CN113919922A - Method and device for sending core cancellation code, electronic equipment and computer readable medium - Google Patents

Method and device for sending core cancellation code, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN113919922A
CN113919922A CN202111335621.1A CN202111335621A CN113919922A CN 113919922 A CN113919922 A CN 113919922A CN 202111335621 A CN202111335621 A CN 202111335621A CN 113919922 A CN113919922 A CN 113919922A
Authority
CN
China
Prior art keywords
code
verification
cancellation
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111335621.1A
Other languages
Chinese (zh)
Inventor
徐意
蒙淮
吴志刚
张朝宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Pinjie Network Technology Co Ltd
Original Assignee
Hangzhou Pinjie Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Pinjie Network Technology Co Ltd filed Critical Hangzhou Pinjie Network Technology Co Ltd
Priority to CN202111335621.1A priority Critical patent/CN113919922A/en
Publication of CN113919922A publication Critical patent/CN113919922A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders

Abstract

The embodiment of the disclosure discloses a core cancellation code sending method, a core cancellation code sending device, electronic equipment and a computer readable medium. One embodiment of the method comprises: acquiring user order information corresponding to the warehousing information code; changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code; generating a verification code according to the goods taking code and the state code included by the user order information; carrying out first encryption processing on a user mobile phone number and a goods taking address included in user order information by using a login password to obtain a target information code; performing second encryption processing on the target information code and the verification code by adopting a verification code generator to obtain a verification code; and sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information. According to the embodiment, different keys are used at different verification and cancellation points to generate verification and cancellation codes, so that after the key of one verification and cancellation point is broken, the safety of the verification and cancellation codes generated by other verification and cancellation points is not influenced, and the overall safety of the verification and cancellation codes is improved.

Description

Method and device for sending core cancellation code, electronic equipment and computer readable medium
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to a method and a device for sending a core cancellation code, electronic equipment and a computer readable medium.
Background
The verification and cancellation code is an electronic certificate code generated for verifying the authenticity of the user identity when the user takes the piece. At present, when generating the verification and cancellation code, the following method is generally adopted: different verification and cancellation points use the same secret key to generate verification and cancellation codes or use a goods taking code with a specific number of digits as the verification and cancellation codes.
However, when generating the verification code in the above manner, there are often the following technical problems:
firstly, different verification and cancellation points use the same secret key to generate verification and cancellation codes, so that after the secret key and a decryption algorithm are cracked, an illegal user can forge and decrypt the verification and cancellation codes generated by all the verification and cancellation points, the overall security of the verification and cancellation codes is lower, and the probability of falsely claiming articles is increased;
secondly, the goods taking codes with specific digits belong to plain codes, so that the goods taking codes are easy to leak, the safety of the goods verification and cancellation codes is low, and the probability of falsely claiming goods is increased.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a core cancellation code sending method, apparatus, electronic device and computer readable medium to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a core cancellation code sending method, including: in response to the detection of the warehousing information code, acquiring user order information corresponding to the warehousing information code, wherein the user order information comprises: the user mobile phone number, the status code and the goods taking address; changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code; generating a verification code according to the goods taking code and the status code included in the user order information; carrying out first encryption processing on a user mobile phone number and a goods-taking address included in the user order information by using a login password to obtain a target information code, wherein the login password is a password which is stored in advance and is used when a target terminal logs in; performing second encryption processing on the target information code and the verification code by adopting a verification code generator to obtain a verification code; and sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information.
In a second aspect, some embodiments of the present disclosure provide an apparatus for transmitting a core cancellation code, the apparatus including: an obtaining unit configured to obtain, in response to detecting a warehousing information code, user order information corresponding to the warehousing information code, wherein the user order information includes: the user mobile phone number, the status code and the goods taking address; the first generation unit is configured to change the state of the state code into a state representing that the article is put in storage and generate a goods taking code; a second generating unit configured to generate a verification code according to the pickup code and a status code included in the user order information; a first encryption unit configured to perform a first encryption process on a user mobile phone number and a pickup address included in the user order information by using a login password to obtain a target information code, wherein the login password is a pre-stored password used when a target terminal logs in; a second encryption unit configured to perform a second encryption process on the target information code and the verification code by using a verification code generator to obtain a verification code; and the sending unit is configured to send the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method described in any of the implementations of the first aspect.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium on which a computer program is stored, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect.
