CN110390207A - A kind of shopping online personal information method for secret protection and send method with charge free - Google Patents
A kind of shopping online personal information method for secret protection and send method with charge free Download PDFInfo
- Publication number
- CN110390207A CN110390207A CN201910560012.2A CN201910560012A CN110390207A CN 110390207 A CN110390207 A CN 110390207A CN 201910560012 A CN201910560012 A CN 201910560012A CN 110390207 A CN110390207 A CN 110390207A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- dimensional code
- personal information
- express delivery
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000011156 evaluation Methods 0.000 claims description 6
- 239000000284 extract Substances 0.000 claims description 2
- 238000010408 sweeping Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 9
- 238000000354 decomposition reaction Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000003306 harvesting Methods 0.000 description 1
- 230000003211 malignant effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Medical Informatics (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
It the invention discloses a kind of shopping online personal information method for secret protection and sends method with charge free, belongs to encryption and decryption, information security technology, planar bar code technology and package and send field with charge free.The present invention protects the personal privacy information of corresponding buyer by public-key cryptosystem and digital certificate, verifies the legal identity of buyer, and the personal information of buyer is protected by way of encryption.The invention also provides a kind of packages to send method with charge free, so that Bidder Information realizes Information hiding to businessman, express company and courier.The present invention can be realized the secret protection of safe and reliable online transaction and personal information, effectively ensure the equity during user's shopping on the web.
Description
Technical field
It the invention discloses a kind of shopping online personal information method for secret protection and sends method with charge free, belongs to encryption and decryption, letter
Breath safe practice, planar bar code technology and package send field with charge free.
Background technique
With the continuous change of e-commerce environment, shopping at network is very fast as a kind of emerging shopping mode development
Speed and bigger market is occupied on whole network platform.Especially in China, shopping at network is even more very hot.But
With the development of network technology, people are using network daily, while personal information also leaves on different website platforms
Trace, this also gives some criminals to leave chance to cause some losses or puzzlement to masses.
Two dimensional code is the chequered with black and white square being distributed on planar direction according to certain rules with specific geometric figure
The barcode technology of new generation of shape square matrix record data symbol information, which has, to contain much information, and error correcting capability is strong, and recognition speed is fast, secrecy
Property high, the characteristics such as traceability is high, and damage resistance is strong, and redundant is big, and cost is cheap.Mobile phone two-dimension code is planar bar code technology on mobile phone
Application, have been widely used for invitation card at present, poster is registered, business card, direction board, the various occasions such as exploitation.If using
Two dimensional code is needed when certain important events transmitting has the more demanding data of identity information, timeliness to its enciphering and deciphering algorithm
It optimizes.
The maximum feature of public key algorithm is will to encrypt to separate with decryption capabilities using two association keys, one of them
Key is disclosed, referred to as public-key cryptography, referred to as open key;Another key be for user it is dedicated, thus be secrecy, claim
For privacy key, abbreviation secret keys, for decrypting.Therefore public-key cryptosystem is also referred to as conbined public or double key cipher system.Algorithm system has
Following key property: it is computationally infeasible to solve secret keys for known cryptographic algorithm and encryption key.It is widely used in each
Kind information is encrypted, and is also widely used in authentication, such as RSA technology.If using two dimensional code certain
When important events transmitting has the data of identity information, then its ciphering process should be optimized in conjunction with the above encryption technology.
Consumer needs to fill in the information such as shipping address, addressee's name and phone before payment, to ensure subsequent article
Transport and mailing, and businessman, the person of sending with charge free and courier undoubtedly just will appreciate that consumer's by the addressee information of express delivery
Personal information, and the link that the process is related to is more, increases difficulty to the secrecy of customer profile.Businessman, express delivery
Member is after knowing the individual privacy information of buyer, it is possible to threat can be taken even to make reprisals after there is dispute with buyer
The behavior of buyer, to cause unthinkable hidden danger.
Summary of the invention
The present invention seeks a kind of scheme as a result, and businessman, express company and courier can be made not to know buyer's use
In the case where the specific address of family, the task of delivery and dispatching is completed, not only ensure that the normal operation of express delivery, but also be able to achieve buyer's
Information hiding achievees the purpose that protect Bidder Information.
It is an object of the invention to: the personal information offer by key and digital certificate to corresponding buyer in the present invention
Protection, while to achieve the purpose that verify buyer's legal identity.When both parties carry out electronic transaction, by way of encryption
The personal information of buyer is protected, while introducing identity of the digital certificate to verify buyer in scheme.Two dimensional code is used simultaneously
Technology can make businessman, express company and courier in the case where not knowing buyer user's specific address, complete delivery
With the task of dispatching, the normal operation of express delivery not only ensure that, but also be able to achieve the Information hiding of buyer, reach protection Bidder Information
Purpose.
To achieve the goals above, technical solution provided in an embodiment of the present invention, comprising the following steps:
(1) user carries out the registration of personal information in trusted third party, and registration information is taken care of by third party, and third party uses
A pair of of unsymmetrical key is used for identity user identity, while the private key of the user identity ID of generation, user are returned to user and handed over
It gives user to save, and produces the digital certificate of the user, include the public key and user identity ID of the user in the digital certificate,
Digital certificate is encrypted with third-party private key, and is sent to client for authentication.Simultaneously, user is simultaneously at this
Platform application two dimensional code, only includes user mobile phone number and address information in two dimensional code, and address information only includes city where user
Cell or CompanyAddress without specific number, and do not provide real name;Above-mentioned digital certificate for verifying, use by two dimensional code
In protection;
(2) when single under user, the digital certificate applied and two dimensional code are issued into businessman, businessman is in the purchase for receiving user
Digital certificate is decrypted with third-party public key after buying request to verify the authenticity of the certificate, if being verified, is carried out
Transaction;
(3) businessman prints the two dimensional code of buyer's offer and is attached to and superscribed;
(4) dedicated reading equipment is used to logistics company transfers at different levels, scans the two-dimensional code and obtain buyer address, and will send
Past next stage address, which is attached to, to be superscribed, and courier dispenses according to the address superscribed, until being sent to destination;
(5) finally, courier will be delivered to the intelligent express delivery cabinet of buyer's place cell or company fastly;
(6) intelligent express delivery cabinet extracts the cell-phone number in two dimensional code, sends short message and user is reminded to take express delivery.
(7) it after user receives express delivery, represents transaction and completes, user connects the user identity ID of oneself, payment successful information
Digital certificate with oneself sends jointly to third party, and third party decrypts digital certificate, verifies the authenticity of the certificate, decrypt
To plaintext in also include client account ID, to verify the identity of user, after user identity is verified, third party is true
Recognize the user and paid success really, authorizes the right of evaluation to user, user completes evaluation after obtaining the right evaluated.
A kind of shopping online personal information method for secret protection according to claim 1 and send method with charge free, feature
Be: the public-key cryptosystem and digital certificate are all made of improved RSA Algorithm.Improved RSA Algorithm is in specific embodiment party
Case part specifically describes.
Further characteristic of the invention is: the producing method of user identity ID is the multiple personal letters for filling in user
After breath is attached, the informative abstract of one section of fixed length is obtained using function, and as the identity ID of the user.
Further characteristic of the invention is: two dimensional code from the user to the platform application of two dimensional code trusted third party, it is right
There should be the number of the two dimensional code, user can inquire logistics information according to the number.
Further characteristic of the invention is: the two dimensional code applied is sent out a businessman by the user, ensure that businessman
Information hiding;The address is only place urban cells or CompanyAddress, without specific number, and does not provide real name,
It ensure that the Information hiding to logistics company;The logistics company obtains buyer address, and the next stage address patch that will be sent to
To superscribing, the Information hiding to courier ensure that.
Further characteristic of the invention is: the intelligent express delivery cabinet has the function of two-dimensional code scanning, and courier will wrap
It wraps up in and is put into a grid of intelligent express delivery cabinet, while shutting grid, CPU is by the position of intelligent express delivery cabinet in intelligent express delivery cabinet
It sets, number and pickup code are sent to CPU from the cell-phone number extracted in two dimensional code, to remind user to fetch express delivery.
Further characteristic of the invention is: the supplier of the intelligence express delivery cabinet possesses wechat public platform, user's concern
Relevant public platform, and the cell-phone number of oneself is bound, user can receive the position of express delivery cabinet, number and pickup by wechat
The information such as code.
Further characteristic of the invention is: the user does not need the pickup code that input receives, as long as opening wechat
It sweeps and sweeps, scan the picking two dimensional code of intelligent express delivery cabinet, so that it may pickup.
Further characteristic of the invention is: in step (7), by evaluation by way of sending identifying code to user
Right authorizes user.
Technical effect of the invention are as follows:
(1) present invention protects the personal privacy information of corresponding buyer by public-key cryptosystem and digital certificate
Shield, verifies the legal identity of buyer, and the personal information of buyer is protected by way of encryption.The invention also provides a kind of packets
The method of sending with charge free is wrapped up in, so that Bidder Information realizes Information hiding to businessman, express company and courier.Therefore, the present invention can be real
The secret protection of now safe and reliable online transaction and personal information, has effectively ensured the power during user's shopping on the web
Benefit.
(2) public-key cryptosystem and digital certificate of the present invention are all made of improved RSA Algorithm, which exists
On traditional RSA Algorithm, improved for its encryption/decryption speed, make its be more suitable for the online online electronic transaction of magnanimity,
Authentication, faster, real-time is good for one side speed;It on the other hand is to have higher efficiency.
Detailed description of the invention
Fig. 1 is user's registration information and the schematic diagram for obtaining digital certificate and personal user ID
Fig. 2 is the schematic diagram that trusted third party is the digital certificate that user generates.
Fig. 3 is the purchase information schematic diagram that user submits to businessman.
Fig. 4 is Merchant Authentication user identity and delivery flow chart.
Fig. 5 sends the schematic diagram until receiving with charge free for user from application two dimensional code to express delivery.
Fig. 6 is Logistics Process schematic diagram.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and in conjunction with example.
1, heretofore described public-key cryptosystem and digital certificate are all made of improved RSA Algorithm, specific to improve
Scheme is as follows:
Since n is a very big integer, in key generation phase, encryption key is solved using n and is decrypted close
The efficiency of the calculating speed of key is low-down.In addition, if be in plain text also a big integer during cryptographic calculation,
The cryptographic calculation of so algorithm is exactly that the power of one big integer multiplies, and same decryption operation is also that the power of one big integer multiplies, this
Sample, which will lead to power multiplication, becomes unusual complexity, and calculating speed is very slow.
Traditional RSA Algorithm working principle is as follows:
First, the generation of key:
(1) the Big prime p and q of two secrecy are chosen altogether;
(2) n=p*q is calculated,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) d is calculated, is metThat is d is e in mouldUnder multiplicative inverse, because e withMutually
Element, according to modular arithmetic, its multiplicative inverse is certainly existed;
It (5) is open key with { e, n }, { d, n } is secret keys;
Second, encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is small
In log2n.Then to each clear packets m, make cryptographic calculation: c ≡ me mod n。
Third, decryption:
Decryption operation to ciphertext block are as follows: c ≡ cd mod n。
Improved RSA Algorithm proposed by the present invention, by the understanding to traditional RSA Algorithm, algorithmic procedure can substantially divide
For the following two stage:
(1) key generation phase: the security work of raw information is completed, it is necessary to key is first generated, if can be promoted
The formation speed of key, so that it may reduce the execution time of algorithm, and the multiple decomposition of n is also to complete in key generation phase
Improvement.
(2) encrypting stage and decryption phase: being the stage most important work to encryption of plaintext and to the decryption of ciphertext.
It is multiplied by the way that plaintext M is split into multiple small prime numbers, finally carries out total product calculation again, encryption and decryption are promoted with this
Speed shortens and calculates the time.
The calculating process of RSA Algorithm is made of key generation phase and encrypting and decrypting stage, it is necessary to firstly generate key
It just can be carried out encryption and decryption, therefore 2 stages of algorithm are the progressive relationships of level.Algorithm total execution time is by two stages
Operation time be added, i.e., key generate operation time add encryption and decryption operation time, so effectively promoted calculate
Method total execution time, it is necessary to promote the operation time in the two stages.
Improved RSA Algorithm is in detailed process, and by taking ciphering process as an example, the algorithm description is as follows:
(1) m Big prime p is randomly selected1,p2,...,pm, and maintain secrecy;
(2) n=p is calculated1×p2×...×pm, φ (n)=(p1-1)×(p2-1)×...×(pm- 1), n is disclosed;
(3) positive integer an e, 1 < e < φ (n) and gcd (e, φ (n))=1 are randomly chosen, e is disclosed;
(4) according to ed ≡ 1mod (φ (n)), d is found out, and is maintained secrecy to d;
(5) open { n, e } is used as encryption key, and { n, d } is used as decruption key, secrecy p1,p2,...,pm, φ (n);
(6) plaintext M is split into multiple small integers to be multiplied, i.e. M=M1×M2×...×Mr, and M1,M2,...,MrAll
It is prime number;
(7) each prime number is ranked up from small to large, i.e. M1≤M2≤...≤Mr;
(8) it calculates separately: C1=M1 eModn, C2=M2 eModn ..., Cr=Mr eModn, r=1,2 ... r };
(9) total product calculation is finally carried out, the calculating of RSA cryptographic algorithms: C=C is finally completed1×C2×...×Cr;
The symbol description of above-described RSA Algorithm is as shown in table 1 below:
1 symbol description of table
Sequence | Symbol | Symbol description |
1 | p | Prime number |
2 | n | The product of multiple prime numbers |
3 | φ(n) | The Euler's function of n |
4 | e | The integer randomly selected |
5 | gcd(e,φ(n)) | The greatest common factor (G.C.F.) of e and φ (n) |
6 | {n,e} | Encryption key |
7 | {n,d} | Decruption key |
8 | M | In plain text |
9 | C | Ciphertext |
Algorithm performance analysis: big Integer n is decomposed into multiple prime numbers and is multiplied, specific number can be arbitrary, certainly
The number of the prime number of decomposition is more, and numerical value is with regard to smaller, and such computer is when carrying out operation to these prime numbers
Improve calculating speed.In addition, the multiple prime numbers decomposited in algorithm, increase the decomposition difficulty of modulus n, improve the peace of algorithm
Quan Xing.
Be experimentally confirmed: as n=2048bit, the decryption time of 4 decomposition algorithms of modulus n is traditional RSA Algorithm
2.69 times of decryption time are 1.90 times of 3 decomposition algorithms of modulus n, and specific data are as shown in table 2 below:
The table 2:RSA encryption and decryption time compares
Experiment numbers | Traditional RSA | 3 decomposition are carried out to n | 4 decomposition are carried out to n |
1 | 0.1317 | 0.0899 | 0.0483 |
2 | 0.1296 | 0.0915 | 0.0475 |
3 | 0.1301 | 0.0934 | 0.0493 |
Encryption and decryption time average (ms) | 0.1304 | 0.0916 | 0.0483 |
According to the data of upper table, it is recognised that repeatedly being decomposed in key generation phase to n, RSA calculation can be shortened
The calculating time of method, keep its more efficient.
By the way that traditional RSA Algorithm is optimized and improved, the encryption/decryption speed of RSA Algorithm can be effectively promoted, so that
The improved RSA Algorithm has better efficiency in online online electronic transaction of the present invention, authentication.
2, user's registration information
User can register on corresponding transaction platform first, and registration information includes personal information such as telephone number
Deng.These information will be stored in the User Information Database of trusted third party.As shown in Fig. 1, trusted third party is user
A pair of of unsymmetrical key is generated, a unique random User ID, production method is the multiple personal information for filling in user
After being attached, the informative abstract of one section of fixed length is obtained using function, the identity ID as the user.
3, trusted third party is the digital certificate that user generates
Trusted third party is that registration user generates unique User ID, a pair of of public key and private key.As shown in Fig. 2, by account
Family ID and client public key link together and are encrypted with the private key of trusted third party, generate digital certificate, resulting
The private key of digital certificate and account ID, user obtain information together as user and pass to user.
4, user submits personal purchase information to businessman
After buyer is logined successfully using the user identity of oneself, it may browse through commodity, after selecting commodity click purchase, system
The digital certificate of order information and user can be passed to businessman together, as shown in Fig. 3.Page jump is to page of transferring accounts simultaneously
Corresponding funds on account are just transferred to trusted third party later into Web bank's input personal identification number by face first.Fund is temporarily stored
In intermediate transaction platform, further Transaction Information is waited.Buyer sends out the digital certificate of oneself while lower purchase order
Give businessman.Businessman is in the order for receiving buyer
5, it delivers after Merchant Authentication user identity
After information and digital certificate, digital certificate is decrypted using the public key of trusted third party, such as 4 institute of attached drawing
To show, User ID, public key in the cleartext information decrypted comprising buyer can verify the legal identity of user, because only that
Trusted third party possesses correct private key, so the authenticity of digital certificate, integrality is also ensured.If authentication failed,
Then terminate transaction.Businessman can deliver after verifying the identity of user, issue prompting message after businessman's delivery, buyer is reminded to send out
Goods.After buyer receives commodity and confirmation is received or buyer has been received by commodity and is confirmed to receive within the prescribed time-limit, then trades
Into confirmation payment status.Trusted third party can turn the fund that buyer before pays to pay businessman.
6, user checks express delivery real time information
In order to facilitate the position of user query express delivery, so in user to the two dimension of two dimensional code trusted third party platform application
When code, while it will receive the corresponding number of the two dimensional code, user can inquire logistics information according to the number.
7, in order to realize Information hiding, the two dimensional code applied is sent out a businessman, ensure that hidden to the information of businessman by user
Hiding;The address be only where urban cells or CompanyAddress, without specific number, and do not provide real name, ensure that pair
The Information hiding of logistics company;The logistics company obtains buyer address, and the next stage address that will be sent to is attached to and superscribes,
It ensure that the Information hiding to courier.
8, method is sent in express delivery with charge free
In order to Information hiding is better achieved, there is intelligent express delivery cabinet, almost each cell or public affairs in existing city
Department is all placed with intelligent express delivery cabinet, so cell or CompanyAddress have no effect on courier and send part where only providing user, in intelligence
It can be equipped with two-dimensional code scanning function in express delivery cabinet, the cell-phone number for extracting user can be scanned the two-dimensional code, and send short massage notice use
Family pickup is finally signed for by intelligent express delivery cabinet so above-mentioned harvest address is enough logistics company and completes dispatching task, and buyer completes
Pickup.
9, user's pickup mode
In order to preferably facilitate user, the supplier of intelligent express delivery cabinet possesses wechat public platform, and user pays close attention to relevant public affairs
Many numbers, and the cell-phone number of oneself is bound, user can receive the position of express delivery cabinet, the letter such as number and pickup code by wechat
Breath.And the pickup code that input receives is not needed when pickup, is swept as long as opening wechat and sweeping, the picking two of intelligent express delivery cabinet is scanned
Tie up code, so that it may complete pickup.
By above from user to trusted third party's registration information, to providing the information hidden through two dimensional code to businessman,
Level to express delivery is sent with charge free, until receive etc. a series of step until, it is ensured that user is with regard to this trading situation to businessman
Objective appraisal is carried out, even if commenting for difference, businessman can not also obtain the telephone number of buyer, address etc. in this transaction
People's information can prevent businessman, courier etc. after knowing the individual privacy information of buyer, it is possible to can occur with buyer
After dispute, the behavior for threatening the buyer that even makes reprisals is taken, to cause the generation of unthinkable malignant event.
Although the present invention has been described by way of example and in terms of the preferred embodiments, embodiment is not for the purpose of limiting the invention.Not
In the case where being detached from the principle of the present invention and objective, any equivalent change or retouch done also belongs to protection of the invention
Range.Therefore protection scope of the present invention should be based on the content defined in the claims of this application.
Claims (9)
1. a kind of shopping online personal information method for secret protection and sending method with charge free, which is characterized in that specific step is as follows:
1) user carries out the registration of personal information in trusted third party, and registration information is taken care of by third party, and third party uses a pair of
Unsymmetrical key is used for identity user identity, while the private key of the user identity ID of generation, user are returned to user and give use
Family saves, and produces the digital certificate of the user, includes the public key cryptography and user identity ID of the user in the digital certificate,
Digital certificate is encrypted with third-party private key, and is sent to client for authentication;Simultaneously, user is simultaneously at this
Platform application two dimensional code, only includes user mobile phone number and address information in two dimensional code, and address information only includes city where user
Cell or CompanyAddress without specific number, and do not provide real name;Above-mentioned digital certificate for verifying, use by two dimensional code
In protection;
2) when single under user, the digital certificate applied and two dimensional code are issued into businessman, businessman asks in the purchase for receiving user
Digital certificate is decrypted with third-party public key cryptography to verify the authenticity of the certificate after asking, if being verified, is carried out
Transaction;
3) businessman prints the two dimensional code of buyer's offer and is attached to and superscribed;
4) dedicated reading equipment is used to logistics company transfers at different levels, scans the two-dimensional code and obtains buyer address, and will be sent to
Next stage address, which is attached to, to be superscribed, and courier dispenses according to the address superscribed, until being sent to destination;
5) finally, courier will be delivered to the intelligent express delivery cabinet of buyer's place cell or company fastly;
6) intelligent express delivery cabinet extracts the cell-phone number in two dimensional code, sends short message and user is reminded to take express delivery;
7) it after user receives express delivery, represents transaction and completes, user is by the user identity ID of oneself, payment successful information together with oneself
Digital certificate send jointly to third party, third party decrypts digital certificate, verifies the authenticity of the certificate, that decrypts is bright
It also include the account ID of client in text, to verify the identity of user, after user identity is verified, third party confirms the use
Family has paid success really, authorizes the right of evaluation to user, user completes evaluation after obtaining the right evaluated.
2. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: the public key cryptography and digital certificate are all made of improved RSA Algorithm, and improved RSA Algorithm is in detailed process, with encrypted
For journey, the algorithm description is as follows:
Randomly select m Big prime p1,p2,...,pm, and maintain secrecy;
Calculate the product n=p of multiple prime numbers1×p2×...×pmAnd the Euler's function φ (n) of n=(p1-1)×(p2-1)
×...×(pm- 1), n is disclosed;
The greatest common factor (G.C.F.) gcd (e, φ (n))=1 of positive integer an e, 1 < e < φ (n) and e and φ (n) are randomly chosen, it will
E is disclosed;
According to 1 mod of ed ≡ (φ (n)), d is found out, and is maintained secrecy to d;
Open { n, e } is used as encryption key, and { n, d } is used as decruption key, secrecy p1,p2,...,pm, φ (n);
Plaintext M is split into multiple small integers to be multiplied, i.e. M=M1×M2×...×Mr, and M1,M2,...,MrIt is all prime number;
Each prime number is ranked up from small to large, i.e. M1≤M2≤...≤Mr;
It calculates separately: C1=M1 eModn, C2=M2 eModn ..., Cr=Mr eModn, r=1,2 ... r };
Total product calculation is finally carried out, the calculating ciphertext of RSA cryptographic algorithms: C=C is finally completed1×C2×...×Cr。
3. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: the producing method of user identity ID are as follows: after the multiple personal information for filling in user are attached, use Hash Hash function
H=H (M) obtains the eap-message digest of one section of fixed length, and as the identity ID of user;Wherein, Hash Hash function is not to
With the input message of length, the output of regular length is generated, the output of this regular length is known as " hash " of former input message
Or " eap-message digest ", M indicate the message of random length, H indicates Hash (Hash) function or hash function or hash function, h table
Show the cryptographic Hash of regular length.
4. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: user is corresponding with the number of the two dimensional code to the two dimensional code of two dimensional code trusted third party platform application, and user can be according to the volume
Number inquiry logistics information.
5. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: the two dimensional code applied is issued businessman by the user, guarantees the Information hiding to businessman;The address guarantees to logistics public affairs
The Information hiding of department;The logistics company obtains buyer address, and the next stage address that will be sent to is attached to and superscribes, guarantee pair
The Information hiding of courier.
6. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: the intelligent express delivery cabinet has the function of two-dimensional code scanning, and package is put into a grid of intelligent express delivery cabinet by courier,
While shutting grid, in intelligent express delivery cabinet CPU by the position of intelligent express delivery cabinet, number and pickup code, be sent to CPU from
On the cell-phone number extracted in two dimensional code, to remind user to fetch express delivery.
7. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: the supplier of the intelligence express delivery cabinet possesses wechat public platform, and user pays close attention to relevant public platform, and binds the mobile phone of oneself
Number, user can receive the position of express delivery cabinet, the information such as number and pickup code by wechat.
8. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: the user does not need the pickup code that input receives, and sweeps as long as opening wechat and sweeping, and scans the picking two of intelligent express delivery cabinet
Tie up code, so that it may pickup.
9. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists
In: by way of sending identifying code to user authorize the right of evaluation to user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910560012.2A CN110390207A (en) | 2019-06-26 | 2019-06-26 | A kind of shopping online personal information method for secret protection and send method with charge free |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910560012.2A CN110390207A (en) | 2019-06-26 | 2019-06-26 | A kind of shopping online personal information method for secret protection and send method with charge free |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110390207A true CN110390207A (en) | 2019-10-29 |
Family
ID=68285570
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910560012.2A Pending CN110390207A (en) | 2019-06-26 | 2019-06-26 | A kind of shopping online personal information method for secret protection and send method with charge free |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110390207A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080211A (en) * | 2019-12-30 | 2020-04-28 | 宁波市永恒的鸟笼软件科技有限公司 | Logistics information identification method based on two-dimensional code |
CN111404690A (en) * | 2020-02-19 | 2020-07-10 | 江苏大学 | Express personal privacy protection and identity verification method based on zero-knowledge proof |
CN111404952A (en) * | 2020-03-24 | 2020-07-10 | 中国南方电网有限责任公司 | Transformer substation data encryption transmission method and device, computer equipment and storage medium |
CN112651682A (en) * | 2020-12-08 | 2021-04-13 | 重庆华宜佳热能科技有限公司 | Order distribution method, device and system |
CN113256902A (en) * | 2020-02-27 | 2021-08-13 | 深圳怡化电脑股份有限公司 | Safe input method, equipment, system and storage medium of sensitive information |
CN113473360A (en) * | 2021-06-25 | 2021-10-01 | 湖北工业大学 | Privacy protection distribution service system and method based on location service |
CN113645582A (en) * | 2021-06-03 | 2021-11-12 | 北京航空航天大学 | Logistics privacy protection system based on ciphertext policy attribute-based key encapsulation |
CN115549909A (en) * | 2022-11-28 | 2022-12-30 | 南京知麦信息科技有限公司 | Efficient agricultural traceability data uplink method based on optimized RSA encryption algorithm |
US12125054B2 (en) | 2019-09-25 | 2024-10-22 | Valideck International Corporation | System, devices, and methods for acquiring and verifying online information |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103714455A (en) * | 2013-12-20 | 2014-04-09 | 江苏大学 | Personal information protection method for C2C electronic trading platform |
CN105871552A (en) * | 2016-06-14 | 2016-08-17 | 天津大学 | Double-core parallel RSA password processing method and coprocessor |
CN106211108A (en) * | 2016-07-13 | 2016-12-07 | 西安邮电大学 | A kind of message encryption method based on RSA PKI |
CN107733648A (en) * | 2017-10-30 | 2018-02-23 | 武汉大学 | The RSA digital signature generation method and system of a kind of identity-based |
CN108596534A (en) * | 2018-03-19 | 2018-09-28 | 南京交通职业技术学院 | It is a kind of protection privacy information net purchase send method with charge free |
-
2019
- 2019-06-26 CN CN201910560012.2A patent/CN110390207A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103714455A (en) * | 2013-12-20 | 2014-04-09 | 江苏大学 | Personal information protection method for C2C electronic trading platform |
CN105871552A (en) * | 2016-06-14 | 2016-08-17 | 天津大学 | Double-core parallel RSA password processing method and coprocessor |
CN106211108A (en) * | 2016-07-13 | 2016-12-07 | 西安邮电大学 | A kind of message encryption method based on RSA PKI |
CN107733648A (en) * | 2017-10-30 | 2018-02-23 | 武汉大学 | The RSA digital signature generation method and system of a kind of identity-based |
CN108596534A (en) * | 2018-03-19 | 2018-09-28 | 南京交通职业技术学院 | It is a kind of protection privacy information net purchase send method with charge free |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12125054B2 (en) | 2019-09-25 | 2024-10-22 | Valideck International Corporation | System, devices, and methods for acquiring and verifying online information |
CN111080211A (en) * | 2019-12-30 | 2020-04-28 | 宁波市永恒的鸟笼软件科技有限公司 | Logistics information identification method based on two-dimensional code |
CN111404690A (en) * | 2020-02-19 | 2020-07-10 | 江苏大学 | Express personal privacy protection and identity verification method based on zero-knowledge proof |
CN113256902A (en) * | 2020-02-27 | 2021-08-13 | 深圳怡化电脑股份有限公司 | Safe input method, equipment, system and storage medium of sensitive information |
CN111404952A (en) * | 2020-03-24 | 2020-07-10 | 中国南方电网有限责任公司 | Transformer substation data encryption transmission method and device, computer equipment and storage medium |
CN112651682A (en) * | 2020-12-08 | 2021-04-13 | 重庆华宜佳热能科技有限公司 | Order distribution method, device and system |
CN113645582A (en) * | 2021-06-03 | 2021-11-12 | 北京航空航天大学 | Logistics privacy protection system based on ciphertext policy attribute-based key encapsulation |
CN113645582B (en) * | 2021-06-03 | 2023-05-12 | 北京航空航天大学 | Logistics privacy protection system based on ciphertext policy attribute base key encapsulation |
CN113473360A (en) * | 2021-06-25 | 2021-10-01 | 湖北工业大学 | Privacy protection distribution service system and method based on location service |
CN113473360B (en) * | 2021-06-25 | 2022-04-29 | 湖北工业大学 | Privacy protection distribution service system and method based on location service |
CN115549909A (en) * | 2022-11-28 | 2022-12-30 | 南京知麦信息科技有限公司 | Efficient agricultural traceability data uplink method based on optimized RSA encryption algorithm |
CN115549909B (en) * | 2022-11-28 | 2023-03-10 | 南京知麦信息科技有限公司 | Efficient agricultural traceability data chaining method based on optimized RSA encryption algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110390207A (en) | A kind of shopping online personal information method for secret protection and send method with charge free | |
CN111095332B (en) | Method and system for protecting private social media advertisements | |
US6311171B1 (en) | Symmetrically-secured electronic communication system | |
US7673144B2 (en) | Cryptographic system for group signature | |
CN103116851B (en) | The method and system that electronic contract is concluded online | |
US6708893B2 (en) | Multiple-use smart card with security features and method | |
CN109687963A (en) | Anti- quantum calculation alliance chain method of commerce and system based on public key pond | |
WO2020073715A1 (en) | Two-dimensional code anti-counterfeiting method, device and system based on security application | |
WO2020051710A1 (en) | System and process for managing digitized security tokens | |
CN109479001A (en) | Exit passageway is established | |
WO1998052316A1 (en) | Initial secret key establishment including facilities for verification of identity | |
Ray et al. | A fair-exchange e-commerce protocol with automated dispute resolution | |
US7620585B2 (en) | Electronic contract system | |
Yang et al. | Practical escrow protocol for bitcoin | |
Akinyede et al. | Development of a secure mobile e-banking system | |
CN114565382A (en) | Transaction account anonymous payment method and system | |
CN113779594A (en) | Data distribution sharing method and system based on block chain | |
CN1845164A (en) | Fair safe electronic exchange method without third party | |
Blancaflor et al. | A Case Study of using Cryptography for the Improvement of Data Security in E-commerce Industry in the Philippines | |
Lee et al. | Traceability of double spending in secure electronic cash system | |
Hu et al. | Verifying privacy-preserving financing orders on a consortium blockchain based on zk-snarks | |
Chang et al. | A highly efficient and secure electronic cash system based on secure sharing in cloud environment | |
CN111768266A (en) | Shopping system for commodities in shopping mall based on block chain and 5G network technology | |
CN114998018B (en) | Electric futures transaction futures guarantee deposit management method based on blockchain and cryptographic algorithm | |
CN115205020A (en) | Recommendation method and related device for bank decoration credit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191029 |
|
RJ01 | Rejection of invention patent application after publication |