CN117910931A - Express access platform - Google Patents

Express access platform Download PDF

Info

Publication number
CN117910931A
CN117910931A CN202410308730.1A CN202410308730A CN117910931A CN 117910931 A CN117910931 A CN 117910931A CN 202410308730 A CN202410308730 A CN 202410308730A CN 117910931 A CN117910931 A CN 117910931A
Authority
CN
China
Prior art keywords
key
data
module
warehouse
subkey
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410308730.1A
Other languages
Chinese (zh)
Other versions
CN117910931B (en
Inventor
潘贤真
魏世奇
裘斌
李犇
徐晨豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sinotrans Innovation Technology Co ltd
Original Assignee
Sinotrans Innovation Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sinotrans Innovation Technology Co ltd filed Critical Sinotrans Innovation Technology Co ltd
Priority to CN202410308730.1A priority Critical patent/CN117910931B/en
Publication of CN117910931A publication Critical patent/CN117910931A/en
Application granted granted Critical
Publication of CN117910931B publication Critical patent/CN117910931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an express access platform, which belongs to the technical field of express data processing, and can effectively dock a cargo owner end with a warehouse end by arranging a first docking module, a second docking module, an e-commerce order receiving module, a commodity management module and a data storage module, so that the cost can be effectively reduced, the cargo owner can directly access order data and the warehouse logistics data at the rear end no matter whether an e-commerce ERP system exists or not, and the cargo owner end commodity is mapped with the commodity in a WMS, so that system development and joint adjustment are not needed, the cargo owner can conveniently operate, and the operation efficiency is improved.

Description

Express access platform
Technical Field
The invention belongs to the technical field of express data processing, and particularly relates to an express access platform.
Background
With the gradual maturity of the electric business state, more and more business companies and brands consider the electric business as a new opportunity of business volume, and the electric business is introduced into a main electric business platform, and meanwhile, a private domain marketing system is built, so that online transaction and express delivery performance are realized. Consumers prefer this way of consumption and brands have to adapt to industry trends.
The existing warehouse operation mode has the following pain points to restrict warehouse operation at present, and can be used as key nodes for cost reduction and synergy. The commodity butt joint of the cargo owner's electric business consumes development manpower and has low time efficiency. Regardless of whether the shipper has a standard electric business system or not, the shipper needs to expend the developer of the outer business to carry out the docking, development and joint debugging of the shipper business system.
The new-sign goods owner such as a non-electronic commerce ERP (ENTERPRISE RESOURCE PLANNING ) system is directly connected with the electronic commerce platform by means of outward transport, the residence threshold of the electronic commerce platform, massive order data, order states and an inventory instant synchronization mechanism greatly increase the operation and maintenance pressure and development testing pressure of the system, meanwhile, the residence auditing mode is opaque due to the communication channels of different electronic commerce platforms, and the access cost of the electronic commerce platform is increased.
Disclosure of Invention
The invention provides an express access platform which is used for solving the technical problems existing in the prior art.
An express access platform comprises a first docking module, a second docking module, an e-commerce order receiving module, a commodity management module and a data storage module;
the first docking module is used for docking the ERP system of the merchant and acquiring first order information generated by the ERP system through a data encryption communication method;
The second docking module is used for docking the E-commerce platform and acquiring second order information generated by the E-commerce platform through a data encryption communication method;
the commodity management module is used for managing the mapping relation between the WMS warehouse codes of the commodities, the ERP system and the commodity codes in the electronic commerce platform;
The E-commerce order receiving module is used for carrying out order information, delivery warehouse selection and delivery express selection on the first order information accessed by the first docking module and/or the second order information accessed by the second docking module to obtain first complete order information and/or second complete order information, and forwarding the first complete order information and/or the second complete order information to the WMS through a data encryption communication method;
The e-commerce order receiving module is further used for transmitting first warehouse order receiving information and first warehouse logistics information corresponding to the first complete order information fed back by the WMS back to the first docking module; and/or the second warehouse order receiving information corresponding to the second complete order information fed back by the WMS and the second warehouse logistics information are returned to the second docking module;
The data storage module is used for storing data generated by the first docking module, the second docking module, the E-commerce order receiving module and the commodity management module.
Further, the e-commerce order receiving module is further configured to obtain a first return application and/or a second return application received by the first docking module and/or the second docking module;
transmitting the first return application and/or the second return application to the WMS;
When receiving a first return receipt message and first return warehouse-in information corresponding to a first return application fed back by the WMS, feeding back the first return receipt message and the first return warehouse-in information to the first docking module; and/or when receiving the second return receipt message and the second return warehouse entry information corresponding to the second return application fed back by the WMS, feeding back the second return receipt message and the second return warehouse entry information to the second docking module;
And the first receiving order information and the first receiving warehouse information are fed back to the ERP system of the merchant by the first docking module, and/or the second receiving order information and the second receiving warehouse information are fed back to the e-commerce platform by the second docking module.
Further, the e-commerce order receiving module is further configured to obtain a first purchase application and/or a second purchase application received by the first docking module and/or the second docking module;
Transmitting the first purchase request and/or the second purchase request to the WMS;
When receiving a first purchase order receiving message and first purchase and warehouse-in information corresponding to a first purchase application fed back by the WMS, feeding back the first purchase order receiving message and the first purchase and warehouse-in information to a first docking module; and/or when receiving a second purchase order message and second purchase and warehouse entry information corresponding to a second purchase application fed back by the WMS, feeding back the second purchase order message and the second purchase and warehouse entry information to the second docking module;
And the first docking module feeds back the first warehousing information to the merchant ERP system, and/or the second docking module feeds back the second docking module to the e-commerce platform.
Further, the e-commerce order receiving module is further configured to transmit the storage order sent by the WMS to a merchant ERP system corresponding to the storage order through the first docking module, and/or transmit the storage order sent by the WMS to an e-commerce platform corresponding to the storage order through the second docking module.
Further, the data storage module is further used for receiving data in the authority of the merchant access merchant and data in the authority of the manager access manager.
Further, the data encryption communication method includes:
Generating an encryption key corresponding to the symmetric encryption algorithm, and encrypting data to be transmitted by adopting the encryption key to obtain encrypted data;
Encrypting an encryption key corresponding to the symmetric encryption algorithm by adopting a public key of a data receiver to obtain key information; and simultaneously transmitting the encrypted data and the key information to a data receiver to finish data encryption communication.
Further, generating an encryption key corresponding to the symmetric encryption algorithm, and encrypting data to be transmitted by adopting the encryption key to obtain encrypted data, including:
Acquiring an initial seed key related to an AES algorithm; the initial seed key is a 128-bit key, and the initial seed key is randomly generated data or data input by man-machine interaction;
Expanding the 128-bit initial seed key into 256 bits to obtain an expanded initial seed key;
Dividing the expanded initial seed key into 8 sub-keys with 32 bits as a dividing length; the 8 sub-keys of 32 bits are respectively
The first 4 subkeys are taken asAs the first round key of the AES algorithm, obtaining the second round key of the AES algorithm according to the first round key and the last 4 sub keys; wherein/>Sub-keys with sequence numbers of 0,1, 2 and 3 are respectively represented;
Based on the first round key and the second round key, acquiring 11 rounds of keys required by an AES algorithm;
based on 11 rounds of keys required by an AES algorithm, encrypting data to be transmitted by adopting the AES algorithm to obtain encrypted data.
Further, expanding the 128-bit initial seed key to 256 bits, resulting in an expanded initial seed key, comprising:
And adding 1 after the last valid bit of the 128-bit initial seed key, and then performing zero padding until 256 bits are obtained to obtain the expanded initial seed key.
Further, the first 4 subkeys are usedAs a first round key of the AES algorithm, and obtaining a second round key of the AES algorithm according to the first round key and the last 4 sub-keys is as follows:
wherein, Representing exclusive OR operation,/>Representing the subkey with sequence number 4,/>Representing the subkey with sequence number 5,/>Representing the subkey with sequence number 6,/>A subkey representing sequence number 7; /(I)、/>、/>、/>Together as the second round key of the AES algorithm.
Further, based on the first round key and the second round key, obtaining 11 rounds keys required by the AES algorithm includes:
based on the first round key and the second round key, the sub-keys required by the AES algorithm are obtained as follows:
wherein i= 8,12,16,20, 40, Representing the subkey with sequence number i,/>Representing the subkey with sequence number i+1,/>Representing the subkey with sequence number i+2,/>Representing the subkey with sequence number i+3,/>Representing the subkey with sequence number i-8,/>Representing the subkey with sequence number i-6,/>Representing the subkey with sequence number i-4,/>Representing the subkey with sequence number i-2,/>Representing the subkey with sequence number i-7,/>Representing the subkey with sequence number i-5,/>Representing the subkey with sequence number i-3,/>Representing a subkey with sequence number i-1;
For the subkey with sequence number 4j Carrying out complicating treatment to obtain a subkey after complicating; j=1, 2,3,4,;
And sub-key is used for Sub-key/>Sub-key/>Sub-key/>As the j+1st round key, 11 rounds of keys required by the AES algorithm are obtained.
According to the express access platform, the first docking module, the second docking module, the e-commerce order receiving module, the commodity management module and the data storage module are arranged, so that a cargo owner end and a warehouse end can be effectively docked, cost can be effectively reduced, whether the cargo owner has an e-commerce ERP system or not can be directly accessed into order data and warehouse logistics data of the rear end, and by mapping commodities of the cargo owner end with commodities in a WMS, system development and joint debugging are not needed, operation of the cargo owner is facilitated, and operation efficiency is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic structural diagram of an express access platform according to an embodiment of the present invention.
Specific embodiments of the present invention have been shown by way of the above drawings and will be described in more detail below. The drawings and the text key descriptions are not intended to limit the scope of the inventive concept in any way, but rather to illustrate the inventive concept to those skilled in the art by referring to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same number of sub-keys in different drawings denote the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the accompanying claims.
Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
As shown in FIG. 1, the express access platform comprises a first docking module, a second docking module, an e-commerce order receiving module, a commodity management module and a data storage module.
The first docking module is used for docking the ERP system of the merchant and acquiring first order information generated by the ERP system through a data encryption communication method.
The second docking module is used for docking the E-commerce platform and acquiring second order information generated by the E-commerce platform through a data encryption communication method.
The commodity management module is used for managing the mapping relation between the WMS (Warehouse MANAGEMENT SYSTEM ) warehouse code of the commodity, the ERP system and the commodity code in the e-commerce platform. After the order information is accessed, the e-commerce order receiving module can push the order to the corresponding warehouse system according to the mapping relation of the commodity management module.
The E-commerce order receiving module is used for carrying out order information, delivery warehouse selection and delivery express selection on the first order information accessed by the first docking module and/or the second order information accessed by the second docking module to obtain first complete order information and/or second complete order information, and forwarding the first complete order information and/or the second complete order information to the WMS through a data encryption communication method.
It should be noted that, rules of delivery warehouse selection and delivery express selection may also be preset, so as to implement automatic order receiving pushing.
The e-commerce order receiving module is further configured to return first warehouse order receiving information and first warehouse logistics information corresponding to the first complete order information fed back by the WMS to the first docking module. And/or the second warehouse order receiving information corresponding to the second complete order information fed back by the WMS and the second warehouse logistics information are returned to the second docking module.
The data storage module is used for storing data generated by the first docking module, the second docking module, the E-commerce order receiving module and the commodity management module.
Optionally, after the data storage module stores the data generated by the first docking module, the second docking module, the e-commerce order receiving module and the commodity management module, a timing data backup task may be further set, and the data backup may be performed according to the set timing data backup task.
The data backup method mainly comprises the following steps: file backup, server active backup, system replication, cross-platform backup, database backup, hierarchical storage management, remote backup, and the like.
The data backup method mainly comprises full backup, incremental backup and differential backup, and the three backup methods are described below.
Full Backup (Full Backup) means that a Full Backup including both system and data is made to the entire system with a tape cartridge. The benefit of this backup approach is intuitive and easily understood. And when a disaster occurs in which data is lost, the lost data can be recovered by only using a tape cartridge (i.e., a backup tape the day before the disaster occurs). But it also has the disadvantages: first, since the system is fully backed up every day, there is a large amount of duplication of content in the backed up data, such as the operating system and applications, which occupies a large amount of tape space, which means increased cost to the user. Second, since the amount of data that needs to be backed up is quite large, the time required for backup is long.
Incremental backups (INCREMENTAL BACKUP) represent that the data of each backup is only equivalent to the data added and modified after the last backup. The advantage of such backup is evident: and no repeated backup data exists, so that the tape space is saved, and the backup time is shortened. But it has a disadvantage in that it is troublesome to restore data when a disaster occurs. For example, if the system fails in the morning of Tuesday, it is now necessary to restore the system to the Tuesday night state. At this time, the administrator needs to find the full backup tape on monday for system recovery, then find the tape on tuesday to recover the data on monday, and finally find the tape on wednesday to recover the data on monday. Obviously, this is much more cumbersome than the first strategy. Under such backup, the relationship between tapes is chain-like, loop-by-loop, and any one of the tape has problems, which can lead to a total chain disjoint.
Differential backups (DIFFERENTIAL BACKUP) indicate that the data for each backup is newly added and modified relative to the data after the last full backup. The administrator first makes a full backup of the system on monday. Then on the next few days, all data (added or modified) that is different from Monday on that day is backed up on tape. The differential backup does not need to be completely backed up every day, so the backup time is short, the tape space is saved, the disaster recovery is convenient, and the system manager can completely recover the system by only two tapes, namely the tape of the full backup of the system and the backup tape of the day before the disaster.
The best solution for backup today is a remote backup solution with "disaster recovery" capability. The disaster tolerance is different from the fault tolerance, and the fault tolerance is that if a subsystem or a part of the system fails in the running process, the system can automatically diagnose the position of the failure and the nature of the failure, and automatically start the redundant or backup subsystem or part, so that the system can continue to run normally and automatically save or restore files and data. Disaster recovery is to ensure the safety and reliability of the system and prevent all or most of the whole system from being problematic due to natural disasters and the like.
The backup strategy formulation is an important part, and the data to be backed up has a 2/8 principle, namely that the probability of 20% of the data to be updated is 80%. Thus, it is quite unreasonable to copy all the data in its entirety per backup. In fact, backup work in a real environment is often based on incremental or differential backups after a full backup.
Based on the backup strategy, the backup strategy of the express access platform in the actual application process is specifically as follows.
The security of the operating system data is a precondition and guarantee that all applications are running normally. The amount of data change over a period of time once the operating system is configured to generate is not significant. Backup of operating system data is reused only if the operating system or application system is destroyed or needs to resume the previously functioning system environment or application environment. Thus, backup policies for operating system and application system data may include: when the system environment and the application environment are unchanged, the full backup is carried out once a month, and the retention period of the backed-up system data can be set according to the needs, such as two months. The start time of the backup operation may be as follows "t+n hh: mm "mode. Before the system environment and the application environment change, the full backup is carried out once, and the retention period can be set by oneself. After the system is stably operated, the full backup is carried out once, and the retention period can be set by self, for example, two months. The backup strategy of the original system is unchanged. The setting can ensure that the system environment and the application environment can be recovered in time after the system crashes, and simultaneously can ensure that the influence of the change of the system and the application environment on the normal business of the client is minimized.
The core application business system database data backup strategy comprises the following steps: since database data is the core of enterprise operation, the starting point to be considered should be how to recover in the simplest and most efficient way when a problem occurs, so the adoption of full backup every day should be considered as much as possible. Because the database of the core service is not closed in operation, the online backup of the database is considered, and the management strategy can be formulated by combining full backup and incremental backup for a very large database. The backup time should typically be scheduled at night when traffic is relatively idle (e.g., 22 points later). Since the database is additive, too many full versions need not be retained, but too few versions may not be retained given that the database is likely to be corrupted. On the other hand, additional media should be reserved for full backup to support disaster recovery planning (software-supported cloning techniques).
Other application class non-database data (log files, configuration files, applications, etc.) backup policies may include: in a network, some application-class non-database data may be included for which full backup may be considered in combination with incremental backup to prevent data loss and corruption. The system provides visual backup strategy maintenance and backup log information recording and maintenance functions: the backup log may record backup content, start time, end time, backup file size, backup results, etc. The policy maintenance log may record policy definition time, maintenance mode (addition, modification, deletion), change content, and maintenance personnel. The backup range can be selected by the manager, the backup parameter setting is set by the manager at will, the log can be used for inquiring and printing out, and the backup strategy and the backup result can be used for inquiring and exporting.
In this embodiment, the e-commerce order receiving module is further configured to obtain a first return application and/or a second return application received by the first docking module and/or the second docking module.
The first return application and/or the second return application are transmitted to the WMS.
When receiving the first return receipt message and the first return warehouse-in information corresponding to the first return application fed back by the WMS, feeding back the first return receipt message and the first return warehouse-in information to the first docking module. And/or when receiving the second return receipt message and the second return warehouse entry information corresponding to the second return application fed back by the WMS, feeding back the second return receipt message and the second return warehouse entry information to the second docking module.
And the first receiving order information and the first receiving warehouse information are fed back to the ERP system of the merchant by the first docking module, and/or the second receiving order information and the second receiving warehouse information are fed back to the e-commerce platform by the second docking module.
In this embodiment, the e-commerce order receiving module is further configured to obtain a first purchase application and/or a second purchase application received by the first docking module and/or the second docking module.
And transmitting the first purchase request and/or the second purchase request to the WMS.
And when receiving a first purchase order receiving message and first purchase and warehouse-in information corresponding to the first purchase application fed back by the WMS, feeding back the first purchase order receiving message and the first purchase and warehouse-in information to the first docking module. And/or when receiving the second purchase order message and the second purchase and warehouse entry information corresponding to the second purchase application fed back by the WMS, feeding back the second purchase order message and the second purchase and warehouse entry information to the second docking module.
And the first docking module feeds back the first warehousing information to the merchant ERP system, and/or the second docking module feeds back the second docking module to the e-commerce platform.
Whether purchasing or returning, the order receiving is required to be carried out firstly, and then order receiving information is fed back to the goods owner. After the goods are put in storage, the storage information is fed back to the goods owner so that the goods owner can manage the goods.
In this embodiment, the e-commerce order receiving module is further configured to transmit the storage order sent by the WMS to the merchant ERP system corresponding to the storage order through the first docking module, and/or transmit the storage order sent by the WMS to the e-commerce platform corresponding to the storage order through the second docking module.
In this embodiment, the data storage module is further configured to receive data within the authority of the merchant for accessing the merchant, and data within the authority of the administrator for accessing the administrator.
In this embodiment, the data encryption communication method includes:
And generating an encryption key corresponding to the symmetric encryption algorithm, and encrypting the data to be transmitted by adopting the encryption key to obtain encrypted data.
And encrypting the encryption key corresponding to the symmetric encryption algorithm by adopting the public key of the data receiver to obtain key information. And simultaneously transmitting the encrypted data and the key information to a data receiver to finish data encryption communication.
In this embodiment, generating an encryption key corresponding to a symmetric encryption algorithm, and encrypting data to be transmitted by using the encryption key to obtain encrypted data, including:
An initial seed key is obtained for an AES (Advanced Encryption Standard ) algorithm. The initial seed key is a 128-bit key, and the initial seed key is randomly generated data or data input through man-machine interaction.
And expanding the 128-bit initial seed key to 256 bits to obtain an expanded initial seed key.
The expanded initial seed key is split into 8 sub-keys of 32 bits with a split length of 32 bits. The 8 sub-keys of 32 bits are respectively
The first 4 subkeysAs a first round key of the AES algorithm, and obtaining a second round key of the AES algorithm according to the first round key and the last 4 sub-keys. Wherein/>The subkeys with sequence numbers 0, 1,2, 3 are indicated respectively.
And acquiring 11 rounds of keys required by the AES algorithm based on the first round of keys and the second round of keys.
Based on 11 rounds of keys required by an AES algorithm, encrypting data to be transmitted by adopting the AES algorithm to obtain encrypted data.
In this embodiment, the 128-bit initial seed key is expanded to 256 bits, and the expanded initial seed key is obtained, including:
And adding 1 after the last valid bit of the 128-bit initial seed key, and then performing zero padding until 256 bits are obtained to obtain the expanded initial seed key.
In the present embodiment, the first 4 subkeys are taken asAs a first round key of the AES algorithm, and obtaining a second round key of the AES algorithm according to the first round key and the last 4 sub-keys is as follows:
wherein, Representing exclusive OR operation,/>Representing the subkey with sequence number 4,/>Representing the subkey with sequence number 5,/>Representing the subkey with sequence number 6,/>Representing the subkey with sequence number 7. /(I)、/>、/>、/>Together as the second round key of the AES algorithm.
In this embodiment, based on the first round of keys and the second round of keys, obtaining 11 rounds of keys required by the AES algorithm includes:
based on the first round key and the second round key, the sub-keys required by the AES algorithm are obtained as follows:
wherein i= 8,12,16,20, 40, Representing the subkey with sequence number i,/>Representing the subkey with sequence number i+1,/>Representing the subkey with sequence number i+2,/>Representing the subkey with sequence number i+3,/>Representing the subkey with sequence number i-8,/>Representing the subkey with sequence number i-6,/>Representing the subkey with sequence number i-4,/>Representing the subkey with sequence number i-2,/>Representing the subkey with sequence number i-7,/>Representing the subkey with sequence number i-5,/>Representing the subkey with sequence number i-3,/>Representing the subkey with sequence number i-1.
For the subkey with sequence number 4jAnd carrying out complicating treatment to obtain the subkeys after complicating. j=1, 2,3,4,..10.
Optionally, the present embodiment may select byte substitution ByteSub and/or row displacement ShiftRow to complicate.
And sub-key is used forSub-key/>Sub-key/>Sub-key/>As the j+1st round key, 11 rounds of keys required by the AES algorithm are obtained.
The conventional AES algorithm only needs to acquire a round of key, so that the whole algorithm can be cracked, and the randomness and the nondeterminability are low. The AES encryption algorithm provided by the embodiment of the invention further needs to execute two rounds of keys, the strength of the algorithm nondeterminacy is infinite, and the security of the algorithm is greatly enhanced.
Optionally, when using the express access platform provided by the embodiment of the invention, whether a cargo owner or a worker, identity verification is required, and the identity verification is as follows:
Verification code mechanism: and when the login fails for more than three times, the user is forced to input the verification code so as to prevent violent cracking.
Locking mechanism: on the premise of requiring the input of the verification code, the continuous verification fails, and the account is automatically locked.
And (5) performing remote login verification: if the region where the login IP (Internet Protocol, protocol for interconnection between networks) is located is not within the region previously logged in, a verification code is required to be sent to confirm the identity.
IP restriction: only users at the fixed IP end are allowed to log in.
Session management: only a single account is allowed to log in at the same time, and the browser session is closed or the browser is automatically exited after long-term non-operation.
Logging: and recording the data operation of the staff to obtain a data operation record log, and storing the data operation record log in a data layer.
It should be noted that the verification mechanism is merely a preferred manner of the embodiment of the present invention, and other verification mechanisms may be used for verification.
In this embodiment, there is provided a method for storing data in a data storage module, the method including:
And carrying out backup storage on the appointed important data by adopting a double-server backup mode. All data can also be backed up and stored. After the data of the main server is lost, an administrator can access the data in the backup server and open rights to other users, so that data recovery is realized. Only the manager is allowed to access the data of the backup server, and the backup server can be prevented from being attacked.
For the data stored in the data storage module, encryption storage can be performed, the corresponding encryption key M is randomly divided into N parts, and a k-time multiple term function is constructed as follows:
Wherein N/2 is greater than or equal to k, Represents the number of the i 'th part, and i' =1, 2, …, N,/>Representation/>The corresponding solution, therefore, only gets the k+1 key parameters (/ >),/>) At that time, M can be decrypted. /(I)To/>Respectively represent k coefficients, which can be represented by k+1 key parameters (/ >),/>) And acquiring, thereby solving M.
The N key parameters can be calculated,/>) Respectively stored in N different cryptographic servers or N different quarantine blocks. When decryption is needed, the stored key parameters are independently used by the password servers or the isolation blocks,/>) And the data can not be decrypted even if an illegal person accidentally acquires a key parameter, so that the security of the data can be effectively ensured.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. The express access platform is characterized by comprising a first docking module, a second docking module, an e-commerce order receiving module, a commodity management module and a data storage module;
the first docking module is used for docking the ERP system of the merchant and acquiring first order information generated by the ERP system through a data encryption communication method;
The second docking module is used for docking the E-commerce platform and acquiring second order information generated by the E-commerce platform through a data encryption communication method;
the commodity management module is used for managing the mapping relation between the WMS warehouse codes of the commodities, the ERP system and the commodity codes in the electronic commerce platform;
The E-commerce order receiving module is used for carrying out order information, delivery warehouse selection and delivery express selection on the first order information accessed by the first docking module and/or the second order information accessed by the second docking module to obtain first complete order information and/or second complete order information, and forwarding the first complete order information and/or the second complete order information to the WMS through a data encryption communication method;
The e-commerce order receiving module is further used for transmitting first warehouse order receiving information and first warehouse logistics information corresponding to the first complete order information fed back by the WMS back to the first docking module; and/or the second warehouse order receiving information corresponding to the second complete order information fed back by the WMS and the second warehouse logistics information are returned to the second docking module;
The data storage module is used for storing data generated by the first docking module, the second docking module, the E-commerce order receiving module and the commodity management module.
2. The express access platform according to claim 1, wherein the e-commerce order receiving module is further configured to obtain a first return application and/or a second return application received by the first docking module and/or the second docking module;
transmitting the first return application and/or the second return application to the WMS;
When receiving a first return receipt message and first return warehouse-in information corresponding to a first return application fed back by the WMS, feeding back the first return receipt message and the first return warehouse-in information to the first docking module; and/or when receiving the second return receipt message and the second return warehouse entry information corresponding to the second return application fed back by the WMS, feeding back the second return receipt message and the second return warehouse entry information to the second docking module;
And the first receiving order information and the first receiving warehouse information are fed back to the ERP system of the merchant by the first docking module, and/or the second receiving order information and the second receiving warehouse information are fed back to the e-commerce platform by the second docking module.
3. The express access platform according to claim 2, wherein the e-commerce order receiving module is further configured to obtain a first purchase application and/or a second purchase application received by the first docking module and/or the second docking module;
Transmitting the first purchase request and/or the second purchase request to the WMS;
When receiving a first purchase order receiving message and first purchase and warehouse-in information corresponding to a first purchase application fed back by the WMS, feeding back the first purchase order receiving message and the first purchase and warehouse-in information to a first docking module; and/or when receiving a second purchase order message and second purchase and warehouse entry information corresponding to a second purchase application fed back by the WMS, feeding back the second purchase order message and the second purchase and warehouse entry information to the second docking module;
And the first docking module feeds back the first warehousing information to the merchant ERP system, and/or the second docking module feeds back the second docking module to the e-commerce platform.
4. The express access platform according to claim 3, wherein the e-commerce order receiving module is further configured to transmit the warehouse inventory sent by the WMS to the merchant ERP system corresponding to the warehouse inventory through the first docking module, and/or transmit the warehouse inventory sent by the WMS to the e-commerce platform corresponding to the warehouse inventory through the second docking module.
5. The express access platform of claim 4, wherein the data storage module is further configured to receive data within merchant access rights and data within administrator access rights for merchants.
6. The express access platform of claim 5, wherein the data encryption communication method comprises:
Generating an encryption key corresponding to the symmetric encryption algorithm, and encrypting data to be transmitted by adopting the encryption key to obtain encrypted data;
Encrypting an encryption key corresponding to the symmetric encryption algorithm by adopting a public key of a data receiver to obtain key information; and simultaneously transmitting the encrypted data and the key information to a data receiver to finish data encryption communication.
7. The express access platform of claim 6, wherein generating an encryption key corresponding to a symmetric encryption algorithm and encrypting data to be sent with the encryption key to obtain encrypted data comprises:
Acquiring an initial seed key related to an AES algorithm; the initial seed key is a 128-bit key, and the initial seed key is randomly generated data or data input by man-machine interaction;
Expanding the 128-bit initial seed key into 256 bits to obtain an expanded initial seed key;
Dividing the expanded initial seed key into 8 sub-keys with 32 bits as a dividing length; the 8 sub-keys of 32 bits are respectively
The first 4 subkeys are taken asAs the first round key of the AES algorithm, obtaining the second round key of the AES algorithm according to the first round key and the last 4 sub keys; wherein/>Sub-keys with sequence numbers of 0,1, 2 and 3 are respectively represented;
Based on the first round key and the second round key, acquiring 11 rounds of keys required by an AES algorithm;
based on 11 rounds of keys required by an AES algorithm, encrypting data to be transmitted by adopting the AES algorithm to obtain encrypted data.
8. The express access platform of claim 7, wherein expanding the 128-bit initial seed key to 256 bits, resulting in an expanded initial seed key, comprises:
And adding 1 after the last valid bit of the 128-bit initial seed key, and then performing zero padding until 256 bits are obtained to obtain the expanded initial seed key.
9. The express access platform of claim 8, wherein the first 4 subkeys areAs a first round key of the AES algorithm, and obtaining a second round key of the AES algorithm according to the first round key and the last 4 sub-keys is as follows:
wherein, Representing exclusive OR operation,/>Representing the subkey with sequence number 4,/>Representing the subkey with sequence number 5,/>Representing the subkey with sequence number 6,/>A subkey representing sequence number 7; /(I)、/>、/>、/>Together as the second round key of the AES algorithm.
10. The express access platform of claim 9, wherein obtaining 11 rounds of keys required by the AES algorithm based on the first round of keys and the second round of keys comprises:
based on the first round key and the second round key, the sub-keys required by the AES algorithm are obtained as follows:
wherein i= 8,12,16,20, 40, Representing the subkey with sequence number i,/>Representing the subkey with sequence number i +1,Representing the subkey with sequence number i+2,/>Representing the subkey with sequence number i+3,/>Representing the subkey with sequence number i-8,Representing the subkey with sequence number i-6,/>Representing the subkey with sequence number i-4,/>Representing the subkey with sequence number i-2,Representing the subkey with sequence number i-7,/>Representing the subkey with sequence number i-5,/>Representing the subkey with sequence number i-3,Representing a subkey with sequence number i-1;
For the subkey with sequence number 4j Carrying out complicating treatment to obtain a subkey after complicating; j=1, 2,3,4,;
And sub-key is used for Sub-key/>Sub-key/>Sub-key/>As the j+1st round key, 11 rounds of keys required by the AES algorithm are obtained.
CN202410308730.1A 2024-03-19 2024-03-19 Express access platform Active CN117910931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410308730.1A CN117910931B (en) 2024-03-19 2024-03-19 Express access platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410308730.1A CN117910931B (en) 2024-03-19 2024-03-19 Express access platform

Publications (2)

Publication Number Publication Date
CN117910931A true CN117910931A (en) 2024-04-19
CN117910931B CN117910931B (en) 2024-06-21

Family

ID=90684246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410308730.1A Active CN117910931B (en) 2024-03-19 2024-03-19 Express access platform

Country Status (1)

Country Link
CN (1) CN117910931B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002082607A (en) * 2000-06-30 2002-03-22 Toshiba Corp Device and method for encipherment, device and method for decipherment, and program therefor
US20110116627A1 (en) * 2009-11-15 2011-05-19 Ante Deng Fast Key-changing Hardware Apparatus for AES Block Cipher
CN107392544A (en) * 2017-07-31 2017-11-24 深圳华盛商业发展有限公司 General retail management system and method
CN116542594A (en) * 2022-01-24 2023-08-04 顺丰科技有限公司 Inventory allocation method, apparatus, device and storage medium
CN116684067A (en) * 2023-04-19 2023-09-01 广州昂宝电子有限公司 AES encryption and decryption device and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002082607A (en) * 2000-06-30 2002-03-22 Toshiba Corp Device and method for encipherment, device and method for decipherment, and program therefor
US20110116627A1 (en) * 2009-11-15 2011-05-19 Ante Deng Fast Key-changing Hardware Apparatus for AES Block Cipher
CN107392544A (en) * 2017-07-31 2017-11-24 深圳华盛商业发展有限公司 General retail management system and method
CN116542594A (en) * 2022-01-24 2023-08-04 顺丰科技有限公司 Inventory allocation method, apparatus, device and storage medium
CN116684067A (en) * 2023-04-19 2023-09-01 广州昂宝电子有限公司 AES encryption and decryption device and method

Also Published As

Publication number Publication date
CN117910931B (en) 2024-06-21

Similar Documents

Publication Publication Date Title
US7165154B2 (en) System and method for data backup
US8321688B2 (en) Secure and private backup storage and processing for trusted computing and data services
US6118874A (en) Encrypted data recovery method using split storage key and system thereof
CA2618135C (en) Data archiving system
EP3082124B1 (en) Security apparatus, method therefof and program
CN102422590B (en) The protection of encryption key in database
US8300831B2 (en) Redundant key server encryption environment
US8135135B2 (en) Secure data protection during disasters
US20100318782A1 (en) Secure and private backup storage and processing for trusted computing and data services
US20120084845A1 (en) Fixed client identification system for positive identification of client to server
US20090235091A1 (en) Computer system for indexing and storing sensitive, secured, information on a non-trusted computer storage array
US12124595B2 (en) Detecting unauthorized encryptions in data storage systems
Virvilis et al. A cloud provider-agnostic secure storage protocol
CN117910931B (en) Express access platform
US20060206923A1 (en) Method and system for self-encrypting key identification
US7395423B1 (en) Security association storage and recovery in group key management
KR20010045157A (en) Method for managing information needed to recovery crytographic key
US9378388B2 (en) Managing keys used for encrypting data
CN117910907B (en) Express bill safety access system
Huang Transaction Database Encryption Technology based on Blockchain Technology
CN118118213A (en) Cloud data collaboration and storage method for engineering design industry

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant