CN111753333A - Method and system for identity authentication - Google Patents

Method and system for identity authentication Download PDF

Info

Publication number
CN111753333A
CN111753333A CN202010648604.2A CN202010648604A CN111753333A CN 111753333 A CN111753333 A CN 111753333A CN 202010648604 A CN202010648604 A CN 202010648604A CN 111753333 A CN111753333 A CN 111753333A
Authority
CN
China
Prior art keywords
information
user
sender
identity
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010648604.2A
Other languages
Chinese (zh)
Inventor
马俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yisheng Beijing Technology Co ltd
Original Assignee
Yisheng Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yisheng Beijing Technology Co ltd filed Critical Yisheng Beijing Technology Co ltd
Publication of CN111753333A publication Critical patent/CN111753333A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The invention relates to an identity authentication method, which comprises the following steps: receiving an authorization request of a user, wherein the user comprises a receiver and/or a sender; according to the request, establishing a corresponding relation between the bill of the user and the personal information of an authorizer; receiving an identity authentication request, wherein the identity authentication request has a corresponding relation with the document; the invention can be compatible with the requirement of user generation and collection in all directions, and also provides an identity verification system.

Description

Method and system for identity authentication
The application is a divisional application with application number 201910820803.4 and entitled method and system for protecting privacy of online shopping and/or express delivery.
Technical Field
The invention relates to the field of identity authentication, in particular to an identity authentication method and system.
Background
With the development of science and technology, along with the increasing living standard of people, the consumption demand of people is also extended from full eating and warming to deeper level, and the safety of information is one of the requirements; the environment also strengthens attention and protection to the demand, and the consumption demand can be obviously seen to be the progress of complying with science and technology and the trend of times no matter the legislation of the macroscopic environment on personal information protection reaches the development of personal information protection technology in the microscopic industry and then reaches the popularization of electronic identity cards, biological identification, code scanning authentication and privacy waybill application; for this reason, various industries set up their own industry rules, such as electronic identity cards of the ministry of public security, biological identification of network macros, two-dimensional code identification and the like, but the above industry rules cannot be applied to any industry and any environment, and form a unified specification, such as authentication of the receipt of articles in the distribution industry, which relates to different environments, such as couriers, express cabinets, express cars, unmanned planes, robots and collection points; it relates to different industries, such as express delivery, logistics, take-out; the system relates to different relations, such as one-to-one relation, for example, one pickup corresponds to one article, one-to-many relation, for example, one pickup corresponds to a plurality of articles, many-to-many relation, for example, the situation that 11.11 campus articles are paved, a plurality of pickers correspond to a plurality of articles, and the authentication of article sign-in is also in conflict with the collection in the traditional sign-in mode, and meanwhile, the data storage form of online shopping and/or express delivery is a specific storage form including a single number and user information.
It can be seen that the existing online shopping and/or express delivery has at least the following defects:
firstly, the method comprises the following steps: because the authentication information stored in the information of the dispatched goods is only the person, and the identity authentication is only limited to the person when the goods are taken, the phenomenon tends to limit the act of collection, so that the convenience and flexibility of collection in the traditional collection mode are damaged, and the inconvenience of the consignee is greatly aggravated;
secondly, the method comprises the following steps: different signing modes are provided for different environments, such as an express cabinet can realize biological information authentication, a collection point can realize signing authentication, a courier can realize signing authentication, an express car can realize code scanning and verification, and the like, the verification method has no uniformity and no normalization, the personal information safety is difficult to guarantee, the article safety is difficult to guarantee, and the proof is difficult to be raised after being falsely led;
thirdly, the method comprises the following steps: different industries have different signing modes, for example, the logistics industry has the multiple signing modes, and takeaway is to distribute guys to sign off through the operation of a client, and the guys are further confirmed by a user after signing off, and because the signing off right of the operation is not in the hands of the user due to the fact that the link of identity verification is not available, the risk of signing off exists;
fourthly: different relations have different timeliness, one-to-one timeliness is the highest, one-to-many timeliness is the second, many-to-many timeliness is the lowest, along with the popularization of privacy lists, the increase of the number of articles can further increase the difficulty of searching for the user, and the efficiency is difficult to guarantee;
fifth, the method comprises the following steps: the data storage form of online shopping and/or express delivery is a specific storage form including a single number and user information, and the core information of the user is also leaked when the database is taken off the database.
Disclosure of Invention
In view of the above problems, the present invention provides a method for protecting privacy of online shopping and/or express delivery, which ensures that a user can authorize the behavior of others for receiving/sending, improves efficiency and experience of signing/sending, ensures the security of articles, and can implement a real-name system of delivery in hundreds of percent, and simultaneously can combine the security of information of the other person for receiving/sending and the security of data storage.
An embodiment of the present specification provides a method for privacy protection of online shopping and/or express delivery, including:
generating and/or acquiring a document, wherein the document is associated with user information and has a corresponding relation with the mark, and the mark and/or the carrier for the user information corresponds to the mark and/or the carrier for the user information; and
scanning and/or sensing and/or receiving and/or identifying the carrier; and
establishing contact with a receiver and/or a sender based on the user information; and
and carrying out identity verification on the receiver and/or the sender based on the user information.
An embodiment of the present specification provides a system for privacy protection of online shopping and/or express delivery, including:
a device for generating and/or acquiring a document, the document being associated with user information and having a correspondence with the token, the token and/or a carrier for user information corresponding thereto; and
means for scanning and/or sensing and/or receiving and/or identifying the carrier; and
means for establishing a contact with a recipient and/or a sender based on the user information; and
and the identity of the receiver and/or the sender is verified based on the user information.
The invention also proposes a computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a processor, implements the method of any one of the above.
The invention also provides a device for protecting privacy of online shopping and/or express delivery, which comprises a memory and a processor, wherein the memory stores a computer program, and the device is characterized in that the computer program realizes any one of the methods when being executed by the processor.
Drawings
The features and advantages of the present invention will be more clearly understood by reference to the accompanying drawings, which are illustrative and not to be construed as limiting the invention in any way, and in which:
fig. 1 is a flowchart illustrating steps of a privacy protection method for online shopping and/or express delivery in an embodiment of the present invention;
fig. 2 is a carrier display diagram illustrating a privacy protection method for online shopping and/or express delivery in an embodiment of the present invention;
fig. 3 is a carrier display diagram illustrating an example of a privacy protection method for online shopping and/or express delivery according to the present invention;
fig. 4 is a user information display diagram illustrating an online shopping and/or express privacy protection method according to an embodiment of the present invention;
fig. 5 shows a contact flow diagram of a privacy protection method for online shopping and/or express delivery in an embodiment of the present invention;
FIG. 6 illustrates an authentication flow diagram of a method of identity verification in an embodiment of the present invention;
fig. 7 shows an authentication flow diagram of another method of identity verification in an embodiment of the present invention.
Detailed Description
The invention is based on the authorization invention of patent number 2014107904295, fully considers the industry requirements of express real-name collection and real-name delivery, and expands and improves the application scene, application object and privacy protection.
The embodiments of the present invention will be described in further detail with reference to the accompanying drawings, it is to be understood that the specific embodiments described herein are merely illustrative of the related inventions and not restrictive, and that all other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the scope of the present invention.
It should be noted that, in the case of conflict, the embodiments and features of the embodiments of the present invention may be combined with each other, and the present invention will be described in detail with reference to the accompanying drawings and embodiments.
Fig. 1 is a flowchart illustrating steps of a privacy protection method for online shopping and/or express delivery in an embodiment of the present invention.
As shown in fig. 1, the privacy protection method for online shopping and/or express delivery includes the following steps:
s1, generating and/or obtaining a document, wherein the document is associated with user information and has a corresponding relation with the mark, and the mark and/or the carrier for the user information is corresponding to the mark and/or the carrier for the user information;
the bill is associated with user information, and is characterized in that the bill and the user information have a corresponding relation, comprise one or more of e-commerce bill, network bill, transaction bill and express bill, and can be actually selected according to actual requirements on the premise of no conflict;
the marks comprise narrow marks and generalized marks, are characterized in that corresponding relations exist between the marks and the documents, user information related to the documents can be inquired and called through the corresponding relations, the narrow understanding is that the marks are generated in the documents, and therefore the scope of the narrow marks comprises the following forms: the document number, the online purchase order number, the transaction order number, the express delivery number, and the like can also be understood in a broad sense, and any resource, any device, and any equipment having the marking information can be used as a broad sign as long as a corresponding relationship is formed with the narrow sign, and the user information associated with the document can be queried and called through the corresponding relationship, so that the category of the broad sign also includes the following forms: hardware number, handheld device number, express cabinet number, express train number, express tower number, robot number, unmanned aerial vehicle number, sound wave signal, electric signal, optical signal and the like, wherein the generalized and narrow marks can be actually selected according to actual requirements on the premise of no conflict;
the user information is characterized by comprising a receiver and/or a sender, wherein the receiver comprises the personal information of the receiver or the personal information of the receiver and the personal information of an authorizer, so that the receiver comprises at least one piece of personal information, and the sender comprises the personal information of the sender or the personal information of the sender and the personal information of the authorizer, so that the sender comprises at least one piece of personal information;
the personal information comprises name, contact information and address information;
optionally, the personal information includes name, gender, contact information, and address information;
optionally, the personal information includes name, contact information, address information, and identity information;
preferably, the personal information includes name, gender, contact information, address information and identity information;
the user contact information comprises one or more of a client, a network account, a contact telephone and a mailbox, and can be selected according to actual requirements, preferably, the objects of telephone reminding are only limited to receivers and/or senders;
the address information can be implicitly shown by a carrier, can also be shown by processing a plaintext, when the address information is implicitly shown by the carrier, the address information can not only protect the privacy of the address information, but also can be dynamically changed according to the operation of a user, and the change of the address information can be limited to documents which are generated but do not enter a distribution flow according to the actual situation; it is particularly emphasized that when the address information is shown in plaintext, the distribution is performed only according to the plaintext address in the carrier, and when the address information is shown implicitly, only the address information of the receiver and/or the sender in the user information is displayed when the device and/or the apparatus and/or the program medium identifies the carrier information; it should be noted that, no matter whether the address information is shown in hidden/plain text by using a carrier, the effect is equivalent, no matter how the address information is hidden, how the address information is distributed, stored and distributed and displayed, part of links in distribution can acquire specific address information, certainly, the fuzzified address can remind a user when the user places an order, and the user can be prompted to ignore the XX gate number by using the XX unit XX gate number when the lower single address is the XX unit XX gate number of the XX street XX unit XX of the XX district in the XX city XX district;
preferably, the user information associated with the document can be dynamically operated, the server can plan a space for storing the user information when the document is generated, the space has a corresponding relationship with the user information, the space has a corresponding relationship with the document, and a mark is generated along with the document, so that the mark has a corresponding relationship with the user information, and the user information associated with the document can be inquired and called through the mark and the corresponding relationship; the server carries out role identification according to the order placed by the user, correspondingly stores the personal information of the receiver and/or the sender in the user information, and can inquire the personal information of the authorized user in the server according to the authorization request of the receiver and/or the sender client for receiving and/or sending, and classify the personal information of the authorized user into the receiver and/or the sender in the bill user information according to the authorization request type initiated by the client, wherein the authorization request of the receiver corresponds to the receiver, the authorization request of the sender corresponds to the sender, and meanwhile, the server can also delete the personal information of the corresponding authorized person from the bill user information according to the authorization canceling operation initiated by the receiver and/or the sender, which is a way of dynamically operating the user information, the range starts when the order is placed and ends before the delivery is finished; it is particularly emphasized that adding and deleting the personal information of the authorizer in the user information does not affect the personal information of the authorizer stored in the server, and the personal information of the authorizer in the user information may be in a specific form, such as a copy of the personal information of the authorizer, or in an abstract form, such as an interface of the personal information of the authorizer, a unique identifier of the authorizer including a network account, or in other encrypted forms; meanwhile, the personal information of the receiver and/or the sender in the user information can also be in a concrete form, such as a copy of the personal information of the receiver and/or the sender, an abstract form, such as an interface of the personal information of the receiver and/or the sender, a unique identifier of the receiver and/or the sender including a network account and the like, and other encrypted forms; if the user authorizes other users before placing the order, the server divides the order placing user into a receiver and/or a sender according to the role of the user placing the order when the user places the order, and pulls the authorizer, the receiver and/or the sender into the receiver and/or the sender of the user information of the receipt according to the authorization request category; it should be noted that the receiving and/or sending authorization is two independent authorizations, the user can perform double authorization for receiving and sending the designated object, or can perform independent authorization, and the user can have different ordering roles, that is, the same user can have a receiver role and a sender role; it should be particularly emphasized that the operation of authorizing or canceling by the user affects the user information in any multiple documents that are not delivered and finished by the user, but does not affect the user information in the documents that are delivered and finished by the user, and the server will discriminate and control the delivery state of the documents, that is, the flow of the authorization effect is: the method comprises the steps that a user operates a client, the client receives an authorization instruction, a server searches and screens any plurality of bills corresponding to the client to find out bills which are not delivered, and meanwhile, the server stores searched personal information of authorized users in recipients and/or senders corresponding to any plurality of user information of the bills which are not delivered according to the type of the authorization instruction, so that the authority of dynamic operation of the bill user information is limited to the recipients and/or senders in the user information instead of an authorizer; the method used by the invention is characterized in that the corresponding relation between the receipt and the user information is utilized, the mark is generated along with the receipt, and the purpose of dynamically operating the user information related to the receipt is finally realized through the authorization/cancellation operation of a receiver/sender; it is particularly emphasized that the final purpose achieved by the present invention is that the user information associated with the corresponding document of the recipient and/or sender can include the personal information of the authorizer, and meanwhile, the user information associated with the document cannot be acquired by the carrier in the whole process from the placing of the document to the completion of the dispatching, so as to achieve privacy protection of the sender/receiver and alternative permission operation of the authorizer for receiving and/or dispatching, and meanwhile, the operation is not limited to the authorization flow;
optionally, the user information associated with the document may be statically operated, and the corresponding authorization influence flow is as follows: when a user changes the authorization state, the change of the authorization state does not affect the document A, but when the user issues a document B again, the changed authorization state affects the document B; it is particularly emphasized that adding and deleting the personal information of the authorizer in the user information does not affect the personal information of the authorizer stored in the server, and the personal information of the authorizer in the user information may be in a specific form, such as a copy of the personal information of the authorizer, or in an abstract form, such as an interface of the personal information of the authorizer, a unique identifier of the authorizer including a network account, or in other encrypted forms; meanwhile, the personal information of the receiver and/or the sender in the user information can also be in a concrete form, such as a copy of the personal information of the receiver and/or the sender, an abstract form, such as an interface of the personal information of the receiver and/or the sender, a unique identifier of the receiver and/or the sender including a network account and the like, and other encrypted forms;
it should be particularly noted that, no matter whether the user information in the document is in dynamic operation or static operation, the server can discriminate the receiver and/or the sender in the user information; it should be noted that, if the recipient does not perform the receiving authorization, the recipient only contains the personal information of the recipient, and if the sender does not perform the sending authorization, the sending party only contains the personal information of the sender, in this form, the user information contains the recipient and/or the sending party, wherein the recipient contains one piece of personal information, i.e. the personal information of the recipient, and the sending party contains one piece of personal information, i.e. the personal information of the sender, this form is as in the prior art, but is not identical to the prior art, because in the prior art, the user corresponding to the document only contains the personal information of the recipient and/or the sender, and does not expand the capability of corresponding to the information of the authorizer, and the invention can be compatible with the personal information of the authorizer in the document, and preferably, the compatibility is dynamic, so that the recipient in the user information, the method comprises the steps of containing personal information of a receiver and personal information of a compatible authorizer, so that a sender in user information contains the personal information of the sender and the personal information of the compatible authorizer.
S2, scanning and/or sensing and/or receiving and/or identifying the carrier;
the vector comprises one or more of the following forms:
intangible carriers, including sound waves, light waves, electric waves characterized by energy and media;
a tangible carrier comprising graphical information, hardware, devices, equipment characterized by physical form recording;
the sound wave, the light wave and the electric wave can bear information of the marks and are changed into a sound wave signal, an optical signal and an electric signal;
the graphic information comprises one-dimensional codes, two-dimensional codes and multi-dimensional codes including numbers, letters, characters, symbols and bar codes, and can be recorded by one and/or a plurality of combinations of the bar codes, the numbers, the letters, the characters and the symbols; the hardware can bind the mark in the bill after the bill is generated, remove the mark in the bill after the bill delivery is finished, and can be repeatedly used; it is particularly emphasized that the carrier corresponds to the mark, and forms a corresponding relationship with the user information through the mark, so when a device and/or an apparatus and/or a program medium obtains the corresponding mark in the carrier through scanning and/or sensing and/or receiving and/or recognizing, the server may record the number of the device and/or the apparatus and/or the program medium, generate a corresponding relationship between the number and the mark, and further form a corresponding relationship between the number and the user information in the document, so that after the carrier is operated through the device and/or the apparatus and/or the program medium, a process of establishing contact and identity authentication in distribution can be realized based on the corresponding relationship, and in the process, a narrow mark is promoted to a broad mark; it should be noted that the apparatus and/or device and/or program medium includes a readable storage medium of a handheld device, an express cabinet, an express car, an express tower, a robot, an unmanned aerial vehicle, and an installation program, and the intangible carrier and the tangible carrier can be used in combination on the premise of no conflict, and can be actually selected according to actual requirements.
S3, establishing contact with the receiver and/or the sender based on the user information;
the contact comprises one or more of the following contact ways:
a telephone alert;
reminding by a short message;
network reminding;
informing a reminder;
a social reminder;
optionally, the reminder includes an identifier, the identifier and the package label have a corresponding relationship, and the package label can be generated in any link from ordering to distribution;
the device and/or equipment and/or program medium scans and/or senses and/or receives and/or identifies the carrier, finds out user information forming a corresponding relation with the carrier through the support of the server and the query of the corresponding relation, distinguishes a receiver and/or a sender in the user information according to a received instruction, and is connected with the receiver and/or the sender based on personal information of the receiver and/or the sender in the user information, wherein the connection mode comprises one or more of telephone reminding, short message reminding, network reminding, notification reminding, social reminding and the like; because the user information associated with the carrier is implicitly shown, the implicitly shown mode comprises a full implicit mode and a semi-implicit mode for retaining partial identification information, and a user can find the corresponding package in the semi-implicit mode on the premise of not needing package marking prompt; on the premise of prompting by a package mark, a user can find a corresponding package in a full implicit mode, so that optionally, the prompt comprises an identifier, the identifier and the package mark have a corresponding relation, and the package mark can be generated in any link from ordering to distribution; preferably, the package label is generated in the distribution link; it should be particularly noted that the establishing of the contact is completed based on the corresponding invocation of the token, that is, the step of establishing the contact does not cause information leakage of the contact in the user information; it should be noted that, preferably, the objects of the phone call reminder are limited to the receiver and/or the sender; it should be noted that the above-mentioned contact ways can be actually selected according to actual requirements on the premise of no conflict; it should be noted that, the apparatus and/or device and/or program medium may distinguish the receiver and/or sender in the user information corresponding to the document through different operation instructions.
S4, carrying out identity verification on the receiver and/or the sender based on the user information;
authenticating the recipient and/or the sender identity may include using one or more of the following authentication methods:
verifying biological information;
verifying the graphic information;
verifying the digital information;
verifying certificate information;
verifying account information;
verifying communication information;
verifying the equipment information;
the biological information comprises the inherent physiological characteristics of the human body, including one or more of human face, fingerprint, pupil, iris, palm print and vein, and genes, and also comprises behavior characteristics, including one or more of handwriting, voice and gait;
the graphic information comprises one or more of a one-dimensional code, a two-dimensional code, a multi-dimensional code and a unique graphic;
the digital information comprises one or more of a verification code, a digital code and a password;
the certificate information comprises one or more of identity cards, passports, military and official certificates, campus cards and student cards;
the account information comprises one or more of a network account and a bank account;
the communication information comprises one or more of a mobile phone number, a network link and sound;
the equipment information comprises one or more of mobile equipment information, communication equipment information and personal equipment information;
when the identity of the receiver and/or the sender is verified, the device and/or the equipment and/or the program medium initiates an identity verification instruction, if the personal information does not contain the identity information, the receiver and/or the sender can only obtain verification modes in the forms of graphics, verification codes, sound and the like through the contact information, namely the identity verification mode is only limited to graphics information verification, digital information verification and communication information verification; if the personal information contains identity information, the receiver and/or the sender can carry out identity verification in various forms through biological information, graphic information, digital information, certificate information, account information, communication information and equipment information reserved in the identity information; it should be noted that the apparatus and/or device and/or program medium may provide one or more forms of authentication, and may perform authentication independently or in combination, where successful authentication of any one of the independent or combined authentication indicates successful authentication of the user identity information; it should be particularly emphasized that the verification information sent based on the contact information has different characteristics, for example, the verification codes are 620517 for the short message verification code sent to the recipient user a, and 631229 for the short message verification code sent to the recipient user C, but both of the above two verification codes can perform authentication on the document, and if any one verification succeeds, the package authentication corresponding to the document succeeds, and at this time, the server can distinguish the signed user in the recipient and/or the sender according to the different uploaded verification information, and send a prompt that the signed user is who the signed user is to the recipient and/or the sender; based on the authentication mode of the identity information, no matter which authentication mode of the receiver and/or sender, the server can obtain the user information authenticated by the document, and after the authentication is successful, the result is fed back to the receiver and/or sender, so that the in-knowledge real-name authentication of the user independent authorization is realized, including real-name representative sending and real-name representative receiving; it should be particularly noted that the authentication is completed based on the corresponding call of the token, that is, the authentication step is completed within the limit of the token; preferably, the authentication is performed using biometric information or device information; it should be noted that, the above-mentioned authentication method can be actually selected according to actual requirements on the premise of no conflict; it should be noted that, the apparatus and/or device and/or program medium may distinguish the receiver and/or sender in the user information corresponding to the document through different operation instructions.
Fig. 2 is a carrier display diagram illustrating a privacy protection method for online shopping and/or express delivery in an embodiment of the present invention;
as shown in fig. 2, the carrier is displayed in a graphic form and/or a paper form, where the graphic information in the carrier corresponds to the symbol, and the symbol has a corresponding relationship with the user information including the receiver, so that only one address information is displayed, that is, the address information of the receiver, which can be applied to a delivery scenario in the form of takeaway or the like that does not require the user information of the sender; it should be specifically noted that the form of the carrier is not limited to the exemplary diagram, and as long as the information elements containing the exemplary diagram, i.e. the graphic information and/or the information elements of the combination of the graphic information and the plaintext address, all belong to the general variant of the carrier shown in the graphic information; the following are specifically mentioned: the carrier of the present invention is only exemplified by graphic information, and the specific form of the carrier can be specifically applied according to the carrier form described in the claims on the premise of no conflict.
Fig. 3 is a carrier display diagram illustrating an example of a privacy protection method for online shopping and/or express delivery according to the present invention;
as shown in fig. 3, the carrier is displayed in a graphic form and/or a paper form, where the graphic information in the carrier corresponds to the symbol, and the symbol has a corresponding relationship with the user information including the recipient and the sender, so that the address information is displayed as 2, that is, the address information of the recipient and the sender, which can be applied to distribution scenes requiring the user information of the sender in the forms of online shopping, express delivery, and the like; it should be specifically noted that the form of the carrier is not limited to the example, as long as the information elements containing the example are included, that is, the information elements of the graphic information and/or the combination of the graphic information and the address of the addressee, all belong to the general variant of the carrier shown in the graphic information; the following are specifically mentioned: the carrier of the present invention is only exemplified by graphic information, and the specific form of the carrier can be specifically applied according to the carrier form described in the claims on the premise of no conflict.
Fig. 4 is a user information display diagram illustrating an online shopping and/or express privacy protection method according to an embodiment of the present invention;
as shown in fig. 4, the user information display diagram corresponds to the space in terms of a mark, the space corresponds to the user information, the recipient and/or the sender can authorize and/or cancel authorization for the designated person through the client, the client receives a command, the server searches all documents which are not delivered and are corresponding to the client, queries the personal information of the authorized user, classifies the personal information of the authorized person into the recipient and/or the sender in the document user information according to the authorization request type initiated by the client, and can realize dynamic operation of document-related user information, wherein the personal information of the authorized person in the user information can be in a specific form, such as a copy of the personal information of the authorized person, or an abstract form, such as an interface of the personal information of the authorized person, a unique identifier of the authorized person including a network account, and the like, other encryption forms are also possible, so that the operation of authorization and/or authorization cancellation does not affect the personal information of the authorizer; meanwhile, the personal information of the receiver and/or the sender in the user information can also be in a concrete form, such as a copy of the personal information of the receiver and/or the sender, an abstract form, such as an interface of the personal information of the receiver and/or the sender, a unique identifier of the receiver and/or the sender including a network account and the like, and other encrypted forms; it should be noted that, preferably, the personal information of the receiver and/or the sender and/or the authorizer in the user information is called in the form of an interface; the following are specifically mentioned: fig. 4 shows an example of a preferred dynamic operation of user information, and a static operation of user information is also a basic variation of the present invention, and is protected in the claims of the present invention.
Fig. 5 shows a contact flow diagram of a privacy protection method for online shopping and/or express delivery in an embodiment of the present invention;
as shown in fig. 5, when the device obtains the corresponding mark in the carrier through scanning and/or sensing and/or receiving and/or identifying, the server may record the number of the device, generate the corresponding relationship between the number and the mark, and further form the corresponding relationship between the number and the user information in the document, so that after the device operates the carrier, the establishment of the contact during distribution can be realized based on the corresponding relationship, and the contact object can be actually selected according to the actual requirement, for example, the user information only exists in the receiver, or the receiver only exists in the receiver, and the sender only exists in the sender; it should be particularly noted that, the present exemplary diagram is represented by an apparatus, but not limited to, the apparatus, the device and/or the program medium may be replaced by the apparatus, and the information recorded by the server will be the number of the device and/or the number of the program medium, so as to implement the step of establishing the association in the distribution of the device and/or the program medium; it should be noted that, preferably, the manner of telephone reminding is limited to the receiver and/or the sender; optionally, the prompt sends an identifier corresponding to the package label, so that the recipient and/or the sender can quickly find the corresponding package.
FIG. 6 illustrates an authentication flow diagram of a method of identity verification in an embodiment of the present invention;
as shown in fig. 6, the receiver and/or the sender are collectively called as the authenticator, and the delivery verification and/or the receiving verification are collectively called as the identity verification; if the carrier verifies the identity of the authenticator corresponding to the package, clicking the information of the narrow marks in the device and/or equipment and/or program medium, selecting the information, clicking the identity verification in the device and/or equipment and/or program medium, and popping up a command by the device and/or equipment and/or program medium to prompt the authenticator to give out the identity information, wherein the identity information can be actually selected according to actual conditions and comprises one or more of biological information, graphic information, digital information, certificate information, account information and equipment information, after the authenticator gives out the identity information, the server acquires the identity information given out by the authenticator, searches the identity information of the authenticator with the corresponding relation based on the corresponding relation of the narrow marks, matches the identity information and succeeds in matching, the device and/or equipment and/or program medium is shown with an indication of √ or successful authentication, etc., which indicates that the package identity verification corresponding to the carrier's narrow-sense token was successful, as can be seen in the detailed example.
FIG. 7 illustrates an authentication flow diagram of another method of identity verification in an embodiment of the present invention;
as shown in fig. 7, the receiver and/or the sender are collectively called as authenticator, and the delivery verification and/or the receiving verification are collectively called as identity verification; the identity verification based on the generalized token, such as the carrier records a plurality of narrow tokens in advance in the device and/or equipment and/or program medium, such as 1 … … 558154656268, line change, 2 … … 965485875943, line change, 3 …, wherein 558154656268, 965485875943 and the like are narrow tokens, the identity verification of the authenticator does not need to specify specific information, the identity verification is directly operated in the device and/or equipment and/or program medium, a device and/or equipment and/or program medium pop-up command prompts the authenticator to give out identity information, wherein the identity information can be actually selected according to actual situations and comprises one or more of biological information, graphic information, digital information, certificate information, account information and equipment information, after the authenticator gives out the identity information, the server acquires the identity information given out by the authenticator, based on the corresponding relation of the generalized signs, finding all narrow-sense signs corresponding to the generalized signs, performing state recognition on the bill in advance, screening out all user information corresponding to the narrow-sense signs which are not delivered, matching, and if the matching is successful, displaying the user information in a device and/or equipment and/or program medium record by using a √ or authentication success and the like, such as 1 … … 558154656268 √ line change, 2 … … 965485875943 √ line change, 3 …, and prompting the carrier that package identity verification of package marks 1, 2, … is successful, which can be specifically referred to a detailed example; it should be noted that 3 narrow-sense symbols corresponding to the wide-sense symbol in fig. 7 do not refer to 3 narrow-sense symbols in particular, but mean that the wide-sense symbol can correspond to any plurality of narrow-sense symbols, that is, the wide-sense symbol of the device and/or apparatus and/or program medium can correspond to any plurality of narrow-sense symbols.
The invention is based on the invention authorized by patent number 2014107904295, fully considers the industry requirements of express real-name collection and real-name delivery, and improves the application scene, application object, and the expansion and extension of privacy protection.
In an online shopping and/or express scene, a user can input personal information of the user into a server through a client to be correspondingly stored, wherein the personal information comprises name, contact information and address information; optionally, the personal information includes name, gender, contact information, and address information; optionally, the personal information includes name, contact information, address information, and identity information; preferably, the personal information includes name, gender, contact information, address information and identity information; the contact information comprises one or more of a client, a network account, a contact phone and a mailbox, the identity information can be specific identity information, such as specific biological information, graphic information, digital information, certificate information, account information and equipment information, or abstract identity information, such as an identity mark, the identity mark can represent the unique legal and valid identity of a user, preferably represents the unique legal and valid identity of the user by an identity card number, but is not limited to the identity card number, the identity mark corresponds to the specific identity information input by the user, preferably is applied by the abstract identity information, wherein the specific identity information comprises the biological information, the graphic information, the digital information, the certificate information, the account information and the equipment information, the biological information comprises the inherent physiological characteristics of a human body, such as a human face, a fingerprint, a pupil, an iris, a palm print, a fingerprint and the like, Veins, one or more of genes, also behavioral characteristics, including one or more of handwriting, voice, gait; the graphic information comprises one or more of a one-dimensional code, a two-dimensional code, a multi-dimensional code and a unique graphic; the digital information comprises one or more of a verification code, a digital code and a password; the certificate information comprises one or more of identity cards, passports, military and official certificates, campus cards and student cards; the account information comprises one or more of a network account and a bank account; the communication information comprises one or more of a mobile phone number, a network link and sound; the equipment information comprises one or more of mobile equipment information, communication equipment information and personal equipment information; the user can input a plurality of different personal information based on different personal information elements, the server can correspond the input personal information with a mark, corresponds the input personal information with the mark, corresponds the graphic information in a bar code form with the mark, and the mark can be a mark, a website, a numerical value, a number string, a character and the like, corresponds the mark with the personal information, for example, the personal information corresponding to the mark is Zhang III, Man 199999999999, building 1 unit 101, 110199111912291013 of Guancun district, No. 1 building 1 unit 101, 110199111229191013 in Hei lake district sea lake street of Beijing city, but the mark is not the mark referred to in the invention, the mark referred to in the invention is generated in a bill, has a corresponding relationship with the user information, and the user information related to the bill can be found by acquiring the mark, comprises a receiver and/or a sender, and the mark is not generated in the bill, the method only has a corresponding relation with personal information, and the obtained mark can only find the corresponding personal information; the following are specifically mentioned: the graphic information can be displayed in a bar code form and comprises a one-dimensional code, a two-dimensional code and a multi-dimensional code, and the preferable graphic information is applied by the two-dimensional code; it should be noted that the form of inputting the personal information by the user may be pre-input or instant input, the personal information is instantly input in the document, and when the document is generated by placing the document, the server pre-processes the personal information, so that the effect of the server is the same as the pre-input effect; the method includes the steps that personal information is input in advance and used as name, gender, contact information, address information and identity information for example, the personal information is stored in a client side and is in the form of name, gender, contact information, address information, identity information and graphic information, a user can select specified personal information to place an order according to personal information details displayed in a plaintext, and a server replaces the personal information with corresponding graphic information to generate personal information used for hiding a receiver and/or a sender in a document; the client has the social attribute, can add and delete users, can record personal information and update the personal information in a corresponding manner with the server in real time, and can authorize the users with corresponding functions.
When ordering is carried out through online shopping and/or express delivery, a user can select personal information, appointed personal information is selected for ordering, a server can replace corresponding graphic information to generate the corresponding personal information in a receipt, the receipt is associated with the user information, and the carrier is displayed in a graphic form, so that the user information can be hidden in the carrier in the graphic form, the beneficial effects are that the situation that a receiver and/or a sender obtain the personal information of the other party is effectively avoided, the social phenomena that a buyer badly evaluates the report of a seller and the seller obtains the personal information sale can be avoided, and the effect is introduced to the authorization invention of 2014107904295; at the moment, the mark is generated along with the generation of the document, and the server stores the association relationship between the mark and the user information in the document, wherein the user information can be in a concrete form, such as a copy of the personal information of a receiving/sending party, an abstract form, such as an interface of the personal information of the receiving/sending party, a unique identifier of the receiving/sending party containing a network account number, and the like, or other encrypted forms, if the association is carried out in the abstract form, the document in a data storage form can imply the user information, and the beneficial effects are that the document data storage form is not in the generation form of the mark, a name, a telephone, an address and an identity …, but indirectly corresponds sensitive personal information with the mark, so even if the server is taken out of a database, the data taken out of the database is only the mark and the user information …, the core privacy of the user can be effectively protected from being disclosed; the user information related to the bill can be dynamically operated, the server carries out role identification according to the bill placement of a user, correspondingly stores the personal information of a receiver and/or a sender in the receiver and/or the sender in the user information, and can inquire the personal information of the authorized user in the server according to the authorization request of the receiver and/or the sender client, and classify the personal information of the authorized user to the receiver and/or the sender in the bill user information according to the authorization request type initiated by the client, wherein the authorization request of the receiver corresponds to the receiver, the authorization request of the sender corresponds to the sender, and meanwhile, the server can delete the personal information of the corresponding authorized person from the bill user information according to the authorization cancelling operation initiated by the receiver and/or the sender, the dynamic operation mode of the user information has the advantages that the dynamic operation mode of the user information can meet the actual requirements of real-name collection and generation of users; of course, dynamic operation may be replaced by static operation; after placing a bill, the receiver and/or the sender can perform secondary confirmation on the bill, and after confirmation, the server can correspond the mark corresponding to the bill with a carrier, wherein the carrier can be an invisible carrier and comprises a sound wave signal, an optical signal and an electric signal which are characterized by energy and medium, or a visible carrier and comprises graphic information, hardware, a device and equipment which are characterized by being recorded in a physical form, and the preferable carrier is the graphic information, especially a two-dimensional code; it should be particularly noted that, in the online shopping ordering behavior, the recipient and/or the sender may set default information for ordering, or may select specific personal information for ordering, and express ordering behavior, the recipient and/or the sender may manually enter the personal information of the delivery object, or may add the client user to the recipient and/or the sender at the recipient and/or delivery location based on the social attribute of the client, and the server queries and automatically imports the default personal information corresponding to the user; it should be noted that the carrier can be actually selected according to actual requirements on the premise of no conflict; it should be particularly noted that, when placing an order, a document including a "carrier" corresponds to only personal information specified by a receiver and/or a sender, and a carrier after secondary confirmation of the document corresponds to a mark of the document, and objects corresponding to the two are different, where the document including the "carrier" when placing the order, a receiver and/or a sender corresponding to the "carrier" is a mark corresponding to a carrier after secondary confirmation, and extends to user information through transmission of correspondence relationship, and a part of content in the receiver and/or sender in the user information, so that the "carrier" in the order placing and the carrier corresponding to the document after secondary confirmation are two-dimensional codes in this example, and look the same in form, but the content is different; it should be particularly noted that, when the user confirms for the second time, optionally, the server may pre-process the address information of the receiver and/or the sender, and display the address information in the clear text in the document after the second confirmation; it should be noted that the document status when the user places the order may be an unpaid status, and the status after the secondary confirmation may be a paid status; it should be particularly noted that the carrier may be a component in a document, the graphic information is used as the carrier, the two-dimensional code is used as a representative, and the two-dimensional code may be a component of an express document; the carrier may also be a stand-alone body, such as an acoustic, optical, or electrical wave in an intangible carrier, or hardware, apparatus, or device in a tangible carrier.
The method comprises the following steps that graphic information is taken as a carrier, a two-dimensional code is taken as a representative, address information is shown in a plain text in a receipt for example, the receipt is shown in a graphic form, the graphic form comprises the two-dimensional code and address information of a receiver and/or a sender, the sender can directly print the receipt in the graphic form in a blank paper express receipt to generate the paper express receipt, the express receipt comprises an express number, the two-dimensional code and the address information of the receiver and/or the sender, the two-dimensional code serves as the carrier at the moment and corresponds to a mark, namely an online purchase receipt number and/or an express number, the user information is hidden in the paper express receipt, and meanwhile, the sender can remind a corresponding carrier of the express receipt of taking goods in the front through a client, a contact phone and the like; it is particularly emphasized that the carrier, which may be a courier, may be a courier cabinet, may be a courier vehicle, may be a robot, may be a collection point, and includes equipment and/or devices and/or participants participating in any distribution link, and may be actually selected according to actual needs on the premise of no conflict; the method comprises the steps that a carrier arrives at a designated place to pick up goods, a device and/or equipment and/or a program medium scans a two-dimensional code in an express bill, a server obtains marking information of the device and/or equipment and/or the program medium and a mark in the two-dimensional code, generates a corresponding relation between the marking information and the mark, and feeds back the corresponding relation to a response message of the device and/or equipment and/or the program medium, wherein the response message comprises the mark corresponding to the two-dimensional code or other marks corresponding to the mark, and other marks can be generated by other factors, such as the marking information; the device and/or equipment and/or program medium corresponds to the code scanning time sequence by using the serial numbers, and the corresponding relation is stored in the device and/or equipment and/or program medium, for example, the record marks are in the forms of 1 … … 558154656268, line change, 2 … … 965485875943, line change, 3 …, the record marks and other marks are in the forms of 1 … … abc1, line change, 2 … … 3147 and 3 …, wherein the mark abc1 corresponds to the mark 558154656268, the mark 3147 corresponds to the mark 965485875943 and …, therefore, the corresponding relation generated by using the serial numbers and other mark forms is more practical during recording, and the effect is also simple to realize, because the device and/or equipment and/or program medium has the generalized marks, as long as the server combines the generalized marks with the other generated marks to correspond to the generalized marks, and transmitting other indicia to the device and/or apparatus and/or program medium, the effect of which is described in the granted invention at 2014107904295; it should be noted that the other marks corresponding to the marks may be shown by a combination of numbers and/or letters and/or symbols and/or characters, but not limited to the above forms, and that the device and/or apparatus and/or program medium has a unique property, and any mark having the unique property can satisfy the requirement of the present invention, and belongs to the general variants of other marks in the present invention; it should be particularly noted that, since the user information implied by the two-dimensional code is the user information shown in a fully implied manner, preferably, after recording a mark or other mark having a corresponding relationship with the mark in the device and/or the apparatus and/or the program medium, the carrier may record a corresponding serial number on a corresponding package, such as scanning a two-dimensional code package, recording a matching relationship of 1 … … abc1 in the device and/or the apparatus and/or the program medium, and marking the package as 1 by the carrier, but the step of generating the package mark in the distribution link is not necessary, if the graphic information further includes other information than a barcode, the effect of semi-implied user information is achieved, or the step is not performed, and may be actually selected according to actual situations; the following are specifically mentioned: the carrier can also record the package mark, namely the position information of the package, and only the element of the package position information needs to be opened up in the data corresponding to the mark; after the carrier receives the goods, the carrier performs real-name delivery authentication on the goods, wherein the authentication has 2 forms, namely: the identity verification based on the narrow-meaning mark, if the carrier verifies the package marked as 1, clicking the information 1 … … abc1 in the device and/or equipment and/or program medium, after the information is specified, the goods verification can be triggered in the device and/or equipment and/or program medium, and the device and/or equipment and/or program medium pop-up command prompts the sender to deliver the identity information, wherein the identity information can be actually selected according to actual situations and comprises one or more of biological information, graphic information, digital information, certificate information, account information and equipment information, after the sender delivers the identity information, the server acquires the identity information delivered by the sender, finds the identity information of the sender corresponding to the 558154656268 document based on the corresponding relation of the narrow-meaning mark, and carries out matching and successful matching, a corresponding document, such as 1 … … abc1 √, shown as a check mark on a device and/or equipment and/or program medium, indicates that the package marked 1 is successfully authenticated by the carrier, and the carrier packages the package marked 1 into a package to complete the authentication of the shipment in real name; II, secondly: identity verification based on generalized signs, for example, if a carrier records a plurality of packages in advance in a device and/or equipment and/or program medium, for example, as 1 … … 558154656268, line change, 2 … … 965485875943, line change, 3 …, and performs identity verification on a user, specific information does not need to be specified, delivery verification is directly operated in the device and/or equipment and/or program medium, a device and/or equipment and/or program medium pop-up command is prompted to a sender for submitting identity information, wherein the identity information can be actually selected according to actual situations and comprises one or more of biological information, graphic information, digital information, certificate information, account information and equipment information, after the sender submits the identity information, a server acquires the identity information submitted by the sender, and document records corresponding to the generalized signs are found based on the corresponding relation of the generalized signs, firstly, status recognition is carried out on the bill, user information corresponding to the bill which is not delivered is screened out, matching is carried out, if matching is successful, the corresponding bill recorded in a device and/or equipment and/or a program medium in the form of √ such as 1 … … 558154656268 √ line change, 2 … … 965485875943 √ line change, 3 … prompts that package authentication of a carrier marked as 1, 2, … is successful, the carrier takes the package marked as 1, 2, …, and authentication of a delivery real name system is completed; it should be particularly noted that the present invention is not limited to the above examples, and the identity authentication of the sender can be actually selected according to actual situations without conflict; it should be particularly noted that different carriers have different operations after delivery verification, if the carriers are couriers, the couriers are prompted to successfully take the items through screen verification, and if the carriers are express delivery cabinets, empty storage space cabinet doors are directly opened.
Based on the address information in the plaintext address information or the address information in the carrier corresponding user information, the carrier can transport the package to the destination of the receiver for distribution.
In distribution, a carrier arrives at a corresponding address of a receiver according to address information, a device and/or equipment and/or a program medium is utilized to scan and/or sense and/or receive and/or identify a two-dimensional code, a server obtains marking information of the device and/or equipment and/or the program medium and marks in the two-dimensional code, generates corresponding relations of the marking information and the marks and feeds back the corresponding relations to the device and/or equipment and/or the program medium, and the response messages contain the marks corresponding to the two-dimensional code or other marks corresponding to the marks, wherein other marks can be generated by participation of other factors, such as the marking information; the device and/or equipment and/or program medium corresponds to other marks corresponding to the marks/signs by using serial numbers according to the time sequence of code scanning, and the corresponding relation is stored in the device and/or equipment and/or program medium, and the method is completely consistent with the recording form when the article is picked up; taking the device and/or the equipment and/or the program medium to acquire other marks corresponding to the marks, taking the most complicated campus delivery as an example, a carrier scans a two-dimensional code package and records the form of 1 … … 2143, clicks the information of 1 … … 2143 in the device and/or the equipment and/or the program medium, after the information is specified, clicks a delivery contact in the device and/or the equipment and/or the program medium, finds a receiver corresponding to user information based on the corresponding relation of the narrow marks, sends a reminder containing 2143 to all members in the receiver, optionally further performs a telephone reminder with the receiver, after the delivery contact is performed, marks the two-dimensional code package as 1, performs the same processing on other packages to perform the delivery contact, for example, after the multiple processing, the device and/or the program medium stores 1 … … 2143, line change, 2 … … 3827, line change, 3 … ad14, line change, …, when the receiver gets goods in front of the reminding information, the carrier can search in the device and/or equipment and/or program medium according to the reminding provided by the receiver to find the corresponding record of 1 … … 2143, can find the package marked as 1 according to the relation of the serial number 1, carry out the identity verification of the consignee name system on the goods, the carrier clicks the order of the consignee verification in the device and/or equipment and/or program medium, the device and/or equipment and/or program medium pop-up order, and prompts the receiver to give out the identity information, wherein the identity information can be actually selected according to actual situations and comprises one or more of biological information, graphic information, digital information, certificate information, account information and equipment information, after the recipient submits the identity information, the server obtains the identity information submitted by the recipient, finds the identity information of the recipient corresponding to the document based on the corresponding relation of the narrow-sense sign, matches the identity information, if the matching is successful, the corresponding document recorded in the device and/or equipment and/or program medium in the form of √ such as 1 … … 2143, prompts the carrier that the package identity verification marked as 1 is successful, the carrier gives the package marked as 1, and completes the identity verification of the real name of the recipient, of course, there are two ways of identity verification, which can be seen in the device and/or equipment and/or client medium without independent storage space, and the identity verification is performed with the narrow-sense sign, and is more suitable in the scene; the identity verification of the generalized marks has the application characteristics, and the method is more suitable for devices and/or equipment with independent storage spaces, such as express cabinets, express vehicles and the like, and the two identification verification modes of the addressees can be actually selected according to actual conditions; after the identity information is successfully verified, the server can identify according to the verification information of the addressee, judge the addressee verification behavior in the addressee, whether the addressee or the authorized person submits the identity information, and send the judged result based on the personal information of the addressee, such as prompting the user in the forms of short messages, clients and the like, packages with single numbers of XXX are signed by the XXX at the XXX time, and the signing mode is XXX, so that the user can independently authorize and sign true names in the informed situation; it should be particularly noted that the above-mentioned authentication manner with generalized symbol is particularly suitable for devices and/or equipment with independent storage space for placing packages, represented by express cabinets and express carts, and may not record information of the corresponding relationship as 1 … … 2143; it should be noted that, the present example does not limit the concept and scope of the present invention, and practical changes can be selected according to practical situations without conflict, and various modifications and improvements made to the technical solution of the present invention by those skilled in the art without departing from the design concept of the present invention shall fall within the protection scope of the present invention; it is particularly emphasized that any parameter, including but not limited to time and/or sequence of operations, that is unique when the carrier corresponds to the user information may be used in place of the token to reconstruct the matching relationship between the package and the recipient and/or sender.
In the above manner, by taking the preferred example that the user information corresponding to the mark in the document can be dynamically operated, the above process can also be implemented except that the user information in the document is not changeable in the static operation of the user information, that is, the data storage form in fig. 4 is generally modified, and the final purpose of the present invention can also be achieved, that is, the user information in the document corresponding to the recipient and/or the sender can accommodate the personal information of the authorizer, and meanwhile, the document form cannot identify the personal information of the recipient and/or the sender and/or the authorizer with naked eyes, and the authorizer is allowed to perform the substitute permission operation of the recipient and/or the sender, so that the details are not repeated.
The technical bias of the invention is that in the existing E-commerce and/or express receipt and corresponding server, the receipt only corresponds to one receiver and/or sender, if real-name authentication is carried out by using technologies such as biological identification and the like, the receipt is only limited to be personally participated by the receiver and/or sender, although the package signing safety is protected, the signing action is also restricted, and the flexibility of signing of a user is greatly reduced; the document corresponds to the user information, the user information comprises the receiver and/or the sender, the receiver comprises the personal information of the receiver and/or the authorizer, and the sender comprises the personal information of the sender and/or the authorizer, so that the real-name verification of the server can be carried out based on the reserved personal information, the collection and/or the delivery behaviors of the authorizer can be realized, the user experience of taking and/or delivering can be effectively improved, the taking and/or the delivering efficiency can be effectively improved, the package safety can be effectively protected, the flexibility of user signing can be compatible, and the technical problem that people are eagerly to solve but cannot succeed all the time can be solved.
The core invention point of the invention is based on the design idea of 2014107904295 authorization invention, which is expanded and verified, 2014107904295 authorization invention design idea is based on the end distribution flow, which is designed by mapping one by one; when the express delivery is carried out at the tail end, the express deliverer contacts the addressees on the packages according to the specific packages, and identity verification is carried out when the addressees pick up goods, so that the server processes data for the purpose of protecting the privacy of users, the express deliverers are mapped into the server one by one, the specific packages are mapped into marks, the contact ways on the packages are mapped into personal information, and the identity verification is mapped into the identity information, so that the marks, the personal information and the identity information can be obtained by scanning the graphic information; the invention is designed, expanded and extended based on the mapping substitution design idea, the addressee and the possible existing acceptors are expanded to the addressee based on the addressee behaviors of the addressee and the acceptors, the courier can contact the addressee on the package according to the specific package, and the addressee is subjected to identity verification when the addressee picks up goods, so that the graphic information is scanned, the mark and the addressee are obtained, wherein the addressee comprises the personal information of the addressee and the personal information of the authorizer, and the personal information is optional and comprises the identity information; it should be noted that, in the case of return, the roles of the receiver and the sender are interchanged, so that in the authorized invention of 2014107904295, the personal information and the identity information corresponding to the symbol refer to the receiver and/or the sender, and in the present invention, the personal information of the receiver and/or the sender is collectively referred to as user information to include the behavior of the above-mentioned roles interchange.
The beneficial effects of the invention are that: the method has the advantages that personal information is protected in an all-round mode, the personal information comprises a receiver and/or a sender and/or an authorizer, the privacy of a user is protected more effectively from a data storage mode, a document display mode and a document data processing feedback mode, the document is taken off a database from a database, the document is scanned, transported documents are processed, the data processing is limited in a server, any person including a carrier cannot obtain the core privacy of the user, theoretically tight seams in the privacy information protection of the user are achieved, and water is not leaked; II, secondly: the requirement of real-name generation sending/collection of the user is comprehensively compatible; thirdly, the method comprises the following steps: because the method is compatible with real-name delivery and can support real-name delivery, the implementation of a real-name delivery policy can be supported hundreds of percent; fourthly, the method comprises the following steps: the method can be applied to any environment, any device and any scene, and can form a unified standard for online shopping and/or express privacy protection.

Claims (10)

1. A method of identity verification, comprising:
receiving an authorization request of a user, wherein the user comprises a receiver and/or a sender;
according to the request, establishing a corresponding relation between the bill of the user and the personal information of an authorizer;
receiving an identity authentication request, wherein the identity authentication request has a corresponding relation with the document;
and receiving and verifying the identity information handed out by the authenticator.
2. The method of claim 1, comprising:
the authorization request, the conditions of which trigger are independent of the document.
3. The method of claim 1, comprising:
the corresponding relation between the bill and the personal information of the authorizer is the corresponding relation of dynamic operation or static operation.
4. The method of claim 1, wherein verifying the identity information submitted by the authenticator comprises using one or more of the following verification methods:
verifying biological information;
verifying the graphic information;
verifying the digital information;
verifying certificate information;
verifying account information;
verifying communication information;
and verifying the equipment information.
5. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 4.
6. An apparatus for identity verification comprising a memory and a processor, a computer program stored on the memory, characterized in that the computer program realizes the method of any of claims 1-4 when executed by the processor.
7. A system of identity verification, comprising:
receiving an authorization request of a user, wherein the user comprises a receiver and/or a sender;
according to the request, establishing a corresponding relation between the bill of the user and the personal information of an authorizer;
receiving an identity authentication request, wherein the identity authentication request has a corresponding relation with the document;
and receiving and verifying the identity information handed out by the authenticator.
8. The system of claim 7, comprising:
the authorization request, the conditions of which trigger are independent of the document.
9. The system of claim 7, comprising:
the corresponding relation between the bill and the personal information of the authorizer is the corresponding relation of dynamic operation or static operation.
10. The system of claim 7, wherein verifying the identity information submitted by the authenticator comprises using one or more of the following verification methods:
verifying biological information;
verifying the graphic information;
verifying the digital information;
verifying certificate information;
verifying account information;
verifying communication information;
and verifying the equipment information.
CN202010648604.2A 2018-10-15 2019-08-29 Method and system for identity authentication Pending CN111753333A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2018111941863 2018-10-15
CN201811194186.3A CN109376548A (en) 2018-10-15 2018-10-15 The method and system of online shopping and/or express delivery secret protection
CN201910820803.4A CN110348243A (en) 2018-10-15 2019-08-29 The method and system of online shopping and/or express delivery secret protection

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201910820803.4A Division CN110348243A (en) 2018-10-15 2019-08-29 The method and system of online shopping and/or express delivery secret protection

Publications (1)

Publication Number Publication Date
CN111753333A true CN111753333A (en) 2020-10-09

Family

ID=65398050

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201811194186.3A Pending CN109376548A (en) 2018-10-15 2018-10-15 The method and system of online shopping and/or express delivery secret protection
CN202010648604.2A Pending CN111753333A (en) 2018-10-15 2019-08-29 Method and system for identity authentication
CN201910820803.4A Pending CN110348243A (en) 2018-10-15 2019-08-29 The method and system of online shopping and/or express delivery secret protection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201811194186.3A Pending CN109376548A (en) 2018-10-15 2018-10-15 The method and system of online shopping and/or express delivery secret protection

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201910820803.4A Pending CN110348243A (en) 2018-10-15 2019-08-29 The method and system of online shopping and/or express delivery secret protection

Country Status (1)

Country Link
CN (3) CN109376548A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115113633A (en) * 2022-08-30 2022-09-27 中电太极(集团)有限公司 Carrier distribution system and method based on robot

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492041B (en) * 2020-12-04 2022-07-12 中国联合网络通信集团有限公司 Article conveying method, user side, service cloud platform and internet unmanned aerial vehicle
CN112651014A (en) * 2021-02-05 2021-04-13 湖南华辰悦科技有限公司 Data authorization method and device for block chain system, storage medium and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955813B (en) * 2014-04-30 2017-03-15 中山大学 Express delivery based on Internet of Things is followed the trail of and sends method with charge free
CN107590728A (en) * 2014-12-17 2018-01-16 马俊 A kind of method and system for net purchase secret protection
CN104778391A (en) * 2015-03-20 2015-07-15 四川长虹电器股份有限公司 System for authorizing express cabinet to take cargos by cloud fingerprint identification platform and method thereof
CN105787854A (en) * 2016-03-18 2016-07-20 王宝东 Express receiving/dispatching method
US20170316689A1 (en) * 2016-05-02 2017-11-02 zoomX, Inc. Pickup coordination system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115113633A (en) * 2022-08-30 2022-09-27 中电太极(集团)有限公司 Carrier distribution system and method based on robot
CN115113633B (en) * 2022-08-30 2022-11-25 中电太极(集团)有限公司 Carrier distribution system and method based on robot

Also Published As

Publication number Publication date
CN110348243A (en) 2019-10-18
CN109376548A (en) 2019-02-22

Similar Documents

Publication Publication Date Title
US20230091390A1 (en) System and method of identity verification
CN1968093B (en) Offline methods for authentication in a client/server authentication system
CN100588156C (en) Method and apparatus for providing electronic message authentication
US20190319905A1 (en) Mail protection system
CN105321054A (en) Logistic receiving and dispatching method and system capable of protecting privacy
CN107437159A (en) A kind of intelligent express system of overall process secret protection, method and device
CN111753333A (en) Method and system for identity authentication
CN104123624A (en) Confidential express method and system thereof
CN108540528B (en) Method and system for confirming delivery of electronic document, and computer storage medium
CN107636662A (en) Web content certification
CN107590728A (en) A kind of method and system for net purchase secret protection
CN108038640A (en) A kind of logistics delivering method and device based on encryption express waybill
US20150066797A1 (en) System and method for enhancing delivery security and preventing fraud
CN109801008A (en) The method and system of authentication
CN107437105B (en) Multi-role full-scene NFC and QR code safe express delivery system and use method
CN106651266A (en) Logistics system, logistics personal information protection system and method
WO2018212952A1 (en) System for third-party item pickup authorization
CN106897850A (en) System of real name commodities-circulation information management and system
JP2005213020A (en) Delivery management method
US20210142284A1 (en) Method and system for anonymous ecommerce shipment
CN113298586A (en) Order information processing method and device
US20090265791A1 (en) Method a system and a unit for controlling listing of items on electronic market databases
CN107086995A (en) Antifalsification label, antiforge method for commodities, terminal, platform and system
US20210142321A1 (en) Method and system for anonymous ecommerce shipment
CN110210877B (en) Anti-counterfeiting management method and anti-counterfeiting data input method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201009