CN110390207A - A kind of shopping online personal information method for secret protection and send method with charge free - Google Patents

A kind of shopping online personal information method for secret protection and send method with charge free Download PDF

Info

Publication number
CN110390207A
CN110390207A CN201910560012.2A CN201910560012A CN110390207A CN 110390207 A CN110390207 A CN 110390207A CN 201910560012 A CN201910560012 A CN 201910560012A CN 110390207 A CN110390207 A CN 110390207A
Authority
CN
China
Prior art keywords
user
information
dimensional code
personal information
express delivery
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910560012.2A
Other languages
Chinese (zh)
Inventor
韩牟
倪佳庆
马世典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201910560012.2A priority Critical patent/CN110390207A/en
Publication of CN110390207A publication Critical patent/CN110390207A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

It the invention discloses a kind of shopping online personal information method for secret protection and sends method with charge free, belongs to encryption and decryption, information security technology, planar bar code technology and package and send field with charge free.The present invention protects the personal privacy information of corresponding buyer by public-key cryptosystem and digital certificate, verifies the legal identity of buyer, and the personal information of buyer is protected by way of encryption.The invention also provides a kind of packages to send method with charge free, so that Bidder Information realizes Information hiding to businessman, express company and courier.The present invention can be realized the secret protection of safe and reliable online transaction and personal information, effectively ensure the equity during user's shopping on the web.

Description

A kind of shopping online personal information method for secret protection and send method with charge free
Technical field
It the invention discloses a kind of shopping online personal information method for secret protection and sends method with charge free, belongs to encryption and decryption, letter Breath safe practice, planar bar code technology and package send field with charge free.
Background technique
With the continuous change of e-commerce environment, shopping at network is very fast as a kind of emerging shopping mode development Speed and bigger market is occupied on whole network platform.Especially in China, shopping at network is even more very hot.But With the development of network technology, people are using network daily, while personal information also leaves on different website platforms Trace, this also gives some criminals to leave chance to cause some losses or puzzlement to masses.
Two dimensional code is the chequered with black and white square being distributed on planar direction according to certain rules with specific geometric figure The barcode technology of new generation of shape square matrix record data symbol information, which has, to contain much information, and error correcting capability is strong, and recognition speed is fast, secrecy Property high, the characteristics such as traceability is high, and damage resistance is strong, and redundant is big, and cost is cheap.Mobile phone two-dimension code is planar bar code technology on mobile phone Application, have been widely used for invitation card at present, poster is registered, business card, direction board, the various occasions such as exploitation.If using Two dimensional code is needed when certain important events transmitting has the more demanding data of identity information, timeliness to its enciphering and deciphering algorithm It optimizes.
The maximum feature of public key algorithm is will to encrypt to separate with decryption capabilities using two association keys, one of them Key is disclosed, referred to as public-key cryptography, referred to as open key;Another key be for user it is dedicated, thus be secrecy, claim For privacy key, abbreviation secret keys, for decrypting.Therefore public-key cryptosystem is also referred to as conbined public or double key cipher system.Algorithm system has Following key property: it is computationally infeasible to solve secret keys for known cryptographic algorithm and encryption key.It is widely used in each Kind information is encrypted, and is also widely used in authentication, such as RSA technology.If using two dimensional code certain When important events transmitting has the data of identity information, then its ciphering process should be optimized in conjunction with the above encryption technology.
Consumer needs to fill in the information such as shipping address, addressee's name and phone before payment, to ensure subsequent article Transport and mailing, and businessman, the person of sending with charge free and courier undoubtedly just will appreciate that consumer's by the addressee information of express delivery Personal information, and the link that the process is related to is more, increases difficulty to the secrecy of customer profile.Businessman, express delivery Member is after knowing the individual privacy information of buyer, it is possible to threat can be taken even to make reprisals after there is dispute with buyer The behavior of buyer, to cause unthinkable hidden danger.
Summary of the invention
The present invention seeks a kind of scheme as a result, and businessman, express company and courier can be made not to know buyer's use In the case where the specific address of family, the task of delivery and dispatching is completed, not only ensure that the normal operation of express delivery, but also be able to achieve buyer's Information hiding achievees the purpose that protect Bidder Information.
It is an object of the invention to: the personal information offer by key and digital certificate to corresponding buyer in the present invention Protection, while to achieve the purpose that verify buyer's legal identity.When both parties carry out electronic transaction, by way of encryption The personal information of buyer is protected, while introducing identity of the digital certificate to verify buyer in scheme.Two dimensional code is used simultaneously Technology can make businessman, express company and courier in the case where not knowing buyer user's specific address, complete delivery With the task of dispatching, the normal operation of express delivery not only ensure that, but also be able to achieve the Information hiding of buyer, reach protection Bidder Information Purpose.
To achieve the goals above, technical solution provided in an embodiment of the present invention, comprising the following steps:
(1) user carries out the registration of personal information in trusted third party, and registration information is taken care of by third party, and third party uses A pair of of unsymmetrical key is used for identity user identity, while the private key of the user identity ID of generation, user are returned to user and handed over It gives user to save, and produces the digital certificate of the user, include the public key and user identity ID of the user in the digital certificate, Digital certificate is encrypted with third-party private key, and is sent to client for authentication.Simultaneously, user is simultaneously at this Platform application two dimensional code, only includes user mobile phone number and address information in two dimensional code, and address information only includes city where user Cell or CompanyAddress without specific number, and do not provide real name;Above-mentioned digital certificate for verifying, use by two dimensional code In protection;
(2) when single under user, the digital certificate applied and two dimensional code are issued into businessman, businessman is in the purchase for receiving user Digital certificate is decrypted with third-party public key after buying request to verify the authenticity of the certificate, if being verified, is carried out Transaction;
(3) businessman prints the two dimensional code of buyer's offer and is attached to and superscribed;
(4) dedicated reading equipment is used to logistics company transfers at different levels, scans the two-dimensional code and obtain buyer address, and will send Past next stage address, which is attached to, to be superscribed, and courier dispenses according to the address superscribed, until being sent to destination;
(5) finally, courier will be delivered to the intelligent express delivery cabinet of buyer's place cell or company fastly;
(6) intelligent express delivery cabinet extracts the cell-phone number in two dimensional code, sends short message and user is reminded to take express delivery.
(7) it after user receives express delivery, represents transaction and completes, user connects the user identity ID of oneself, payment successful information Digital certificate with oneself sends jointly to third party, and third party decrypts digital certificate, verifies the authenticity of the certificate, decrypt To plaintext in also include client account ID, to verify the identity of user, after user identity is verified, third party is true Recognize the user and paid success really, authorizes the right of evaluation to user, user completes evaluation after obtaining the right evaluated.
A kind of shopping online personal information method for secret protection according to claim 1 and send method with charge free, feature Be: the public-key cryptosystem and digital certificate are all made of improved RSA Algorithm.Improved RSA Algorithm is in specific embodiment party Case part specifically describes.
Further characteristic of the invention is: the producing method of user identity ID is the multiple personal letters for filling in user After breath is attached, the informative abstract of one section of fixed length is obtained using function, and as the identity ID of the user.
Further characteristic of the invention is: two dimensional code from the user to the platform application of two dimensional code trusted third party, it is right There should be the number of the two dimensional code, user can inquire logistics information according to the number.
Further characteristic of the invention is: the two dimensional code applied is sent out a businessman by the user, ensure that businessman Information hiding;The address is only place urban cells or CompanyAddress, without specific number, and does not provide real name, It ensure that the Information hiding to logistics company;The logistics company obtains buyer address, and the next stage address patch that will be sent to To superscribing, the Information hiding to courier ensure that.
Further characteristic of the invention is: the intelligent express delivery cabinet has the function of two-dimensional code scanning, and courier will wrap It wraps up in and is put into a grid of intelligent express delivery cabinet, while shutting grid, CPU is by the position of intelligent express delivery cabinet in intelligent express delivery cabinet It sets, number and pickup code are sent to CPU from the cell-phone number extracted in two dimensional code, to remind user to fetch express delivery.
Further characteristic of the invention is: the supplier of the intelligence express delivery cabinet possesses wechat public platform, user's concern Relevant public platform, and the cell-phone number of oneself is bound, user can receive the position of express delivery cabinet, number and pickup by wechat The information such as code.
Further characteristic of the invention is: the user does not need the pickup code that input receives, as long as opening wechat It sweeps and sweeps, scan the picking two dimensional code of intelligent express delivery cabinet, so that it may pickup.
Further characteristic of the invention is: in step (7), by evaluation by way of sending identifying code to user Right authorizes user.
Technical effect of the invention are as follows:
(1) present invention protects the personal privacy information of corresponding buyer by public-key cryptosystem and digital certificate Shield, verifies the legal identity of buyer, and the personal information of buyer is protected by way of encryption.The invention also provides a kind of packets The method of sending with charge free is wrapped up in, so that Bidder Information realizes Information hiding to businessman, express company and courier.Therefore, the present invention can be real The secret protection of now safe and reliable online transaction and personal information, has effectively ensured the power during user's shopping on the web Benefit.
(2) public-key cryptosystem and digital certificate of the present invention are all made of improved RSA Algorithm, which exists On traditional RSA Algorithm, improved for its encryption/decryption speed, make its be more suitable for the online online electronic transaction of magnanimity, Authentication, faster, real-time is good for one side speed;It on the other hand is to have higher efficiency.
Detailed description of the invention
Fig. 1 is user's registration information and the schematic diagram for obtaining digital certificate and personal user ID
Fig. 2 is the schematic diagram that trusted third party is the digital certificate that user generates.
Fig. 3 is the purchase information schematic diagram that user submits to businessman.
Fig. 4 is Merchant Authentication user identity and delivery flow chart.
Fig. 5 sends the schematic diagram until receiving with charge free for user from application two dimensional code to express delivery.
Fig. 6 is Logistics Process schematic diagram.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and in conjunction with example.
1, heretofore described public-key cryptosystem and digital certificate are all made of improved RSA Algorithm, specific to improve Scheme is as follows:
Since n is a very big integer, in key generation phase, encryption key is solved using n and is decrypted close The efficiency of the calculating speed of key is low-down.In addition, if be in plain text also a big integer during cryptographic calculation, The cryptographic calculation of so algorithm is exactly that the power of one big integer multiplies, and same decryption operation is also that the power of one big integer multiplies, this Sample, which will lead to power multiplication, becomes unusual complexity, and calculating speed is very slow.
Traditional RSA Algorithm working principle is as follows:
First, the generation of key:
(1) the Big prime p and q of two secrecy are chosen altogether;
(2) n=p*q is calculated,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) d is calculated, is metThat is d is e in mouldUnder multiplicative inverse, because e withMutually Element, according to modular arithmetic, its multiplicative inverse is certainly existed;
It (5) is open key with { e, n }, { d, n } is secret keys;
Second, encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is small In log2n.Then to each clear packets m, make cryptographic calculation: c ≡ me mod n。
Third, decryption:
Decryption operation to ciphertext block are as follows: c ≡ cd mod n。
Improved RSA Algorithm proposed by the present invention, by the understanding to traditional RSA Algorithm, algorithmic procedure can substantially divide For the following two stage:
(1) key generation phase: the security work of raw information is completed, it is necessary to key is first generated, if can be promoted The formation speed of key, so that it may reduce the execution time of algorithm, and the multiple decomposition of n is also to complete in key generation phase Improvement.
(2) encrypting stage and decryption phase: being the stage most important work to encryption of plaintext and to the decryption of ciphertext. It is multiplied by the way that plaintext M is split into multiple small prime numbers, finally carries out total product calculation again, encryption and decryption are promoted with this Speed shortens and calculates the time.
The calculating process of RSA Algorithm is made of key generation phase and encrypting and decrypting stage, it is necessary to firstly generate key It just can be carried out encryption and decryption, therefore 2 stages of algorithm are the progressive relationships of level.Algorithm total execution time is by two stages Operation time be added, i.e., key generate operation time add encryption and decryption operation time, so effectively promoted calculate Method total execution time, it is necessary to promote the operation time in the two stages.
Improved RSA Algorithm is in detailed process, and by taking ciphering process as an example, the algorithm description is as follows:
(1) m Big prime p is randomly selected1,p2,...,pm, and maintain secrecy;
(2) n=p is calculated1×p2×...×pm, φ (n)=(p1-1)×(p2-1)×...×(pm- 1), n is disclosed;
(3) positive integer an e, 1 < e < φ (n) and gcd (e, φ (n))=1 are randomly chosen, e is disclosed;
(4) according to ed ≡ 1mod (φ (n)), d is found out, and is maintained secrecy to d;
(5) open { n, e } is used as encryption key, and { n, d } is used as decruption key, secrecy p1,p2,...,pm, φ (n);
(6) plaintext M is split into multiple small integers to be multiplied, i.e. M=M1×M2×...×Mr, and M1,M2,...,MrAll It is prime number;
(7) each prime number is ranked up from small to large, i.e. M1≤M2≤...≤Mr
(8) it calculates separately: C1=M1 eModn, C2=M2 eModn ..., Cr=Mr eModn, r=1,2 ... r };
(9) total product calculation is finally carried out, the calculating of RSA cryptographic algorithms: C=C is finally completed1×C2×...×Cr
The symbol description of above-described RSA Algorithm is as shown in table 1 below:
1 symbol description of table
Sequence Symbol Symbol description
1 p Prime number
2 n The product of multiple prime numbers
3 φ(n) The Euler's function of n
4 e The integer randomly selected
5 gcd(e,φ(n)) The greatest common factor (G.C.F.) of e and φ (n)
6 {n,e} Encryption key
7 {n,d} Decruption key
8 M In plain text
9 C Ciphertext
Algorithm performance analysis: big Integer n is decomposed into multiple prime numbers and is multiplied, specific number can be arbitrary, certainly The number of the prime number of decomposition is more, and numerical value is with regard to smaller, and such computer is when carrying out operation to these prime numbers Improve calculating speed.In addition, the multiple prime numbers decomposited in algorithm, increase the decomposition difficulty of modulus n, improve the peace of algorithm Quan Xing.
Be experimentally confirmed: as n=2048bit, the decryption time of 4 decomposition algorithms of modulus n is traditional RSA Algorithm 2.69 times of decryption time are 1.90 times of 3 decomposition algorithms of modulus n, and specific data are as shown in table 2 below:
The table 2:RSA encryption and decryption time compares
Experiment numbers Traditional RSA 3 decomposition are carried out to n 4 decomposition are carried out to n
1 0.1317 0.0899 0.0483
2 0.1296 0.0915 0.0475
3 0.1301 0.0934 0.0493
Encryption and decryption time average (ms) 0.1304 0.0916 0.0483
According to the data of upper table, it is recognised that repeatedly being decomposed in key generation phase to n, RSA calculation can be shortened The calculating time of method, keep its more efficient.
By the way that traditional RSA Algorithm is optimized and improved, the encryption/decryption speed of RSA Algorithm can be effectively promoted, so that The improved RSA Algorithm has better efficiency in online online electronic transaction of the present invention, authentication.
2, user's registration information
User can register on corresponding transaction platform first, and registration information includes personal information such as telephone number Deng.These information will be stored in the User Information Database of trusted third party.As shown in Fig. 1, trusted third party is user A pair of of unsymmetrical key is generated, a unique random User ID, production method is the multiple personal information for filling in user After being attached, the informative abstract of one section of fixed length is obtained using function, the identity ID as the user.
3, trusted third party is the digital certificate that user generates
Trusted third party is that registration user generates unique User ID, a pair of of public key and private key.As shown in Fig. 2, by account Family ID and client public key link together and are encrypted with the private key of trusted third party, generate digital certificate, resulting The private key of digital certificate and account ID, user obtain information together as user and pass to user.
4, user submits personal purchase information to businessman
After buyer is logined successfully using the user identity of oneself, it may browse through commodity, after selecting commodity click purchase, system The digital certificate of order information and user can be passed to businessman together, as shown in Fig. 3.Page jump is to page of transferring accounts simultaneously Corresponding funds on account are just transferred to trusted third party later into Web bank's input personal identification number by face first.Fund is temporarily stored In intermediate transaction platform, further Transaction Information is waited.Buyer sends out the digital certificate of oneself while lower purchase order Give businessman.Businessman is in the order for receiving buyer
5, it delivers after Merchant Authentication user identity
After information and digital certificate, digital certificate is decrypted using the public key of trusted third party, such as 4 institute of attached drawing To show, User ID, public key in the cleartext information decrypted comprising buyer can verify the legal identity of user, because only that Trusted third party possesses correct private key, so the authenticity of digital certificate, integrality is also ensured.If authentication failed, Then terminate transaction.Businessman can deliver after verifying the identity of user, issue prompting message after businessman's delivery, buyer is reminded to send out Goods.After buyer receives commodity and confirmation is received or buyer has been received by commodity and is confirmed to receive within the prescribed time-limit, then trades Into confirmation payment status.Trusted third party can turn the fund that buyer before pays to pay businessman.
6, user checks express delivery real time information
In order to facilitate the position of user query express delivery, so in user to the two dimension of two dimensional code trusted third party platform application When code, while it will receive the corresponding number of the two dimensional code, user can inquire logistics information according to the number.
7, in order to realize Information hiding, the two dimensional code applied is sent out a businessman, ensure that hidden to the information of businessman by user Hiding;The address be only where urban cells or CompanyAddress, without specific number, and do not provide real name, ensure that pair The Information hiding of logistics company;The logistics company obtains buyer address, and the next stage address that will be sent to is attached to and superscribes, It ensure that the Information hiding to courier.
8, method is sent in express delivery with charge free
In order to Information hiding is better achieved, there is intelligent express delivery cabinet, almost each cell or public affairs in existing city Department is all placed with intelligent express delivery cabinet, so cell or CompanyAddress have no effect on courier and send part where only providing user, in intelligence It can be equipped with two-dimensional code scanning function in express delivery cabinet, the cell-phone number for extracting user can be scanned the two-dimensional code, and send short massage notice use Family pickup is finally signed for by intelligent express delivery cabinet so above-mentioned harvest address is enough logistics company and completes dispatching task, and buyer completes Pickup.
9, user's pickup mode
In order to preferably facilitate user, the supplier of intelligent express delivery cabinet possesses wechat public platform, and user pays close attention to relevant public affairs Many numbers, and the cell-phone number of oneself is bound, user can receive the position of express delivery cabinet, the letter such as number and pickup code by wechat Breath.And the pickup code that input receives is not needed when pickup, is swept as long as opening wechat and sweeping, the picking two of intelligent express delivery cabinet is scanned Tie up code, so that it may complete pickup.
By above from user to trusted third party's registration information, to providing the information hidden through two dimensional code to businessman, Level to express delivery is sent with charge free, until receive etc. a series of step until, it is ensured that user is with regard to this trading situation to businessman Objective appraisal is carried out, even if commenting for difference, businessman can not also obtain the telephone number of buyer, address etc. in this transaction People's information can prevent businessman, courier etc. after knowing the individual privacy information of buyer, it is possible to can occur with buyer After dispute, the behavior for threatening the buyer that even makes reprisals is taken, to cause the generation of unthinkable malignant event.
Although the present invention has been described by way of example and in terms of the preferred embodiments, embodiment is not for the purpose of limiting the invention.Not In the case where being detached from the principle of the present invention and objective, any equivalent change or retouch done also belongs to protection of the invention Range.Therefore protection scope of the present invention should be based on the content defined in the claims of this application.

Claims (9)

1. a kind of shopping online personal information method for secret protection and sending method with charge free, which is characterized in that specific step is as follows:
1) user carries out the registration of personal information in trusted third party, and registration information is taken care of by third party, and third party uses a pair of Unsymmetrical key is used for identity user identity, while the private key of the user identity ID of generation, user are returned to user and give use Family saves, and produces the digital certificate of the user, includes the public key cryptography and user identity ID of the user in the digital certificate, Digital certificate is encrypted with third-party private key, and is sent to client for authentication;Simultaneously, user is simultaneously at this Platform application two dimensional code, only includes user mobile phone number and address information in two dimensional code, and address information only includes city where user Cell or CompanyAddress without specific number, and do not provide real name;Above-mentioned digital certificate for verifying, use by two dimensional code In protection;
2) when single under user, the digital certificate applied and two dimensional code are issued into businessman, businessman asks in the purchase for receiving user Digital certificate is decrypted with third-party public key cryptography to verify the authenticity of the certificate after asking, if being verified, is carried out Transaction;
3) businessman prints the two dimensional code of buyer's offer and is attached to and superscribed;
4) dedicated reading equipment is used to logistics company transfers at different levels, scans the two-dimensional code and obtains buyer address, and will be sent to Next stage address, which is attached to, to be superscribed, and courier dispenses according to the address superscribed, until being sent to destination;
5) finally, courier will be delivered to the intelligent express delivery cabinet of buyer's place cell or company fastly;
6) intelligent express delivery cabinet extracts the cell-phone number in two dimensional code, sends short message and user is reminded to take express delivery;
7) it after user receives express delivery, represents transaction and completes, user is by the user identity ID of oneself, payment successful information together with oneself Digital certificate send jointly to third party, third party decrypts digital certificate, verifies the authenticity of the certificate, that decrypts is bright It also include the account ID of client in text, to verify the identity of user, after user identity is verified, third party confirms the use Family has paid success really, authorizes the right of evaluation to user, user completes evaluation after obtaining the right evaluated.
2. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: the public key cryptography and digital certificate are all made of improved RSA Algorithm, and improved RSA Algorithm is in detailed process, with encrypted For journey, the algorithm description is as follows:
Randomly select m Big prime p1,p2,...,pm, and maintain secrecy;
Calculate the product n=p of multiple prime numbers1×p2×...×pmAnd the Euler's function φ (n) of n=(p1-1)×(p2-1) ×...×(pm- 1), n is disclosed;
The greatest common factor (G.C.F.) gcd (e, φ (n))=1 of positive integer an e, 1 < e < φ (n) and e and φ (n) are randomly chosen, it will E is disclosed;
According to 1 mod of ed ≡ (φ (n)), d is found out, and is maintained secrecy to d;
Open { n, e } is used as encryption key, and { n, d } is used as decruption key, secrecy p1,p2,...,pm, φ (n);
Plaintext M is split into multiple small integers to be multiplied, i.e. M=M1×M2×...×Mr, and M1,M2,...,MrIt is all prime number;
Each prime number is ranked up from small to large, i.e. M1≤M2≤...≤Mr
It calculates separately: C1=M1 eModn, C2=M2 eModn ..., Cr=Mr eModn, r=1,2 ... r };
Total product calculation is finally carried out, the calculating ciphertext of RSA cryptographic algorithms: C=C is finally completed1×C2×...×Cr
3. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: the producing method of user identity ID are as follows: after the multiple personal information for filling in user are attached, use Hash Hash function H=H (M) obtains the eap-message digest of one section of fixed length, and as the identity ID of user;Wherein, Hash Hash function is not to With the input message of length, the output of regular length is generated, the output of this regular length is known as " hash " of former input message Or " eap-message digest ", M indicate the message of random length, H indicates Hash (Hash) function or hash function or hash function, h table Show the cryptographic Hash of regular length.
4. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: user is corresponding with the number of the two dimensional code to the two dimensional code of two dimensional code trusted third party platform application, and user can be according to the volume Number inquiry logistics information.
5. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: the two dimensional code applied is issued businessman by the user, guarantees the Information hiding to businessman;The address guarantees to logistics public affairs The Information hiding of department;The logistics company obtains buyer address, and the next stage address that will be sent to is attached to and superscribes, guarantee pair The Information hiding of courier.
6. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: the intelligent express delivery cabinet has the function of two-dimensional code scanning, and package is put into a grid of intelligent express delivery cabinet by courier, While shutting grid, in intelligent express delivery cabinet CPU by the position of intelligent express delivery cabinet, number and pickup code, be sent to CPU from On the cell-phone number extracted in two dimensional code, to remind user to fetch express delivery.
7. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: the supplier of the intelligence express delivery cabinet possesses wechat public platform, and user pays close attention to relevant public platform, and binds the mobile phone of oneself Number, user can receive the position of express delivery cabinet, the information such as number and pickup code by wechat.
8. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: the user does not need the pickup code that input receives, and sweeps as long as opening wechat and sweeping, and scans the picking two of intelligent express delivery cabinet Tie up code, so that it may pickup.
9. a kind of shopping online personal information method for secret protection according to claim 1 and sending method with charge free, feature exists In: by way of sending identifying code to user authorize the right of evaluation to user.
CN201910560012.2A 2019-06-26 2019-06-26 A kind of shopping online personal information method for secret protection and send method with charge free Pending CN110390207A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910560012.2A CN110390207A (en) 2019-06-26 2019-06-26 A kind of shopping online personal information method for secret protection and send method with charge free

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910560012.2A CN110390207A (en) 2019-06-26 2019-06-26 A kind of shopping online personal information method for secret protection and send method with charge free

Publications (1)

Publication Number Publication Date
CN110390207A true CN110390207A (en) 2019-10-29

Family

ID=68285570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910560012.2A Pending CN110390207A (en) 2019-06-26 2019-06-26 A kind of shopping online personal information method for secret protection and send method with charge free

Country Status (1)

Country Link
CN (1) CN110390207A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080211A (en) * 2019-12-30 2020-04-28 宁波市永恒的鸟笼软件科技有限公司 Logistics information identification method based on two-dimensional code
CN111404690A (en) * 2020-02-19 2020-07-10 江苏大学 Express personal privacy protection and identity verification method based on zero-knowledge proof
CN111404952A (en) * 2020-03-24 2020-07-10 中国南方电网有限责任公司 Transformer substation data encryption transmission method and device, computer equipment and storage medium
CN112651682A (en) * 2020-12-08 2021-04-13 重庆华宜佳热能科技有限公司 Order distribution method, device and system
CN113256902A (en) * 2020-02-27 2021-08-13 深圳怡化电脑股份有限公司 Safe input method, equipment, system and storage medium of sensitive information
CN113473360A (en) * 2021-06-25 2021-10-01 湖北工业大学 Privacy protection distribution service system and method based on location service
CN113645582A (en) * 2021-06-03 2021-11-12 北京航空航天大学 Logistics privacy protection system based on ciphertext policy attribute-based key encapsulation
CN115549909A (en) * 2022-11-28 2022-12-30 南京知麦信息科技有限公司 Efficient agricultural traceability data uplink method based on optimized RSA encryption algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714455A (en) * 2013-12-20 2014-04-09 江苏大学 Personal information protection method for C2C electronic trading platform
CN105871552A (en) * 2016-06-14 2016-08-17 天津大学 Double-core parallel RSA password processing method and coprocessor
CN106211108A (en) * 2016-07-13 2016-12-07 西安邮电大学 A kind of message encryption method based on RSA PKI
CN107733648A (en) * 2017-10-30 2018-02-23 武汉大学 The RSA digital signature generation method and system of a kind of identity-based
CN108596534A (en) * 2018-03-19 2018-09-28 南京交通职业技术学院 It is a kind of protection privacy information net purchase send method with charge free

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714455A (en) * 2013-12-20 2014-04-09 江苏大学 Personal information protection method for C2C electronic trading platform
CN105871552A (en) * 2016-06-14 2016-08-17 天津大学 Double-core parallel RSA password processing method and coprocessor
CN106211108A (en) * 2016-07-13 2016-12-07 西安邮电大学 A kind of message encryption method based on RSA PKI
CN107733648A (en) * 2017-10-30 2018-02-23 武汉大学 The RSA digital signature generation method and system of a kind of identity-based
CN108596534A (en) * 2018-03-19 2018-09-28 南京交通职业技术学院 It is a kind of protection privacy information net purchase send method with charge free

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080211A (en) * 2019-12-30 2020-04-28 宁波市永恒的鸟笼软件科技有限公司 Logistics information identification method based on two-dimensional code
CN111404690A (en) * 2020-02-19 2020-07-10 江苏大学 Express personal privacy protection and identity verification method based on zero-knowledge proof
CN113256902A (en) * 2020-02-27 2021-08-13 深圳怡化电脑股份有限公司 Safe input method, equipment, system and storage medium of sensitive information
CN111404952A (en) * 2020-03-24 2020-07-10 中国南方电网有限责任公司 Transformer substation data encryption transmission method and device, computer equipment and storage medium
CN112651682A (en) * 2020-12-08 2021-04-13 重庆华宜佳热能科技有限公司 Order distribution method, device and system
CN113645582A (en) * 2021-06-03 2021-11-12 北京航空航天大学 Logistics privacy protection system based on ciphertext policy attribute-based key encapsulation
CN113645582B (en) * 2021-06-03 2023-05-12 北京航空航天大学 Logistics privacy protection system based on ciphertext policy attribute base key encapsulation
CN113473360A (en) * 2021-06-25 2021-10-01 湖北工业大学 Privacy protection distribution service system and method based on location service
CN113473360B (en) * 2021-06-25 2022-04-29 湖北工业大学 Privacy protection distribution service system and method based on location service
CN115549909A (en) * 2022-11-28 2022-12-30 南京知麦信息科技有限公司 Efficient agricultural traceability data uplink method based on optimized RSA encryption algorithm
CN115549909B (en) * 2022-11-28 2023-03-10 南京知麦信息科技有限公司 Efficient agricultural traceability data chaining method based on optimized RSA encryption algorithm

Similar Documents

Publication Publication Date Title
CN110390207A (en) A kind of shopping online personal information method for secret protection and send method with charge free
CN111095332B (en) Method and system for protecting private social media advertisements
US6311171B1 (en) Symmetrically-secured electronic communication system
JP4116971B2 (en) Crypto system for group signature
CN103116851B (en) The method and system that electronic contract is concluded online
US6708893B2 (en) Multiple-use smart card with security features and method
CN109687963A (en) Anti- quantum calculation alliance chain method of commerce and system based on public key pond
WO2020051710A1 (en) System and process for managing digitized security tokens
WO1998052316A1 (en) Initial secret key establishment including facilities for verification of identity
CN109479001A (en) Exit passageway is established
Ray et al. A fair-exchange e-commerce protocol with automated dispute resolution
US7620585B2 (en) Electronic contract system
Akinyede et al. Development of a secure mobile e-banking system
Yang et al. Practical escrow protocol for bitcoin
CN113779594A (en) Data distribution sharing method and system based on block chain
CN1845164A (en) Fair safe electronic exchange method without third party
Lee et al. Traceability of double spending in secure electronic cash system
Blancaflor et al. A Case Study of using Cryptography for the Improvement of Data Security in E-commerce Industry in the Philippines
CN114565382A (en) Transaction account anonymous payment method and system
Hu et al. Verifying privacy-preserving financing orders on a consortium blockchain based on zk-snarks
Chang et al. A highly efficient and secure electronic cash system based on secure sharing in cloud environment
KR20190119294A (en) Cryptocurrency hardware wallet for authenticating interlocked transaction and method thereof
CN114998018B (en) Electric futures transaction futures guarantee deposit management method based on blockchain and cryptographic algorithm
CN115205020A (en) Recommendation method and related device for bank decoration credit
Elkamchouchi An Improvement to the SET Protocol Based On Signcryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191029

RJ01 Rejection of invention patent application after publication