The above embodiments of the present disclosure have the following advantages: by the verification and cancellation code sending method of some embodiments of the disclosure, different verification and cancellation points can use different keys to generate verification and cancellation codes, and after the key of one verification and cancellation point is broken, the security of the verification and cancellation codes generated by other verification and cancellation points cannot be influenced, so that the overall security of the verification and cancellation codes is improved, and the probability of falsely claiming articles is reduced. Specifically, the reason why the overall security of the core cancellation code is relatively low is that: different verification and cancellation points use the same secret key to generate verification and cancellation codes, so that after the secret key and the decryption algorithm are cracked, an illegal user can forge and decrypt the verification and cancellation codes generated by all the verification and cancellation points. Based on this, in the verification and cancellation code sending method of some embodiments of the present disclosure, first, in response to detecting a warehousing information code, user order information corresponding to the warehousing information code is obtained, where the user order information includes: user's cell-phone number, status code and address of getting goods. And then, changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code. Therefore, the goods taking codes are generated for the goods to be warehoused, and the storage positions of the warehoused goods can be determined according to the goods taking codes. And then, generating a verification code according to the goods taking code and the state code included by the user order information. Therefore, the goods taking code can be encrypted by generating the verification code, and the safety of the goods taking code is ensured. And then, carrying out first encryption processing on the user mobile phone number and the goods-taking address included in the user order information by using a login password to obtain a target information code, wherein the login password is a password which is stored in advance and is used when a target terminal logs in. Therefore, the order information of the user is encrypted by using the login password of the verification and cancellation point, the safety of the order information of the user can be ensured, and after the login password of one verification and cancellation point is cracked, the safety of verification and cancellation codes generated by other verification and cancellation points cannot be influenced. And then, performing second encryption processing on the target information code and the verification code by using a verification code generator to obtain a verification code. Therefore, the encrypted order information is encrypted again by using the verification and cancellation code generator, so that the verification and cancellation code is displayed in a ciphertext mode, the security of the verification and cancellation code is improved, and the possibility of falsifying the article is reduced. And finally, sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information. Therefore, the verification and cancellation code is sent to the corresponding user terminal, and the legality of the user identity receiving the verification and cancellation code can be guaranteed. The core cancellation codes are generated by using different keys at different core cancellation points, so that after the key of one core cancellation point is broken, the security of the core cancellation codes generated by other core cancellation points cannot be influenced, and the overall security of the core cancellation codes is further improved.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
Fig. 1 is a schematic diagram of an application scenario of a core cancellation code sending method of some embodiments of the present disclosure;
fig. 2 is a flow diagram of some embodiments of a core cancellation code transmission method according to the present disclosure;
FIG. 3 is a flow diagram of further embodiments of a core cancellation code sending method according to the present disclosure;
FIG. 4 is a schematic block diagram of some embodiments of a core cancellation code transmitting device according to the present disclosure;
FIG. 5 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of an application scenario of a core cancellation code sending method according to some embodiments of the present disclosure.
In the application scenario of fig. 1, first, in response to detecting the warehousing information code 102, the computing device 101 may obtain user order information 103 corresponding to the warehousing information code 102, where the user order information 103 includes: user's cell phone number 1031, status code 1032 and pick-up address 1033. The computing device 101 may then change the state of the status code 1032 to a state that characterizes the item as being in-store and generate the pick code 104. Then, the computing device 101 may generate the verification code 105 according to the pick code 104 and the status code 1032 included in the user order information 103. Then, the computing device 101 may perform a first encryption process on the user mobile phone number 1031 and the pickup address 1033 included in the user order information 103 by using a login password, which is a password stored in advance and used when the target terminal logs in, to obtain the target information code 106. Then, the computing device 101 may perform a second encryption process on the target information code 106 and the verification code 105 by using the verification code generator, so as to obtain the verification code 107. Finally, the computing device 101 may send the verification and cancellation code 107 to the terminal device 108 corresponding to the user mobile phone number 1031 included in the user order information 103.
The computing device 101 may be hardware or software. When the computing device is hardware, it may be implemented as a distributed cluster composed of multiple servers or terminal devices, or may be implemented as a single server or a single terminal device. When the computing device is embodied as software, it may be installed in the hardware devices enumerated above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of computing devices in FIG. 1 is merely illustrative. There may be any number of computing devices, as implementation needs dictate.
With continued reference to fig. 2, a flow 200 of some embodiments of a core cancellation code transmission method according to the present disclosure is shown. The method for sending the core cancellation code comprises the following steps:
step 201, in response to detecting the warehousing information code, acquiring user order information corresponding to the warehousing information code.
In some embodiments, an executing entity (e.g., the computing device 101 shown in fig. 1) of the verification and cancellation code sending method may, in response to detecting the warehousing information code, decrypt the warehousing information code using a key of the pre-stored warehousing information code to obtain the user order information included in the warehousing information code. The warehousing information code is an information code generated by encrypting the user order information. The user order information may include: user's cell-phone number, status code and address of getting goods. The state code is used for representing whether the article is put in storage or not.
Step 202, changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code.
In some embodiments, the execution body may change the state of the state code to a state representing that the article has been put in storage and randomly generate a pickup number, and connect the shelf number, the layer number, and the pickup number, which are placed after the article has been put in storage, with a preset hyphen to obtain the pickup code. The pick code represents a unique storage location for the item.
Therefore, the goods taking codes are generated for the goods to be warehoused, and the storage positions of the warehoused goods can be determined according to the goods taking codes.
In some optional implementation manners of some embodiments, the modifying, by the execution main body, the state of the state code into a state representing that the article has been put in storage and generating the pickup code may include:
the method comprises the steps of firstly, acquiring a warehousing goods shelf number input by the target terminal, and taking the warehousing goods shelf number as a first serial number.
The warehousing shelf number is used for representing a shelf for placing the article corresponding to the warehousing information code. The warehousing shelf number may be composed of 2 decimal digits. For example, the warehousing shelf number may be 05.
Therefore, the shelf number stored after the goods are put in storage can be determined by acquiring the warehousing shelf number input by the target terminal.
And step two, acquiring the warehousing layer number input by the target terminal, and taking the warehousing layer number as a second sequence number.
And the warehousing layer number represents the number of shelf layers for placing the articles corresponding to the warehousing information code. The warehousing item layer number may be composed of 1 decimal number. For example, the warehousing layer number may be 2.
Therefore, the number of shelf layers stored after warehousing the warehoused articles can be determined by acquiring the warehousing layer number input by the target terminal.
And thirdly, determining the warehousing sequence number of the article corresponding to the warehousing information code according to the warehousing sequence of the article in a preset time period, and taking the warehousing sequence number as a third sequence number.
Wherein, the warehousing sequence number may be composed of 4 decimal digits. The sequence number of the first warehousing item in the preset time period may be 0001.
Therefore, the unique number of the warehousing article in the preset time period can be determined.
And fourthly, splicing the first serial number, the second serial number and the third serial number to obtain a goods picking code.
The first serial number, the second serial number and the third serial number can be spliced in sequence to obtain the goods picking code. For example, the pick code may be 0520001.
Therefore, the storage position of the goods in the warehouse can be uniquely determined according to the goods taking code.
Step 203, generating a verification code according to the goods taking code and the status code included in the user order information.
In some embodiments, the executing agent may first determine the digits of the status code included in the user order information as a mobile digit, then convert the pickup code from decimal to binary to obtain a binary pickup code, then move each binary digit of the binary pickup code to the right by moving the mobile digit, where the last digit moves to the right by 1 digit to become the first digit on the left of the binary pickup code, and finally convert the moved binary pickup code into decimal to obtain the verification code.
Therefore, the goods taking code can be encrypted by generating the verification code, and the safety of the goods taking code is ensured.
And step 204, carrying out first encryption processing on the user mobile phone number and the goods taking address included in the user order information by using the login password to obtain a target information code.
In some embodiments, the execution main body may use the login password as a key, and encrypt the user mobile phone number and the pickup address included in the user order information by using an advanced encryption standard algorithm to obtain the target information code. The login password is a password which is stored in advance and is used when the target terminal logs in.
Therefore, the order information of the user is encrypted by using the login password of the verification and cancellation point, the safety of the order information of the user can be ensured, and after the login password of one verification and cancellation point is cracked, the safety of verification and cancellation codes generated by other verification and cancellation points cannot be influenced.
In some optional implementation manners of some embodiments, the performing main body performs first encryption processing on the user mobile phone number and the pickup address included in the user order information by using the login password to obtain the target information code, and may include the following steps:
firstly, determining the digit of the login password as a target digit. Wherein, the login password is a decimal number password.
And secondly, rounding the quotient of the target digit and 2 downwards to obtain a first cipher digit.
Thirdly, rounding the quotient of the target digit and 2 upwards to obtain a second cipher digit;
fourthly, the login password of the first password digit before the login password is determined as the previous password.
And fifthly, determining the login password of the second password digit after the login password as a back password.
And sixthly, respectively carrying out binary conversion processing on the front password and the rear password to obtain a front binary password and a rear binary password.
The decimal front password and the decimal back password may be converted into a binary front password and a binary back password, respectively, to obtain a front binary password and a back binary password.
Thus, two encryption keys can be determined according to the login password.
In some optional implementation manners of some embodiments, the executing body performs first encryption processing on the user mobile phone number and the pickup address included in the user order information by using the login password to obtain the target information code, and may further include the following steps:
firstly, mapping the goods taking address included in the order information by adopting an address mapping relation to obtain an address information code.
The address mapping relationship may be a correspondence relationship between a pickup address and a verification and cancellation point code included in the order information. The core-cancellation point code is a decimal number representing the core-cancellation point address which is preset and stored. According to the address mapping relationship, the pick-up address included in the order information is converted into a verification and cancellation point code of a verification and cancellation point where the pick-up address included in the order information is located, and the verification and cancellation point code is determined as an address information code.
And secondly, determining the digits of the mobile phone number of the user included in the user order information as a first digit.
And thirdly, generating a first random number by taking the address information code as a random number seed.
The address information code may be used as a random number seed, and a random number function may be used to generate the first random number. Wherein the first random number has the same number of bits as the first number of bits. The random number function may be a rand () function.
Thus, encryption of the address information code can be realized.
And fourthly, performing binary conversion processing on the first random number to obtain a second random number.
And fifthly, carrying out binary conversion processing on the user mobile phone number included in the user order information to obtain a binary user mobile phone number.
And sixthly, performing exclusive or processing on the second random number and the binary system user mobile phone number to obtain a first information code.
Therefore, the encryption of the user mobile phone number included in the user order information can be realized.
And seventhly, generating a third random number by taking the pre-password as a random number seed.
The pre-password may be used as a random number seed, and a random number function may be used to generate the third random number. Wherein the third random number has the same number as the first number. The random number function may be a rand () function.
Thus, encryption of the pre-password can be achieved.
And eighthly, performing binary conversion processing on the third random number to obtain a fourth random number.
And ninthly, performing exclusive or processing on the fourth random number and the first information code to obtain a target information code.
Therefore, the user order information is encrypted by using the encrypted login password, so that the safety of the user order information can be improved.
And step 205, performing second encryption processing on the target information code and the verification code by using the verification and cancellation code generator to obtain the verification and cancellation code.
In some embodiments, the execution body may first perform decimal conversion processing on the target information code to obtain a decimal target information code, then add the decimal target information code to the verification code to obtain an intermediate number, and finally, may convert the intermediate number into a one-dimensional code using a one-dimensional code generator and use the one-dimensional code as a core-cancellation code.
Therefore, the encrypted order information is encrypted again by using the verification and cancellation code generator, so that the verification and cancellation code is displayed in a ciphertext mode, the security of the verification and cancellation code is improved, and the possibility of falsifying the article is reduced.
In some optional implementation manners of some embodiments, the performing main body performs a second encryption process on the target information code and the verification code by using a verification code generator to obtain a verification code, and may include the following steps:
in the first step, the digit of the verification code is determined as a second digit.
And secondly, generating a fifth random number by taking the post-password as a random number seed.
The post-password may be used as a random number seed, and a random number function may be used to generate a fifth random number. Wherein the fifth random number has the same number of bits as the second number of bits. The random number function may be a rand () function.
Thus, the encryption of the post-password can be realized.
And thirdly, performing binary conversion processing on the fifth random number to obtain a sixth random number.
And fourthly, carrying out XOR processing on the sixth random number and the bit conversion order code to obtain a second information code.
Therefore, the security of the user order information is further enhanced by encrypting the verification code by adopting the login password.
In some optional implementation manners of some embodiments, the executing unit may perform a second encryption process on the target information code and the verification code by using a verification code generator to obtain a verification code, and may further include the following steps:
firstly, performing decimal conversion processing on the target information code to obtain a first verification and cancellation information code.
And secondly, performing decimal conversion processing on the second information code to obtain a second cancel information code.
And thirdly, splicing the first verification and cancellation information code and the second verification and cancellation information code to obtain a verification and cancellation information code.
Therefore, different encryption algorithms are adopted for different user order information, and the safety of the user order information is further improved.
And fourthly, converting the verification and cancellation information code by adopting a verification and cancellation code generator to obtain the verification and cancellation code.
The verification and cancellation information code can be converted by adopting a two-dimensional code generator to obtain the verification and cancellation code.
Therefore, the cancel and verify information code of the plaintext is converted, so that the cancel and verify information code is displayed in a ciphertext mode, and the probability of the cancel and verify information code leakage can be reduced.
And step 206, sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information.
In some embodiments, the execution main body may send the reimbursement code to a terminal device corresponding to a user mobile phone number included in the user order information.
Therefore, the verification and cancellation code is sent to the corresponding user terminal, and the legality of the user identity receiving the verification and cancellation code can be guaranteed.
The above embodiments of the present disclosure have the following advantages: by the verification and cancellation code sending method of some embodiments of the disclosure, different verification and cancellation points can use different keys to generate verification and cancellation codes, and after the key of one verification and cancellation point is broken, the security of the verification and cancellation codes generated by other verification and cancellation points cannot be influenced, so that the overall security of the verification and cancellation codes is improved, and the probability of falsely claiming articles is reduced. Specifically, the reason why the overall security of the core cancellation code is relatively low is that: different verification and cancellation points use the same secret key to generate verification and cancellation codes, so that after the secret key and the decryption algorithm are cracked, an illegal user can forge and decrypt the verification and cancellation codes generated by all the verification and cancellation points. Based on this, in the verification and cancellation code sending method of some embodiments of the present disclosure, first, in response to detecting a warehousing information code, user order information corresponding to the warehousing information code is obtained, where the user order information includes: user's cell-phone number, status code and address of getting goods. And then, changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code. Therefore, the goods taking codes are generated for the goods to be warehoused, and the storage positions of the warehoused goods can be determined according to the goods taking codes. And then, generating a verification code according to the goods taking code and the state code included by the user order information. Therefore, the goods taking code can be encrypted by generating the verification code, and the safety of the goods taking code is ensured. And then, carrying out first encryption processing on the user mobile phone number and the goods-taking address included in the user order information by using a login password to obtain a target information code, wherein the login password is a password which is stored in advance and is used when a target terminal logs in. Therefore, the order information of the user is encrypted by using the login password of the verification and cancellation point, the safety of the order information of the user can be ensured, and after the login password of one verification and cancellation point is cracked, the safety of verification and cancellation codes generated by other verification and cancellation points cannot be influenced. And then, performing second encryption processing on the target information code and the verification code by using a verification code generator to obtain a verification code. Therefore, the encrypted order information is encrypted again by using the verification and cancellation code generator, so that the verification and cancellation code is displayed in a ciphertext mode, the security of the verification and cancellation code is improved, and the possibility of falsifying the article is reduced. And finally, sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information. Therefore, the verification and cancellation code is sent to the corresponding user terminal, and the legality of the user identity receiving the verification and cancellation code can be guaranteed. The core cancellation codes are generated by using different keys at different core cancellation points, so that after the key of one core cancellation point is broken, the security of the core cancellation codes generated by other core cancellation points cannot be influenced, and the overall security of the core cancellation codes is further improved.
With further reference to fig. 3, a flow 300 of further embodiments of a core cancellation code sending method is shown. The process 300 of the web page generation method includes the following steps:
step 301, in response to detecting the warehousing information code, obtaining user order information corresponding to the warehousing information code.
Step 302, changing the state of the state code into the state representing that the article is put in storage and generating a goods taking code.
In some embodiments, the specific implementation manner and technical effects of the steps 301 and 302 can refer to the steps 201 and 202 in the embodiments corresponding to fig. 2, which are not described herein again.
And 303, splicing the goods taking code and the status code included by the user order information to obtain an order code.
In some embodiments, the execution body may sequentially splice the pickup code and the status code included in the user order information to obtain an order code. Wherein, the goods fetching code can be composed of 7 decimal digits. The status code may be composed of 1 decimal digit.
And step 304, performing binary conversion processing on the order codes to obtain binary order codes.
In some embodiments, the executive may convert the decimal order code into a binary order code, resulting in a binary order code.
Step 305, performing bit conversion processing on the binary order code to obtain a bit-converted order code.
In some embodiments, the executing entity may perform bit conversion on the digits in the binary order code according to a preset position conversion information set to obtain a bit-converted order code. The position conversion information in the position conversion information set comprises a front position and a rear position. The position conversion information in the position conversion information set indicates that a digit of a first position bit of the binary order code is placed in a second position bit of the bit conversion order code. The above-described set of position conversion information may be { (18, 1), (10, 2), (2, 3), (20, 4), (12, 5), (4, 6), (22, 7), (14, 8), (6, 9), (24, 10), (16, 11), (8, 12), (17, 13), (9, 14), (1, 15), (19, 16), (11, 17), (3, 18), (21, 19), (13, 20), (5, 21), (23, 22), (15, 23), (7, 24) }. The above (18, 1) indicates that the 18 th digit of the binary order code is placed on the 1 st digit of the bit-converted order code.
Therefore, the encryption of the goods taking code and the status code included in the user order information can be realized.
And step 306, performing decimal conversion processing on the position conversion order code to obtain a verification code.
In some embodiments, the execution body may perform decimal conversion processing on the bit-converted order code to obtain the verification code.
From this, through encrypting the code of getting goods for the code of getting goods exists with the form of ciphertext, is difficult for causing the revealing and the forging of code of getting goods, and then improves the security of code of verifying and canceling, reduces the probability that article were falsely received.
Step 303 and step 306 and the related content serve as an invention point of the embodiment of the present disclosure, and solve the technical problem mentioned in the background art that "the pick-up code with a specific number of digits belongs to the plain code, which easily causes the leakage of the pick-up code, further causes the security of the verification and marketing code to be lower, and increases the probability of the article being falsely issued". The safety of the verification and sale code is low, and the factors that the article is easy to falsely claim are as follows: the goods taking codes with specific digits belong to plain codes, so that the goods taking codes are easy to leak. If the above factors are solved, the security of the verification and cancellation code can be improved. To achieve this effect, the present disclosure encrypts the pick code with a specific number of digits so that the pick code exists in a form of a ciphertext. Therefore, the safety of the verification and cancellation code is improved, and the probability of falsely claiming the article is reduced.
And 307, performing first encryption processing on the user mobile phone number and the pickup address included in the user order information by using the login password to obtain a target information code.
And 308, performing second encryption processing on the target information code and the verification code by using the verification code generator to obtain the verification code.
And 309, sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information.
In some embodiments, the specific implementation manner and technical effects of steps 307-309 can refer to steps 204-206 in those embodiments corresponding to fig. 2, which are not described herein again.
As can be seen from fig. 3, compared with the description of some embodiments corresponding to fig. 2, the flow 300 of the verification code sending method in some embodiments corresponding to fig. 3 embodies the steps of extending the generation of the verification code. Therefore, the scheme described in the embodiments encrypts the goods taking code, so that the goods taking code exists in a ciphertext form, the goods taking code is not easy to leak, the safety of the goods verification code is improved, and the possibility of falsely claiming goods is reduced.
With further reference to fig. 4, as an implementation of the methods shown in the above figures, the present disclosure provides some embodiments of a verification cancellation code transmitting apparatus, which correspond to those shown in fig. 2, and which may be applied in various electronic devices.
As shown in fig. 4, the verification cancellation code transmitting apparatus 400 of some embodiments includes: an acquisition unit 401, a first generation unit 402, a second generation unit 403, a first encryption unit 404, a second encryption unit 405, and a transmission unit 406. The obtaining unit 401 is configured to, in response to detecting the warehousing information code, obtain user order information corresponding to the warehousing information code, where the user order information includes: the user mobile phone number, the status code and the goods taking address; the first generating unit 402 is configured to change the state of the state code into a state representing that the article has been put in storage and generate a pick-up code; the second generating unit 403 is configured to generate a verification code according to the pick code and the status code included in the user order information; the first encryption unit 404 is configured to perform a first encryption process on the user mobile phone number and the pickup address included in the user order information by using a login password, so as to obtain a target information code, wherein the login password is a pre-stored password used when a target terminal logs in; the second encryption unit 405 is configured to perform a second encryption process on the target information code and the verification code by using a verification code generator, so as to obtain a verification code; and the sending unit 406 is configured to send the verification and cancellation code to the terminal device corresponding to the user mobile phone number included in the user order information.
It will be understood that the elements described in the apparatus 400 correspond to various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above with respect to the method are also applicable to the apparatus 400 and the units included therein, and will not be described herein again.
Referring now to FIG. 5, a block diagram of an electronic device (such as computing device 101 shown in FIG. 1)500 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, electronic device 500 may include a processing means (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Generally, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 507 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage devices 508 including, for example, magnetic tape, hard disk, etc.; and a communication device 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 illustrates an electronic device 500 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 5 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 508, or installed from the ROM 502. The computer program, when executed by the processing device 501, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to the detection of the warehousing information code, acquiring user order information corresponding to the warehousing information code, wherein the user order information comprises: user's cell-phone number, status code and address of getting goods. And changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code. And generating a verification code according to the goods taking code and the status code included by the user order information. And carrying out first encryption processing on the user mobile phone number and the goods-taking address included in the user order information by using a login password to obtain a target information code, wherein the login password is a password which is stored in advance and is used when a target terminal logs in. And performing second encryption processing on the target information code and the verification code by adopting a verification code generator to obtain a verification code. And sending the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, and may be described as: a processor includes an acquisition unit, a first generation unit, a second generation unit, a first encryption unit, a second encryption unit, and a transmission unit. The names of these units do not limit the unit itself in some cases, and for example, the sending unit may also be described as a "unit that sends the verification and cancellation code to the terminal device corresponding to the user mobile phone number included in the user order information".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (10)

1. A core cancellation code sending method comprises the following steps:
in response to the detection of the warehousing information code, acquiring user order information corresponding to the warehousing information code, wherein the user order information comprises: the user mobile phone number, the status code and the goods taking address;
changing the state of the state code into a state representing that the article is put in storage and generating a goods taking code;
generating a verification code according to the goods taking code and a status code included in the user order information;
carrying out first encryption processing on a user mobile phone number and a goods picking address included in the user order information by using a login password to obtain a target information code, wherein the login password is a password which is stored in advance and is used when a target terminal logs in;
performing second encryption processing on the target information code and the verification code by adopting a verification code generator to obtain a verification code;
and sending the verification and cancellation code to terminal equipment corresponding to the user mobile phone number included in the user order information.
2. The method of claim 1, wherein the modifying the state of the status code to characterize the state that the item has been put in storage and generating a pick code comprises:
acquiring a warehousing goods shelf number input by the target terminal, and taking the warehousing goods shelf number as a first serial number, wherein the warehousing goods shelf number represents a goods shelf for placing goods corresponding to the warehousing information code;
acquiring a warehousing layer number input by the target terminal, and taking the warehousing layer number as a second serial number, wherein the warehousing layer number represents the number of shelf layers for placing the articles corresponding to the warehousing information code;
determining the warehousing sequence number of the article corresponding to the warehousing information code according to the warehousing sequence of the article in a preset time period, and taking the warehousing sequence number as a third sequence number;
and splicing the first sequence number, the second sequence number and the third sequence number to obtain a goods taking code.
3. The method of claim 2, wherein generating a verification code based on the pick code and a status code included with the user order information comprises:
splicing the goods taking code and the status code included by the user order information to obtain an order code;
carrying out binary conversion processing on the order codes to obtain binary order codes;
carrying out bit conversion processing on the binary order codes to obtain bit conversion order codes;
and performing decimal conversion processing on the bit conversion order code to obtain a verification code.
4. The method as claimed in claim 3, wherein the first encryption processing of the user mobile phone number and the pickup address included in the user order information by using the login password to obtain the target information code comprises:
determining the digits of the login password as target digits;
rounding the quotient of the target digit and 2 downwards to obtain a first cipher digit;
rounding up the quotient of the target digit and 2 to obtain a second cipher digit;
determining the login password of the first password digit in front of the login password as a front password;
determining the login password of the second password digit after the login password as a back password;
and respectively carrying out binary conversion processing on the front password and the rear password to obtain a front binary password and a rear binary password.
5. The method as claimed in claim 4, wherein the first encryption processing is performed on the user mobile phone number and the pickup address included in the user order information by using the login password to obtain the target information code, further comprising:
adopting an address mapping relation to map the pick-up address included in the order information to obtain an address information code;
determining the digits of the user mobile phone number included in the user order information as a first digit;
generating a first random number by taking the address information code as a random number seed, wherein the digit of the first random number is the same as the first digit;
performing binary conversion processing on the first random number to obtain a second random number;
carrying out binary conversion processing on the user mobile phone number included in the user order information to obtain a binary user mobile phone number;
carrying out XOR processing on the second random number and the binary system user mobile phone number to obtain a first information code;
generating a third random number by taking the pre-password as a random number seed, wherein the digit of the third random number is the same as the first digit;
performing binary conversion processing on the third random number to obtain a fourth random number;
and carrying out XOR processing on the fourth random number and the first information code to obtain a target information code.
6. The method of claim 5, wherein the second encryption processing of the target information code and the verification code by using a verification code generator to obtain a verification code comprises:
determining the digit of the verification code as a second digit;
generating a fifth random number by taking the post-password as a random number seed, wherein the number of bits of the fifth random number is the same as that of the second number of bits;
performing binary conversion processing on the fifth random number to obtain a sixth random number;
and carrying out XOR processing on the sixth random number and the bit conversion order code to obtain a second information code.
7. The method of claim 6, wherein the second encryption processing of the target information code and the verification code by using a verification code generator to obtain a verification code further comprises:
performing decimal conversion processing on the target information code to obtain a first verification and cancellation information code;
performing decimal conversion processing on the second information code to obtain a second cancel information code;
splicing the first verification and cancellation information code and the second verification and cancellation information code to obtain a verification and cancellation information code;
and converting the verification and cancellation information code by adopting a verification and cancellation code generator to obtain the verification and cancellation code.
8. A core cancellation code transmitting apparatus, comprising:
an obtaining unit configured to obtain, in response to detecting a warehousing information code, user order information corresponding to the warehousing information code, wherein the user order information includes: the user mobile phone number, the status code and the goods taking address;
the first generation unit is configured to change the state of the state code into a state representing that the article is put in storage and generate a goods taking code;
a second generation unit configured to generate a verification code according to the pickup code and a status code included in the user order information;
the first encryption unit is configured to perform first encryption processing on a user mobile phone number and a pickup address included in the user order information by using a login password to obtain a target information code, wherein the login password is a pre-stored password used when a target terminal logs in;
the second encryption unit is configured to perform second encryption processing on the target information code and the verification code by adopting a verification and cancellation code generator to obtain a verification and cancellation code;
and the sending unit is configured to send the verification and cancellation code to the terminal equipment corresponding to the user mobile phone number included in the user order information.
9. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
10. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1 to 7.
CN202111335621.1A 2021-11-11 2021-11-11 Method and device for sending core cancellation code, electronic equipment and computer readable medium Pending CN113919922A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111335621.1A CN113919922A (en) 2021-11-11 2021-11-11 Method and device for sending core cancellation code, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111335621.1A CN113919922A (en) 2021-11-11 2021-11-11 Method and device for sending core cancellation code, electronic equipment and computer readable medium

Publications (1)

Publication Number Publication Date
CN113919922A true CN113919922A (en) 2022-01-11

Family

ID=79246370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111335621.1A Pending CN113919922A (en) 2021-11-11 2021-11-11 Method and device for sending core cancellation code, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN113919922A (en)

Similar Documents

Publication Publication Date Title
CN110516462B (en) Method and apparatus for encrypting data
CN111199037B (en) Login method, system and device
CN109495266B (en) Data encryption method and device based on random number
CN112262544B (en) Device, system and method for generating and processing cryptographic parameters
CN110705985B (en) Method and apparatus for storing information
CN110516463A (en) Method and apparatus for generating information
CN111130791B (en) Data signature method, electronic device and computer readable storage medium
CN111010283B (en) Method and apparatus for generating information
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
US11133926B2 (en) Attribute-based key management system
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN116502189A (en) Software authorization method, system, device and storage medium
CN110232570A (en) A kind of information monitoring method and device
CN111767550A (en) Data storage method and device
CN113919922A (en) Method and device for sending core cancellation code, electronic equipment and computer readable medium
CN110166226B (en) Method and device for generating secret key
CN114726611A (en) Multiparty privacy set intersection method, system and device
CN112565156B (en) Information registration method, device and system
CN110659476A (en) Method and apparatus for resetting password
CN113763646A (en) Device control method, device, electronic device and computer readable medium
CN110619218B (en) Method and apparatus for generating information
CN115378743B (en) Information encryption transmission method, device, equipment and medium
CN110492998A (en) The method of encryption and decryption data
CN111355584A (en) Method and apparatus for generating blockchain multi-signatures
CN110858243A (en) Page acquisition method and device for gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination