CN113591132B - Logistics privacy protection method - Google Patents

Logistics privacy protection method Download PDF

Info

Publication number
CN113591132B
CN113591132B CN202111126297.2A CN202111126297A CN113591132B CN 113591132 B CN113591132 B CN 113591132B CN 202111126297 A CN202111126297 A CN 202111126297A CN 113591132 B CN113591132 B CN 113591132B
Authority
CN
China
Prior art keywords
company
ciphertext
information
sender
express
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111126297.2A
Other languages
Chinese (zh)
Other versions
CN113591132A (en
Inventor
王宝生
罗振豪
邢倩倩
解炜
唐勇
伍林洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202111126297.2A priority Critical patent/CN113591132B/en
Publication of CN113591132A publication Critical patent/CN113591132A/en
Application granted granted Critical
Publication of CN113591132B publication Critical patent/CN113591132B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping

Abstract

The invention provides a logistics privacy protection method, which comprises the following steps: s1, a sending company encrypts and generates a QR hidden code according to express item privacy information and sending company information; s2, delivering the express goods pasted with the QR hidden code labels to an express company by a mail sending company, and providing public information of the express goods; s3, the express company delivers the express items to the receiving company according to the express item public information; s4, the receiving company analyzes the QR hidden code according to information agreed with the sending company in advance to obtain express item privacy information; the express article public information comprises an outgoing company external contact telephone, an outgoing company external public address, an incoming company external contact telephone and an incoming company external public address. The method effectively prevents privacy disclosure behaviors caused by disclosure of express information due to internal self behaviors of malicious couriers/express companies or infiltration of hackers.

Description

Logistics privacy protection method
Technical Field
The invention relates to the technical field of logistics, in particular to a logistics privacy protection method.
Background
Under the promotion of electronic commerce, the combination of the logistics industry and the Internet plus realizes the rapid development, and becomes one of the important components of life consumption. The logistics express delivery is more and more close with people's life, provides more convenient. However, logistics express delivery brings convenience and brings privacy disclosure risks, and particularly, the logistics express delivery risks are applicable to enterprise organizations with high requirements on privacy attributes.
In the existing link of logistics express delivery, a large number of threats exist to the privacy of individual users and enterprise users.
As shown in fig. 1, when organization a member user 1 mails/signs a courier,
(1) after the user signs for express delivery, order information on the package is not properly processed, and personal or enterprise privacy disclosure may be caused.
(2) The sender fills unnecessary privacy information when filling out the express order, and personal and enterprise privacy can be leaked. (for example: sending: password textroom of research and development department of high-precision technology institute of A, X division, contact telephone: 123456789; receiver: precision instruments textroom of electronic engineering department of high-precision engineering institute of B, B division, recipient: Y division, contact telephone: 987654321).
(3) Express delivery information is maliciously stolen by others due to negligence when a courier transports the express delivery.
(4) Malicious express delivery personnel utilize the job to intentionally reveal express delivery information.
(5) The express service company leaks express information due to defects or infiltration of hackers.
(6) Express companies themselves have privacy disclosure behaviors.
The "hidden address component" used in the prior art: in the service process of the hidden address piece, no matter a sender or a receiver, the address and the personal message of the other party can not be seen, and in the operation process, only a courier scans the bar code by using a bargun, the information of the two parties can be obtained, so that the safety is improved to a certain extent, and the privacy is protected. The drawbacks of this solution are: data such as contact telephone of a receiver/sender is stored in an express service party/an express company, which cannot prevent the problem of user privacy disclosure caused by malicious behavior inside the express service party/the express company and hackers permeating the express company. For enterprise organizations (such as a secret research institute, an army, and a government) with high requirements on self-privacy protection, it is not desirable that self-privacy be maintained at a third-party express company.
Therefore, it is an urgent need to solve the problem of the technical staff in the art to provide a method for protecting logistics privacy information, which can effectively avoid the privacy information from being leaked in the delivery process when a delivery company delivers an express item to an addressee company.
Disclosure of Invention
The invention aims to provide a logistics privacy protection method which is clear in logic and simple to operate, data such as privacy information on express items are stored in a user side instead of an express service side/an express company, and privacy disclosure behaviors caused by disclosure of express information due to malicious couriers/express companies or hackers.
Based on the above purposes, the technical scheme provided by the invention is as follows:
a logistics privacy protection method comprises the following steps:
s1, the mail sending company encrypts and generates a QR hidden code according to the express item privacy information and the mail sending company information;
s2, the delivery company delivers the express goods pasted with the QR hidden code labels to the express company and provides the public information of the express goods;
s3, the express company distributes the express items to the receiving company according to the public information of the express items;
s4, the receiving company analyzes the QR hidden code according to the information agreed with the sending company in advance to obtain the privacy information of the express goods;
the express article public information comprises an outgoing company external contact telephone, an outgoing company external public address, an incoming company external contact telephone and an incoming company external public address;
wherein, express delivery article privacy information includes:
a sender address, a sender contact phone, a receiver address and a receiver contact phone;
wherein, the step S1 specifically includes:
s11, the sender encrypts the sender address and the sender contact phone to generate a first ciphertext and uploads the first ciphertext, the recipient address and the recipient contact phone to the department to which the sender belongs;
s12, the department to which the sender belongs encrypts the recipient address, the recipient contact phone and the first ciphertext to generate a second ciphertext, and issues the second ciphertext and the sender information to a sender-receiver room of the sender;
s13, the sender-receiver room encrypts the sender-receiver room according to the sender-receiver information and the second ciphertext to generate a third ciphertext;
s14, the sending and receiving room of the sending company provides the contact telephone of the sending company and the address of the sending company for the express company to obtain the first QR code;
and S15, the sender-receiver room of the mail company analyzes the first QR code to obtain configuration information, and generates the QR hidden code according to the configuration information and the third ciphertext.
Preferably, in the steps S11, S12 and S13, the encryption process includes the steps of:
a1, encrypting the sender by a first key to generate the first ciphertext;
a2, the sender obtains a second key by adopting a hash algorithm on the first key;
a3, the department to which the sender belongs encrypts by the second key to generate a second ciphertext;
a4, the sender-receiver room encrypts the public key of the receiver company to generate the third cipher text.
Preferably, in step S15, the first QR code configuration information is version information, error correction level, and mask;
the sending and receiving room of the sending company generates the QR hidden code according to the configuration information and the third ciphertext, and specifically comprises the following steps:
and the sender-receiver room generates a QR hidden code according to the version information, the error correction level, the mask and the third ciphertext after the XOR processing.
Preferably, the step S4 is specifically:
s41, the receiving company transmitting and receiving room analyzes the QR hidden code to obtain the third ciphertext;
s42, the receiving company transceiving room restores the third ciphertext according to the prearranged information, obtains the information of the department to which the receiver belongs and the second ciphertext, and uploads the second ciphertext to the department to which the receiver belongs;
s43, the department to which the receiver belongs restores the second ciphertext according to the prearranged information, obtains the address of the receiver, the contact telephone of the receiver and the first ciphertext, and sends the first ciphertext to the receiver;
and S44, the receiver restores the first ciphertext according to the prearranged information to obtain the address of the sender and the contact telephone of the sender.
Preferably, the step S41 is specifically:
b1, the receiving company transceiving room analyzes the QR hidden code to obtain the configuration information of the first QR code;
b2, the receiving company transceiving room generates a second QR code according to the first QR code configuration information;
and B3, the receiving company transceiving room processes the second QR code and the QR hidden code in an exclusive OR mode to generate the third ciphertext.
Preferably, the pre-agreed information specifically includes:
the first secret key, the second secret key and a receiving company private key matched with the receiving company public key.
Preferably, in the steps S42, S43 and S44, the decryption process includes the steps of:
c1, the receiving company send-receive room restores the third ciphertext by the private key of the receiving company to obtain the second ciphertext;
c2, the department of the receiver restores the second ciphertext by using a second key to obtain a first ciphertext;
and C3, the receiver restores the first ciphertext by the first secret key to obtain the address of the sender and the contact telephone of the sender.
According to the logistics privacy protection method, sensitive mailing information is converted into an externally-opened communication address and a contact mode of an enterprise through an enterprise transceiving room, specific privacy information (including personal information and information of enterprise departments) is encrypted by a user and then is steganographically written on a QR hidden code label of express delivery, a traditional code scanner can only scan data required by express delivery, and after the express delivery is sent to a receiving enterprise, the transceiving room analyzes the QR hidden code according to information agreed with a mail sending company in advance, so that express item privacy information is obtained. Thus, the encryption key of the private information belongs to the enterprise user, not the express company. Even after the express package is signed and received, the express package is not properly processed, and other people cannot acquire the enterprise privacy of the sending and receiving and the individual privacy from the QR code. Including logistics express companies and couriers, etc. Since the privacy data is not stored in the logistics express company, even if the express company is infiltrated by hackers, the enterprise and personal privacy can not be disclosed.
In the actual application process, the express delivery company and the receiving company only need to agree on partial encryption and decryption information in advance, such as public keys, private keys and the like, so that logistics transmission of express items can be completed, the flow of the express delivery logistics company is completely unchanged, the express delivery company does not need to make any modification, and workers or hackers of the express delivery company cannot know privacy information contained in the express delivery items. Therefore, privacy disclosure caused by disclosure of express information due to malicious couriers/express companies or hackers infiltration is effectively prevented.
Compared with the prior art, the method has the following advantages:
(1) an effective solution is provided for the privacy protection problem of the enterprise organization express logistics with high privacy confidentiality requirement at present for the first time;
(2) by utilizing the error correction function of the logistics express QR code, the logistics privacy information is steganographically into the logistics QR code.
(3) This patent is different with other commodity circulation privacy protection schemes, need not to modify the operation of commodity circulation link, and the this patent of being convenient for promotes.
(4) The method has strong robustness (resistance) to factors of natural lines, angles, distances, light intensity and the like which distort images.
(5) The AES is used for realizing multi-stage encryption, and the reading range of private data is limited.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a block diagram of a logistics transportation process in the prior art;
fig. 2 is a flow chart of a method for protecting logistics privacy according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for protecting logistics privacy according to an embodiment of the present invention;
fig. 4 is a specific flowchart of step S1 in a method for protecting logistics privacy according to an embodiment of the present invention;
fig. 5 is a flowchart of an encryption process in a method for protecting logistics privacy according to an embodiment of the present invention;
fig. 6 is a specific flowchart of step S4 in a method for protecting logistics privacy according to an embodiment of the present invention;
fig. 7 is a specific flowchart of step S41 in a method for protecting logistics privacy according to an embodiment of the present invention;
fig. 8 is a flowchart of a decryption process in a method for protecting logistics privacy according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Embodiments of the present invention are written in a progressive manner.
An embodiment of the present invention provides a method for protecting logistics privacy, please refer to fig. 2. The technical problem of privacy disclosure behaviors caused by disclosure of express information due to self behaviors of malicious couriers/express companies or infiltration of hackers in the prior art is mainly solved.
Referring to fig. 3, a method for protecting logistics privacy includes the following steps:
s1, the mail sending company encrypts and generates a QR hidden code according to the express item privacy information and the mail sending company information;
s2, the delivery company delivers the express goods pasted with the QR hidden code labels to the express company and provides the public information of the express goods;
s3, the express company distributes the express items to the receiving company according to the public information of the express items;
s4, the receiving company analyzes the QR hidden code according to the information agreed with the sending company in advance to obtain the privacy information of the express goods;
the express article public information comprises an outgoing company external contact telephone, an outgoing company external public address, an incoming company external contact telephone and an incoming company external public address;
wherein, express delivery article privacy information includes:
a sender address, a sender contact phone, a receiver address and a receiver contact phone;
wherein, the step S1 specifically includes:
s11, the sender encrypts the sender address and the sender contact phone to generate a first ciphertext and uploads the first ciphertext, the recipient address and the recipient contact phone to the department to which the sender belongs;
s12, the department to which the sender belongs encrypts the recipient address, the recipient contact phone and the first ciphertext to generate a second ciphertext, and issues the second ciphertext and the sender information to a sender-receiver room of the sender;
s13, the sender-receiver room encrypts the sender-receiver room according to the sender-receiver information and the second ciphertext to generate a third ciphertext;
s14, the sending and receiving room of the sending company provides the contact telephone of the sending company and the address of the sending company for the express company to obtain the first QR code;
and S15, the sender-receiver room of the mail company analyzes the first QR code to obtain configuration information, and generates the QR hidden code according to the configuration information and the third ciphertext.
Preferably, in the steps S11, S12 and S13, the encryption process includes the steps of:
a1, encrypting the sender by a first key to generate the first ciphertext;
a2, the sender obtains a second key by adopting a hash algorithm on the first key;
a3, the department to which the sender belongs encrypts by the second key to generate a second ciphertext;
a4, the sender-receiver room encrypts the public key of the receiver company to generate the third cipher text.
In step S1, the sending company encrypts the express item privacy information and the sending company information to generate a QR hidden code.
The information of the sending company comprises information of sending departments, receiving departments and the like, and can be added or deleted according to actual needs.
It should be noted that "QR" of a QR code is an abbreviation of Quick Response. The two-dimensional code can be read quickly, and compared with the prior bar code, the QR code can store richer information, including encryption of characters, URL addresses and other types of data. The QR code was invented by Denso-Wave corporation of japan in 1994, and the standard JIS X0510 of the QR code was issued in 1 month in 1999, while its corresponding ISO international standard ISO/IEC18004 was approved in 6 months in 2000. According to website data of Denso Wave company, the QR code belongs to an open standard, the specification of the QR code is public, and patent rights held by Denso Wave company cannot be implemented. In addition to the standard QR code, there is also a format called "micro QR code", which is a scaled down version of the QR code standard, designed primarily for applications that cannot handle larger scans. The miniature QR codes also have various standards, and can store 35 characters at most.
The matrix QR code is coded by different distribution of black and white pixels in a matrix in a rectangular space. On the corresponding element positions of the matrix, binary '1' is represented by the appearance of points (square points, round points or other shapes), binary '0' is represented by the absence of the points, and the significance represented by the matrix type two-dimensional bar code is determined by the arrangement and combination of the points. The matrix QR code is a new pattern symbol automatic recognizing and reading processing code system established on the basis of computer image processing technology, combined coding principle and the like.
And the QR hidden code is generated by writing the private information of the express goods into the QR code by adopting steganography. Among them, steganography is a skill and science about information hiding, which means that anyone other than the intended recipient is not made aware of the delivery event of information or the content of information. Steganography, a technique that can embed secret information into a digital medium without compromising the quality of its carrier. The third party is neither aware of the existence of the secret information nor is it known to exist. The key, digital signature and private information can thus be securely transferred in an open environment such as the Internet or an intranet.
In this embodiment, the generated first and second QR codes and the QR hidden code are matrix QR codes. And the qrcode coding and decoding tools are written by Java, are zxing-based coding libraries and decoding libraries, and can complete the interconversion between the two-dimensional code picture and the text through a command line.
In step S2, the generated QR hidden code label of the mail company is attached to the express item to be transported in logistics, and the express item is delivered to the express company, and meanwhile, a part of public information of the express item necessary for logistics transportation is provided.
In step S3, the delivery company delivers the delivery item to the receiving company according to the delivery item disclosure information provided by the sending company.
In step S4, the receiving company analyzes the QR hidden code according to the information agreed by the sending company in advance, and obtains the privacy information of the express item according to the analysis result.
The receiving company and the sending company can communicate appointed information content according to actual needs, and the adopted modes can be interview, encrypted chat, secret mails and the like. In this embodiment, the sending company and the receiving company can jointly build/join an intranet, and the appointed content rule is formulated and shared through the intranet with higher security.
The express article public information comprises an outgoing company external contact telephone, an outgoing company external public address, an incoming company external contact telephone and an incoming company external public address.
In the actual application process, the express article public information refers to information necessary for the logistics transportation process, and if the part of the information is lacked, the logistics transportation can not be carried out. In this embodiment, since the sender address, the contact phone, the receiver address and the contact phone are hidden, in order to ensure that logistics transmission is smoothly performed and that privacy information of an express item is not leaked, the sender provides an external contact phone of the sender, an external public address of the sender, an external contact phone of the receiver and an external public address of the receiver to the sender to the express company. The part of the content belongs to the public content, and the express company can smoothly deliver and distribute the express goods to the receiving company according to the content.
According to the logistics privacy protection method, sensitive mailing information is converted into an externally-opened communication address and a contact mode of an enterprise through an enterprise transceiving room, specific privacy information (including personal information and information of enterprise departments) is encrypted by a user and then is steganographically written on a QR hidden code label of express delivery, a traditional code scanner can only scan data required by express delivery, and after the express delivery is sent to a receiving enterprise, the transceiving room analyzes the QR hidden code according to information agreed with a mail sending company in advance, so that express item privacy information is obtained. Thus, the encryption key of the private information belongs to the enterprise user, not the express company. Even after the express package is signed and received, the express package is not properly processed, and other people cannot acquire the enterprise privacy of the sending and receiving and the individual privacy from the QR code. Including logistics express companies and couriers, etc. Since the privacy data is not stored in the logistics express company, even if the express company is infiltrated by hackers, the enterprise and personal privacy can not be disclosed.
In the actual application process, the express delivery company and the receiving company only need to agree on partial encryption and decryption information in advance, such as public keys, private keys and the like, so that logistics transmission of express items can be completed, the flow of the express delivery logistics company is completely unchanged, the express delivery company does not need to make any modification, and workers or hackers of the express delivery company cannot know privacy information contained in the express delivery items. Therefore, privacy disclosure caused by disclosure of express information due to malicious couriers/express companies or hackers infiltration is effectively prevented.
Wherein, express delivery article privacy information includes: sender address, sender contact phone, recipient address, recipient contact phone.
In the actual application process, the express item privacy information comprises a sender address, a contact telephone, a receiver address and a contact telephone. It should be noted that the express item privacy information does not affect the logistics transmission flow and includes information with a certain client privacy. In this embodiment, other contents may be added according to actual needs, such as unnecessary privacy information in the example of the risk (2) that may exist in the background art, and information such as the positions and titles of the sender and the recipient may be specifically added to the privacy information of the express item.
Referring to fig. 4, step S1 specifically includes:
s11, encrypting the sender address and the sender contact phone to generate a first ciphertext by the sender, and uploading the first ciphertext, the recipient address and the recipient contact phone to a department to which the sender belongs;
s12, encrypting a second ciphertext by the department to which the sender belongs according to the address of the recipient, the contact telephone of the recipient and the first ciphertext, and issuing the second ciphertext and the information of the sending company to a sending and receiving room of the sending company;
s13, the sending and receiving room of the sending company encrypts and generates a third ciphertext according to the information of the sending company and the second ciphertext;
s14, the sending and receiving room of the sending company provides a contact telephone of the sending company and an address of the sending company for the express company to acquire a first QR code;
and S15, the sending and receiving room of the sending company analyzes the first QR code to obtain configuration information, and generates a QR hidden code according to the configuration information and the third ciphertext.
In step S11, the sender encrypts the address and the contact phone number of the sender to generate a first ciphertext, uploads the first ciphertext to the department to which the sender belongs through the internal network of the sending company, and hands over the express items to the department to which the sender belongs.
In step S12, the department to which the sender belongs encrypts the address of the recipient and the contact number of the recipient to generate a second ciphertext, and sends the second ciphertext, the information of the sending company and the express item to the sending and receiving room of the sending company.
In step S13, the sending and receiving room of the sending company encrypts the second ciphertext according to the sending department, the receiving department, and the second ciphertext to generate a third ciphertext.
In step S14, the delivery company sending/receiving room provides the contact telephone and the address of the delivery company to the delivery company, so that the delivery company generates the first QR code and acquires the first QR code.
In step S14, the sender-receiver office parses the first QR code to obtain QR code configuration information, and generates a QR steganographic code by steganography according to the QR code configuration information and the third ciphertext.
In the actual application process, three times of encryption and one-time steganography are carried out in the process that a sender arrives at a sending and receiving room of a sending company, so that the QR hidden code containing the express item privacy information is obtained.
Referring to fig. 5, preferably, in steps S11, S12 and S13, the encryption process includes the following steps:
A1. encrypting the sender by using a first secret key to generate a first ciphertext;
A2. the sender acquires a second key from the first key by adopting a Hash algorithm;
A3. the department to which the sender belongs encrypts by a second key to generate a second ciphertext;
A4. the sender-receiver room encrypts the public key of the receiver to generate a third ciphertext.
In the practical application process, the A1 and A3 encryption both use AES encryption algorithm, and a process of processing the first key through the hash algorithm is also included between the two encryptions. A4 encrypts the second ciphertext with the public key of the recipient company using the RSA encryption algorithm to generate a third ciphertext.
The Encryption adopted in this embodiment is AES Encryption, Advanced Encryption Standard (AES), also called Rijndael Encryption method in cryptography, which is a block Encryption Standard adopted by the federal government in the united states. This standard, which is used to replace the original DES, has been analyzed by many parties and is widely used throughout the world. Through the five-year selection process, the advanced encryption standard was released by the National Institute of Standards and Technology (NIST) in FIPS PUB 197 at 11/26/2001 and became an effective standard at 26/5/2002. In 2006, the advanced encryption standard has become one of the most popular algorithms in symmetric key encryption. RSA encryption is one of the most widely used public key cryptosystems. It was proposed in 1977 together by ronard listeriost (Ron Rivest), addi samor (Adi Shamir) and lunard Adleman (leonarard Adleman). The RSA public key cryptosystem uses different encryption and decryption keys. In the RSA cryptosystem, the public key is public information and the private key needs to be kept secret. Although the private key is determined by the public key, the private key cannot be calculated from the public key.
Preferably, in step S15, the first QR code configuration information is specifically version information, error correction level, and mask;
the sending and receiving room of the sending company generates a QR hidden code according to the configuration information and the third ciphertext, and the method specifically comprises the following steps:
and the sender-receiver room of the sender company generates a QR hidden code according to the version information, the error correction level, the mask and the third ciphertext after the XOR processing.
It should be noted that the QR encoding process includes:
1. and (3) data analysis: determining the type of the coded character, and converting the coded character into a symbolic character according to a corresponding character set; and selecting an error correction level, wherein the higher the error correction level is, the smaller the real data capacity is under the condition of a certain specification.
2. And (3) data encoding: the data characters are converted into bit streams, and each 8 bits of the bit streams form a code word sequence of data as a whole. The data content of the two-dimensional code is known by actually knowing the data code word sequence.
Data may be encoded in a mode for more efficient decoding, such as: for the data: 01234567 encoding (version 1-H),
1) grouping: 01234567
2) Conversion to binary:
012→0000001100
345→0101011001
67 →1000011
3) and (3) converting into a sequence: 000000110001010110011000011
4) Converting the character number into binary system: 8 → 0000001000
5) Join mode indicator (upper figure) 0001: 00010000001000000000110001010110011000011
3. Error correction coding: the above codeword sequence is partitioned as required, and error correction codewords are generated based on the error correction level and the partitioned codewords, and added to the data codeword sequence as a new sequence.
In the case of determining the two-dimensional code specification and the error correction level, the total number of codewords and the number of error correction codewords that can be accommodated by the two-dimensional code specification and the error correction level are determined, for example: version 10, error correction level H, can accommodate a total of 346 codewords, 224 error correction codewords.
That is, approximately 1/3 codewords in the two-dimensional code region are redundant. For these 224 error correction codewords, it can correct 112 replacement errors (e.g. black-white inversion) or 224 data read errors (unreadable or undecodable), such that the error correction capacity is: 112/346= 32.4%.
4. And (3) constructing final data information: the sequences generated above are placed in order in blocks under the conditions specified by the specification.
The data is divided into blocks according to the specification, then each block is calculated to obtain a corresponding error correction code word block, the error correction code word blocks form a sequence in sequence, and final codes (final bits) are obtained by adding the sequence to the original data code word sequence.
Such as: d1, D12, D23, D35, D2, D13, D24, D36, … D11, D22, D33, D45, D34, D46, E1, E23, E45, E67, E2, E24, E46, E68, …
And after the third ciphertext and the final code are subjected to XOR processing, the third ciphertext and the final code are put into the step to construct final data information.
It should be noted that bitwise exclusive-or of two numbers means a ratio of one bit to one bit starting from one bit. If the corresponding bits of the two numbers are the same, the result is 0, and the difference is 1; the encryption process is to xor the secret bits with each bit. The decryption process is that the ciphertext is subjected to exclusive or operation with the same character to obtain secret.
5. Constructing a matrix: and putting the detection graph, the separator, the positioning graph, the correction graph and the code word module into a matrix.
And filling the above complete sequence into the area of the two-dimensional code matrix with the corresponding specification.
6. Masking: the use of a mask pattern for the code area of the symbol enables an optimal ratio of dark and light (black and white) areas in the two-dimensional code pattern.
7. Format and version information: and the generated format and version information are put into the corresponding area.
Versions 7-40 all contain version information, all 0's without version information. Two locations on the two-dimensional code contain version information, which are redundant.
The version information has a matrix of 18 bits, 6X3, where 6 bits are data, e.g., version information 8, data bits are information 001000, and the next 12 bits are error correction bits.
Referring to fig. 6, preferably, step S4 specifically includes:
s41, the receiving and sending room of the receiving company analyzes the QR hidden code to obtain a third ciphertext;
s42, the receiving and sending room of the receiving company restores a third ciphertext according to the prearranged information, obtains the information of the department to which the receiver belongs and a second ciphertext, and uploads the second ciphertext to the department to which the receiver belongs;
s43, the department to which the addressee belongs restores the second ciphertext according to the prearranged information, obtains the address of the addressee, the contact telephone of the addressee and the first ciphertext, and sends the first ciphertext to the addressee;
and S44, the receiver restores the first ciphertext according to the prearranged information to obtain the address of the sender and the contact telephone of the sender.
In step S41, the receiving company room scans the QR hidden code label on the received express item to obtain the QR hidden code, and analyzes the QR hidden code to obtain the third ciphertext.
In step S42, the receiving and dispatching room of the receiving company restores the third ciphertext according to the information agreed with the sending company in advance, so as to obtain the information of the department to which the receiving person belongs and the second ciphertext, and upload the second ciphertext to the department to which the receiving person belongs.
In step S43, the receiving company department restores the second ciphertext according to the information agreed with the sending company in advance, so as to obtain the address of the recipient, the contact telephone of the recipient, and the first ciphertext, and send the first ciphertext to the recipient.
In step S44, the recipient restores the first ciphertext according to the pre-agreed information, so as to obtain the address of the sender and the contact phone of the sender, and the decryption restoration process is ended.
Referring to fig. 7, preferably, step S41 specifically includes:
B1. analyzing the QR hidden code by a receiving and dispatching room of a receiving company to obtain first QR code configuration information;
B2. the receiving company transceiving room generates a second QR code according to the first QR code configuration information;
B3. and the receiving and sending room of the receiving company processes the second QR code and the QR hidden code in an exclusive or mode to generate a third ciphertext.
In the actual application process, the receiving company transceiving room analyzes the QR hidden code, so that first QR code configuration information, namely version information, error correction level and mask, is obtained. And regenerating the second QR code according to the configuration information, wherein the second QR code is consistent with the first QR code due to the same version information, error correction level and mask. And then, the receiving company transceiving room carries out exclusive OR processing on the second QR code and the QR hidden code so as to obtain a third ciphertext.
Preferably, the pre-agreed information is specifically:
the first secret key, the second secret key and the receiving company private key matched with the receiving company public key.
In this embodiment, the sending company and the receiving company may jointly build/join an intranet, and the receiving company accesses the sending company through the intranet to obtain the first secret key, the second secret key and the private key matched with the public key of the receiving company.
Referring to fig. 8, preferably, in steps S42, S43 and S44, the decryption process includes the following steps:
C1. the receiving company transceiving room restores the third ciphertext by using the receiving company private key to obtain a second ciphertext;
C2. the recipient department restores the second ciphertext by using the second secret key to obtain a first ciphertext;
C3. and the receiver restores the first ciphertext by using the first secret key to acquire the address of the sender and the contact telephone of the sender.
