[go: up one dir, main page]

CN106874780A - Mailing information encrypts allocator and server apparatus - Google Patents

Mailing information encrypts allocator and server apparatus Download PDF

Info

Publication number
CN106874780A
CN106874780A CN201510909588.7A CN201510909588A CN106874780A CN 106874780 A CN106874780 A CN 106874780A CN 201510909588 A CN201510909588 A CN 201510909588A CN 106874780 A CN106874780 A CN 106874780A
Authority
CN
China
Prior art keywords
information
identification code
mailing
terminal
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510909588.7A
Other languages
Chinese (zh)
Inventor
庄子骏
老世荣
朱锐
施萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SF Technology Co Ltd
Original Assignee
SF Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SF Technology Co Ltd filed Critical SF Technology Co Ltd
Priority to CN201510909588.7A priority Critical patent/CN106874780A/en
Publication of CN106874780A publication Critical patent/CN106874780A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application discloses a kind of mailing information encryption allocator and server apparatus, the method includes:Obtain mailing information;Based on the mailing information, identification code is generated, and identification code is matched with thing to be dispensed;The first request that dispatching terminal sends is obtained, first request bag contains:Dispense the information and the information of identification code by dispatching terminal recognition of the identification code of terminal;In response to the described first request, the first information is sent to the dispatching terminal, the first information is the first mailing information or miscue.The present invention at least possesses following beneficial effect, and the first request for only being sent according to dispatching terminal just selectively sends first information content:First mailing information or miscue such that it is able to prevent malice from obtaining mailing information, effectively prevent information leakage.

Description

Mailing information encryption distribution method and server equipment
Technical Field
The present disclosure relates generally to the field of logistics, and more particularly to a distribution method, and more particularly, to a mailing information encryption distribution method and a server device.
Background
With the development of the express industry, data shows that 140 hundred million express packages are delivered in China in 2014. When people are full of joy for express receipts, since mailing addresses are clear on paper lists, address information is leaked, and crime probability is promoted.
Whether the mailing address is detailed or not directly influences the accurate delivery of the express company, and the problems of safety and timeliness exist, so that the user cannot encrypt the mailing address by himself to protect the safety of the user.
Disclosure of Invention
In view of the above-mentioned deficiencies or inadequacies of the prior art, it would be desirable to provide a method for encrypted distribution of mailing information, comprising: acquiring mailing information; generating an identification code based on the mailing information, and matching the identification code with the object to be dispensed; acquiring a first request sent by a distribution terminal, wherein the first request comprises: information of the identification code of the distribution terminal and identification code information recognized by the distribution terminal; and responding to the first request, and sending first information to the distribution terminal, wherein the first information is first mailing information or error prompt.
In another aspect, the present invention further provides a server device, including: a receiving unit, a generating unit, a communication unit and a processing unit; the receiving unit is used for acquiring mailing information; the generating unit is used for generating an identification code based on the mailing information; the communication unit is used for receiving the request of the terminal and sending information to the terminal; the processing unit acquires the request received by the communication unit and generates the content of the information sent by the communication unit to the terminal according to the content of the request.
Based on the above, the present invention has at least the following advantages, and the first information content is selectively transmitted only according to the first request transmitted by the distribution terminal: the first mailing information or the error prompt can prevent the mailing information from being maliciously acquired, and the information leakage is effectively prevented.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a mailing information encrypted distribution method according to an embodiment of the present invention.
Fig. 2 is a flowchart of sending first information to a distribution terminal in the encrypted distribution method of mail information according to the embodiment of the present invention.
Fig. 3 is a flowchart of sending second information to a distribution terminal in the encrypted distribution method of mail information according to the embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a server device according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings. It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Rather, the steps depicted in the flowcharts may change order of execution in some situations.
The invention discloses a mailing information encryption distribution method, which is generally applicable to the field of logistics such as express delivery and the like, and referring to fig. 1, the method comprises the following steps of 100: acquiring mailing information; step 200: generating an identification code; step 300: get request and step 400: and sending corresponding information. For convenience of description, the following description will be given by taking the delivery of a courier as an example, and it should be noted that the following description relates to "courier" and the like, which are merely examples for easy understanding and are not intended to limit the present invention. It should be noted that the order of the steps is arranged in the general express processing flow, which is not intended to limit the flow of the steps of the present invention.
The mail information is obtained, for example, delivery of express, that is, information provided by a user at least including a recipient address and a telephone number is obtained, and it should be noted that the example is only to illustrate the provider and content of the mail information, and is not to limit the provider and content of the mail information.
The identification code is generated based on the mailing information and the generated identification code is matched with the item to be dispensed. The identification code can be in the form of a two-dimensional code, a bar code, a code and the like, and can be matched with the object to be dispensed in a pasting mode after being printed. It should be noted that the identification code may be in a form visible to the human eye, such as the two-dimensional code described above, and may be identified by being scanned or the like, and may also be in a form invisible to the human eye, such as a magnetic stripe, RFID, or the like. In addition, the identification code can be generated by directly compiling the mailing information, or can be directly correspondingly matched with the mailing information without directly compiling the mailing information, and in any mode, the mailing information has the identification code which is uniquely matched with the mailing information
Referring to fig. 2, in the flow of the step of acquiring the request and sending the corresponding information, the following steps may be specifically included, step 311:
acquiring a first request sent by a distribution terminal, wherein the first request comprises identification code information identified by the distribution terminal; the step may be understood as that in the process of delivering the express, the deliverer identifies the identifier through the delivery terminal, and then the delivery terminal sends a first request, where the first request includes information of the identifier identified by the identification terminal. The information of the recognized identification code in the first request may be simple information generated after the identification code is recognized, as long as the information can be uniformly matched, recognized and called (for example, after the identification, information "123" is obtained, and the "123" is compiled according to a uniform matching rule, for example, to "X", that is, the recognized information is compiled again). Of course, the identified identification code information may be directly sent without compiling, and in either way, feedback of the identified identification code is realized.
Further, the first request also includes information for identifying an identification code of the terminal, and the information for identifying the identification code can be understood as uniquely encoded information of the terminal. Of course, this requires that each terminal has its own identification code, which may be in various forms, in order to distinguish between different distribution terminals, for example, a mobile international identity; or in all the distribution terminals in an express company, each terminal has a unique code which can be a number, a two-dimensional code, a bar code and the like, and the purpose of the code is to distinguish each distribution terminal. It should be noted that the above is merely an illustration of the identification code, and other identification methods capable of distinguishing the distribution terminal function may also be used in the present invention.
In addition, the identification code can belong to a visible code such as the codes and two-dimensional codes; may be invisible, such as magnetic stripe information; it may also be identity information stored at the distribution terminals, i.e. virtual information, which each distribution terminal may call into the first request. The above illustrates possible forms of identification codes, but other forms of identification codes that can be used to distinguish devices are equally applicable to the present invention.
Referring to fig. 2, in response to the first request, first information is sent to the distribution terminal, where the first information is first mailing information or an error prompt. In the first request, the information of the identification codes of different distribution terminals is different, and different first information is sent according to the information of different identification codes, so that other people can be prevented from acquiring mailing information, and the information leakage of customers is prevented.
With continued reference to fig. 2, in the flow of steps of obtaining a request and sending corresponding information, the following steps may be specifically included, step 312: it is verified whether the information of the identification code in the first request matches the information of the assigned identification code.
Specifically, the information may be sent in such a way that when the information of the identification code in the first request matches the information of the assigned identification code, step 313 is executed: sending the first mailing information to the distribution terminal, otherwise performing step 314: and sending an error prompt to the distribution terminal. The information of the identification code in the first request matches the information of the assigned identification code, indicating that the delivery terminal that is requesting the acquisition of the mailing information is the assigned terminal, and the purpose of acquiring the mailing information is for delivery.
The distribution terminals may be all terminals involved in the whole logistics distribution process, and the terminals may be mobile phones, handheld devices of distributors, identification devices of distribution stations, and the like, which are only possible devices provided by way of example, and other devices for identifying the identification codes to obtain corresponding information in the logistics process may be referred to as distribution terminals. The content of the mailing information comprises a distribution address and recipient contact information; the assigned identification code is the identification code of the terminal through which the object to be distributed is distributed to the distribution address. For example, the object to be dispensed is delivered to the B place from the a place, and during the dispensing process, three dispensing points or dispensing members a1, a2 and A3 may be passed through, in which case the dispensing terminals at a1, a2 and A3 are designated terminals, and the identification codes of the dispensing terminals are designated identification codes. Thus, mailing information is available at A1, A2, and A3, and is not available to other locations or personnel. The contact information includes, but is not limited to, a cell phone number, a QQ number, a micro signal, etc. of the recipient, which can provide communication information.
The first mailing information includes the contents of some or all of the mailing information. When the first mailing information includes all the content of the mailing information, each distribution terminal can acquire complete mailing information; when the first mailing information includes the contents of the partial mailing information, each distribution terminal displays only the partial mailing information, for example, only information of the next-station distribution point. Taking the above example of delivering the article to be delivered from the place a to the place B, the delivery terminal at the place a1 can only acquire the address information of the next station to be delivered in the mailing address, that is, the address information of the place a 2. If a1 is beijing city and a2 is east city, then after a first request is sent by a distribution terminal at a1, the first mailing information in the first information is received and only the east city area is displayed, but further addresses cannot be displayed, while the next-level information, such as street information, is only obtained at a2, and finally the last item to be distributed is sent to the distribution terminal at a designated location and a telephone call can be displayed.
This also prevents the distribution process from getting too much mailing information, resulting in information leakage.
In an embodiment, referring to fig. 3, in the flow of the step of acquiring the request and sending the corresponding information, the following steps may be specifically included, step 321: acquiring a second request sent by the receiving terminal, wherein the second request comprises identification code information identified by the receiving terminal and verification information; and responding to the second request, and sending second information to the receiving terminal, wherein the second information is receiving confirmation information or receiving error prompt. In the step, the customer receives the express delivery, sends a second request through the goods receiving terminal to confirm the goods receiving, and meanwhile verifies whether the delivered express delivery is accurate. The goods receiving terminal can be a mobile phone, and the identification code can be identified by using software installed on the mobile phone.
With continued reference to fig. 3, step 322 is included: determining whether the authentication information in the second request matches the predetermined authentication information, and if the authentication information matches the predetermined authentication information, performing step 323: sending a receipt confirmation message, otherwise executing step 324: and sending a receiving error prompt. The verification information can be one or a combination of numbers, letters and symbols. Of course, when the mobile phone is used as the receiving terminal, the verification information may be automatically provided by the mobile phone software, for example, the user login software has unique user information, and the user information may be used as the verification information.
It should be noted that although the identification terminal and the receiving terminal can recognize the identification code and the identification code is generated based on the mailing information, the identification terminal and the receiving terminal need to directly acquire the mailing information without indicating the identification terminal and the receiving terminal. For example, when the identification code is generated directly by mailing information and directly includes the content of the mailing information, the identification terminal recognizes the identification code and does not directly display the information or wait for receiving the first information.
Further, the delivery terminal and the receiving terminal may be universal, and may differentiate functions according to different users, for example, when both are mobile phones, a deliverer uses the mobile phone and logs in an account of the deliverer, the mobile phone may be used for the delivery terminal, and a customer logs in using an account of a customer, and the mobile phone may be used for the receiving terminal. Or, the first request is sent by identifying the identification code to obtain the first information to be the distribution terminal, and the second request is sent by identifying the identification code to obtain the second information to be the receiving terminal.
When the identification code is in a visible form such as a two-dimensional code, the identification code may be a mechanical identification code generated by encrypting mailing information. And an anti-copying area is arranged in the effective identification area of the generated mechanical identification code, and the light reflectivity of the anti-copying area is higher than that of the non-anti-copying area in the effective identification area. Thus, even if the identification code is acquired, the identification code cannot be copied. The mechanical identification code referred to in the present invention may be understood as "a code that can identify the content by an identification device", and for example, a two-dimensional code and a barcode both identify the content by an identification device.
It should be noted that the above-mentioned error notice is an indication that the first mailing information cannot be obtained or the receipt confirmation information cannot be obtained.
In the delivery process of the encrypted delivery method of the mailing information, only the identification code is arranged on the object to be delivered, and only the specified equipment can obtain the mailing information through the identification code, so that the information leakage can be effectively prevented.
On the other hand, the embodiment of the invention also discloses server equipment. Fig. 4 shows a schematic structural diagram of a server device according to an embodiment of the present invention. As shown in fig. 4, the server device may include: a receiving unit 1, a generating unit 2, a communication unit 3, and a processing unit 4; the receiving unit is used for acquiring mailing information; the generating unit is used for generating an identification code based on the mailing information; the communication unit is used for receiving a request of a terminal and sending information to the terminal; the processing unit acquires the request received by the communication unit and generates information for the communication unit to send to the terminal according to the request content. In some embodiments, the processing unit may optionally be a processor (CPU).
The server device may be an optional base device for implementing the encrypted distribution method of the mailing information. The receiving unit can obtain the mailing information in various ways, such as directly entering through a keyboard or obtaining from a network. The identification code generated by the generation unit may be generated by compiling the mailing information or may be generated directly, in either form, the mailing information having an identification code that uniquely matches the mailing information.
The communication unit is mainly used for realizing information interaction between the server equipment and the terminal equipment, wherein the terminal equipment comprises the distribution terminal and the receiving terminal. And the request may include a first request and a second request, and the information transmitted to the terminal may include the first information or the second information. The processing unit will decide whether to send the first information to the distribution terminal or the second information to the second terminal according to the content of the request, and also needs to decide the content of the first information, as well as the content of the second information (i.e. the content mentioned in the above method).
It is to be noted that the processing unit may have other functions, such as controlling the operation of generating the identification code of the mailing information, the generation method, and the like, in addition to the above-described functions. These functions may be implemented by a processing unit. These functional processing units may be shared, or may be individually provided as independent processing units.
The communication unit may perform communication processing via a network such as the internet.
Of course, the server device described above may also include other structures as desired, for example;
as shown in the figure, a processing unit 4 of the server apparatus, which can execute various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)5 or a program loaded from a storage section 7 into a Random Access Memory (RAM) 5. In the RAM 5, various programs and data necessary for the operation of the server apparatus are also stored. The processing unit mentioned here includes not only the processing unit for processing the receiving unit to realize the interaction between the server device and the terminal, but also other processing units that may be needed, and the above programs are programs corresponding to different functions.
The processing unit 4, the ROM 5 and the RAM 6 are connected to each other via a bus 8. An input/output (I/O) interface 9 is also connected to the bus 8.
Optionally, the following components are connected to the I/O interface 9: an input section 10 including a keyboard, a mouse, and the like; an output section 11 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 7 including a hard disk and the like; and a network interface card (labeled) such as a LAN card, modem, etc. A drive 12 is also connected to the I/O interface 9 as necessary. A removable medium 13 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive as necessary, so that the computer program read out therefrom is mounted into the storage section as necessary.
In particular, according to embodiments of the present disclosure, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing some of the steps of the method. In such an embodiment, the computer program may be downloaded and installed from a network, and/or installed from a removable medium.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by a person skilled in the art that the scope of the invention as referred to in the present application is not limited to the embodiments with a specific combination of the above-mentioned features, but also covers other embodiments with any combination of the above-mentioned features or their equivalents without departing from the inventive concept. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A method for encrypted distribution of mailing information, comprising:
acquiring mailing information;
generating an identification code based on the mailing information, and matching the identification code with the object to be dispensed;
acquiring a first request sent by a distribution terminal, wherein the first request comprises: information of the identification code of the distribution terminal and identification code information recognized by the distribution terminal;
and responding to the first request, and sending first information to the distribution terminal, wherein the first information is first mailing information or error prompt.
2. A method of encrypted distribution of mailing information according to claim 1, wherein,
and when the information of the identification code in the first request is matched with the information of the appointed identification code, sending first mailing information to the distribution terminal, and otherwise, sending an error prompt to the distribution terminal.
3. A method of encrypted distribution of mailing information according to claim 2, wherein,
the content of the mailing information comprises a distribution address and/or recipient contact information;
the assigned identification code is an identification code of a distribution terminal through which the object to be distributed is distributed.
4. A mail information encrypted distribution method according to claim 2 or 3, wherein,
the first mailing information includes contents of a part or all of the mailing information.
5. A postal information encrypted distribution method as set forth in claim 1, further including:
acquiring a second request sent by a receiving terminal, wherein the second request comprises identification code information identified by the receiving terminal and verification information provided by the receiving terminal;
and responding to the second request, and sending second information to the receiving terminal, wherein the second information is receiving confirmation information or receiving error prompt.
6. A mail information encrypted distribution method according to claim 5, wherein,
and when the verification information is matched with preset verification information, sending receiving confirmation information, and otherwise, sending a receiving error prompt.
7. A method of encrypted distribution of mailing information according to claim 6, wherein,
the verification information is one or a combination of several of numbers, letters and symbols.
8. A method of encrypted distribution of mailing information according to claim 1, wherein,
the identification code is a mechanical identification code generated after the mailing information is encrypted.
9. A mail information encrypted distribution method according to claim 7, wherein,
and an anti-copying area is arranged in the effective identification area of the generated mechanical identification code, and the light reflectivity of the anti-copying area is higher than that of the non-anti-copying area in the effective identification area.
10. A server device, comprising:
a receiving unit, a generating unit, a communication unit and a processing unit; wherein,
the receiving unit is used for acquiring mailing information;
the generating unit is used for generating an identification code based on the mailing information;
the communication unit is used for receiving a request of a terminal and sending information to the terminal;
the processing unit is used for acquiring the request received by the communication unit and generating information for the communication unit to send to the terminal according to the request content.
CN201510909588.7A 2015-12-10 2015-12-10 Mailing information encrypts allocator and server apparatus Pending CN106874780A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510909588.7A CN106874780A (en) 2015-12-10 2015-12-10 Mailing information encrypts allocator and server apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510909588.7A CN106874780A (en) 2015-12-10 2015-12-10 Mailing information encrypts allocator and server apparatus

Publications (1)

Publication Number Publication Date
CN106874780A true CN106874780A (en) 2017-06-20

Family

ID=59236553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510909588.7A Pending CN106874780A (en) 2015-12-10 2015-12-10 Mailing information encrypts allocator and server apparatus

Country Status (1)

Country Link
CN (1) CN106874780A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067786A (en) * 2018-09-21 2018-12-21 南京工程学院 The network-based safety mailing method of one kind, mailing terminal and mailing platform
CN109272272A (en) * 2018-09-18 2019-01-25 拉扎斯网络科技(上海)有限公司 Task processing method and device, electronic equipment and computer readable storage medium
CN110443550A (en) * 2019-08-07 2019-11-12 拉扎斯网络科技(上海)有限公司 Article distribution method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2413206A (en) * 2004-04-16 2005-10-19 Peter Martin Domaradzki Encrypting two-dimensional bar codes on articles
CN102750874A (en) * 2012-06-05 2012-10-24 王赤坤 Light-reflection anti-fake label
CN104123624A (en) * 2014-07-03 2014-10-29 华东师范大学 Confidential express method and system thereof
CN104504594A (en) * 2014-12-17 2015-04-08 马俊 Online shopping privacy protection method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2413206A (en) * 2004-04-16 2005-10-19 Peter Martin Domaradzki Encrypting two-dimensional bar codes on articles
CN102750874A (en) * 2012-06-05 2012-10-24 王赤坤 Light-reflection anti-fake label
CN104123624A (en) * 2014-07-03 2014-10-29 华东师范大学 Confidential express method and system thereof
CN104504594A (en) * 2014-12-17 2015-04-08 马俊 Online shopping privacy protection method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
卜宏建: "条码标识的改进", 《防伪技术》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272272A (en) * 2018-09-18 2019-01-25 拉扎斯网络科技(上海)有限公司 Task processing method and device, electronic equipment and computer readable storage medium
CN109067786A (en) * 2018-09-21 2018-12-21 南京工程学院 The network-based safety mailing method of one kind, mailing terminal and mailing platform
CN110443550A (en) * 2019-08-07 2019-11-12 拉扎斯网络科技(上海)有限公司 Article distribution method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
TWI673668B (en) Business implementation method and device
CN103391377B (en) Communication means, data processing platform (DPP) and communication system
CN103577959B (en) Server, client, the push of commodity distribution information and recognition methods
CN104657842A (en) Intelligent logistics signing method and system
HK1207188A1 (en) Method, terminal, server and system for information registration
CN104348802A (en) Quick registration method, device, and system, cell phone, and register server
CN110047187A (en) A kind of method, apparatus, equipment and system for opening express delivery cabinet
CN108520371A (en) Logistics method for protecting privacy, device and computer readable storage medium
CN105933876A (en) Counterfeit short message identification method, mobile phone terminal, server, and system
TW201828171A (en) Method for acquiring user information and relevant device
CN104899518A (en) Service processing method and apparatus
CN103426091B (en) client information interaction method and system
CN106874780A (en) Mailing information encrypts allocator and server apparatus
KR20170050183A (en) System and method for delivering postal matter
JP2010198505A (en) Authentication system, authentication device, authentication method, and authentication program
CN107038540B (en) Method and device for object type distribution based on intelligent bar code
CN109872223B (en) Virtual article transaction method, device, equipment and storage medium
CN113169867A (en) Information receiving and transmitting method, device and system using QR (quick response) code
CN104954191A (en) Method and system for compiling network communication data
CN103793820A (en) Method, device and system for delivering commodity information
KR20230121593A (en) Goods delivery service method using goods delivery service method
US20190114845A1 (en) Method and system for mobile devices to communicate with shipping peripheral devices using distributed instances of custom hardware
CN105574689B (en) Information processing method and device
KR101437878B1 (en) Method for Authenticating Payment and Requesting the Same Using ARS
CN105915641B (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620

RJ01 Rejection of invention patent application after publication