杭州集盒网络技术有限公司 | Purchaser record methods of exhibiting based on credible friend |
CN107944978A (en) * | 2017-12-18 | 2018-04-20 | 徐州汇尔康食品有限公司 | A kind of electric business order management system |
Non-Patent Citations (1)
Title |
---|
黄冬经: "基于加密和签名的订单算法设计与实现", 《福建电脑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815312A (en) * | 2020-06-24 | 2020-10-23 | 霓检有限公司 | Payment method and device and payee server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103116851B (en) | The method and system that electronic contract is concluded online | |
EP3207464B1 (en) | Method, device, terminal, and server for verifying security of service operation | |
KR101652625B1 (en) | Security authentification system for membership login of online website and method thereof | |
US20160260091A1 (en) | Universal wallet for digital currency | |
CN104270517B (en) | Information ciphering method and mobile terminal | |
CN108370314A (en) | Use the secure storage of data and the device of retrieval | |
EP3584994A1 (en) | Differential client-side encryption of information originating from a client | |
WO2018089143A1 (en) | Methods for securely storing sensitive data on mobile device | |
US9219609B2 (en) | Method and system for multiple passcode generation | |
JP2011513839A (en) | System and method for conducting wireless money transactions | |
CN110210246A (en) | A kind of personal data method of servicing and system based on safety calculating | |
CN103458382A (en) | Hardware encryption transmission and storage method and system of mobile phone private short messages | |
CN103929307A (en) | Password input method, intelligent secret key device and client device | |
CN108880791A (en) | Cryptographic key protection method, terminal and computer readable storage medium | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
US11251936B2 (en) | System and method for performing homomorphic aggregation over encrypted data | |
CN104115440A (en) | Preventing pattern recognition in electronic code book encryption | |
CN104573548A (en) | Information encryption and decryption methods and devices and terminal | |
CN107016302A (en) | Computer network system for preventing input data from being recorded | |
CN106648583A (en) | Information processing method and terminal | |
US10909264B2 (en) | Personal data providing system, personal data providing method, and information processing apparatus | |
WO2017050152A1 (en) | Password security system adopted by mobile apparatus and secure password entering method thereof | |
US11438156B2 (en) | Method and system for securing data | |
CN109936546A (en) | Data encryption storage method and device and calculating equipment | |
CN109460672A (en) | A kind of order encryption method of online shopping mall |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190312 |
|
WD01 | Invention patent application deemed withdrawn after publication |