In the actual application process, the recovery decryption process of the receiving company corresponds to the encryption process of the sending company, and the third ciphertext is recovered by the private key of the receiving company to obtain a second ciphertext; restoring the second ciphertext by using the second key to obtain a first ciphertext; and finally, restoring the first ciphertext through the first secret key, so as to obtain the privacy information of express items such as the address of the sender, the contact phone of the sender and the like.
In the embodiments provided in the present application, it should be understood that the disclosed method can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the modules is only one division of logical functions, and other divisions may be realized in practice, such as: multiple modules or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be electrical, mechanical or other.
In addition, all functional modules in the embodiments of the present invention may be integrated into one processor, or each module may be separately used as one device, or two or more modules may be integrated into one device; each functional module in each embodiment of the present invention may be implemented in a form of hardware, or may be implemented in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by program instructions and related hardware, where the program instructions may be stored in a computer-readable storage medium, and when executed, the program instructions perform the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The logistics privacy protection method provided by the invention is described in detail above. The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A logistics privacy protection method is characterized by comprising the following steps:
s1, the mail sending company encrypts and generates a QR hidden code according to the express item privacy information and the mail sending company information;
s2, the delivery company delivers the express goods pasted with the QR hidden code labels to the express company and provides the public information of the express goods;
s3, the express company distributes the express items to the receiving company according to the public information of the express items;
s4, the receiving company analyzes the QR hidden code according to the information agreed with the sending company in advance to obtain the privacy information of the express goods;
the express article public information comprises an outgoing company external contact telephone, an outgoing company external public address, an incoming company external contact telephone and an incoming company external public address;
wherein, express delivery article privacy information includes:
a sender address, a sender contact phone, a receiver address and a receiver contact phone;
wherein, the step S1 specifically includes:
s11, the sender encrypts the sender address and the sender contact phone to generate a first ciphertext and uploads the first ciphertext, the recipient address and the recipient contact phone to the department to which the sender belongs;
s12, the department to which the sender belongs encrypts the recipient address, the recipient contact phone and the first ciphertext to generate a second ciphertext, and issues the second ciphertext and the sender information to a sender-receiver room of the sender;
s13, the sender-receiver room encrypts the sender-receiver room according to the sender-receiver information and the second ciphertext to generate a third ciphertext;
s14, the sending and receiving room of the sending company provides the contact telephone of the sending company and the address of the sending company for the express company to obtain the first QR code;
and S15, the sender-receiver room of the mail company analyzes the first QR code to obtain configuration information, and generates the QR hidden code according to the configuration information and the third ciphertext.
2. The logistics privacy protection method of claim 1, wherein in the steps S11, S12 and S13, the encryption process comprises the steps of:
a1, encrypting the sender by a first key to generate the first ciphertext;
a2, the sender obtains a second key by adopting a hash algorithm on the first key;
a3, the department to which the sender belongs encrypts by the second key to generate a second ciphertext;
a4, the sender-receiver room encrypts the public key of the receiver company to generate the third cipher text.
3. The logistics privacy protection method of claim 2, wherein in the step S15, the first QR code configuration information is specifically version information, error correction level, and mask;
the sending and receiving room of the sending company generates the QR hidden code according to the configuration information and the third ciphertext, and specifically comprises the following steps:
and the sender-receiver room generates a QR hidden code according to the version information, the error correction level, the mask and the third ciphertext after the XOR processing.
4. The logistics privacy protection method of claim 3, wherein the step S4 is specifically:
s41, the receiving company transmitting and receiving room analyzes the QR hidden code to obtain the third ciphertext;
s42, the receiving company transceiving room restores the third ciphertext according to the prearranged information, obtains the information of the department to which the receiver belongs and the second ciphertext, and uploads the second ciphertext to the department to which the receiver belongs;
s43, the department to which the receiver belongs restores the second ciphertext according to the prearranged information, obtains the address of the receiver, the contact telephone of the receiver and the first ciphertext, and sends the first ciphertext to the receiver;
and S44, the receiver restores the first ciphertext according to the prearranged information to obtain the address of the sender and the contact telephone of the sender.
5. The logistics privacy protection method of claim 4, wherein the step S41 is specifically:
b1, the receiving company transceiving room analyzes the QR hidden code to obtain the configuration information of the first QR code;
b2, the receiving company transceiving room generates a second QR code according to the first QR code configuration information;
and B3, the receiving company transceiving room processes the second QR code and the QR hidden code in an exclusive OR mode to generate the third ciphertext.
6. The logistics privacy protection method of claim 4, wherein the pre-agreed information is specifically:
the first secret key, the second secret key and a receiving company private key matched with the receiving company public key.
7. The logistics privacy protection method of claim 6, wherein in the steps S42, S43 and S44, the decryption process comprises the steps of:
c1, the receiving company send-receive room restores the third ciphertext by the private key of the receiving company to obtain the second ciphertext;
c2, the department of the receiver restores the second ciphertext by using a second key to obtain a first ciphertext;
and C3, the receiver restores the first ciphertext by the first secret key to obtain the address of the sender and the contact telephone of the sender.
CN202111126297.2A 2021-09-26 2021-09-26 Logistics privacy protection method Active CN113591132B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111126297.2A CN113591132B (en) 2021-09-26 2021-09-26 Logistics privacy protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111126297.2A CN113591132B (en) 2021-09-26 2021-09-26 Logistics privacy protection method

Publications (2)

Publication Number Publication Date
CN113591132A CN113591132A (en) 2021-11-02
CN113591132B true CN113591132B (en) 2021-12-21

Family

ID=78242361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111126297.2A Active CN113591132B (en) 2021-09-26 2021-09-26 Logistics privacy protection method

Country Status (1)

Country Link
CN (1) CN113591132B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9009859B2 (en) * 2012-09-07 2015-04-14 Mapmyid, Inc. Address exchange system and methods
CN105574692A (en) * 2015-12-02 2016-05-11 华南农业大学 Anonymous express information security system based on two-dimension code
CN105608545A (en) * 2015-12-22 2016-05-25 广东梦森信息科技有限公司 Call center based express information encryption system and method
CN110610096A (en) * 2019-09-04 2019-12-24 广东外语外贸大学 Express information protection method

Also Published As

Publication number Publication date
CN113591132A (en) 2021-11-02

Similar Documents

Publication Publication Date Title
CN105719120B (en) A method of encryption express delivery list privacy information
US7095855B1 (en) Message identification with confidentiality, integrity, and source authentication
CN107104969B (en) Method for protecting personal privacy information in express by applying dynamic encryption mechanism
CN106453268B (en) A method of realizing express delivery secret protection in logistics progress
US8180048B2 (en) Method and system for computational transformation
CN105323064A (en) System and method for on-line adding of instant file dynamic label and on-line encryption
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN104243149A (en) Encrypting and decrypting method, device and server
CN101388776A (en) Ciphering and deciphering method and device for printed written files
CN108710931B (en) Mailing address information privacy protection method based on two-dimensional code
CN113591132B (en) Logistics privacy protection method
Zhan Anti-fake technology of commodity by using QR code
CN1422034A (en) Utilization of symmetrical cipher for network digital signature
Chow et al. Covert QR codes: How to hide in the crowd
Sunday et al. An Efficient Data Protection for Cloud Storage Through Encryption
Rapolu et al. A Secure method for Image Signaturing using SHA-256, RSA, and Advanced Encryption Standard (AES)
US20130251147A1 (en) Lexicon Cryptogram Generation System For Electronic Messaging
CN113221131B (en) LWE-based QR code encryption and decryption method
Sharma et al. Security on Cloud Computing Using Pseudo-random Number Generator Along with Steganography
CN100369405C (en) Authentication receipt
Prem Jacob et al. Embedded Extended Visual Cryptography
Munir et al. Key Generation and Verification for Image Authentication
Sharmila et al. Smartphone based secure color QR code using visible light communication
Jegadeesan et al. Multi Secret Sharing with Encrypted Data Hiding for Secure Communication
Revanna Kumar Cloud Data Security Improvement Using Steganography by Pseudo Random Number Generation (PRNG)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant