Nothing Special   »   [go: up one dir, main page]

CN111506894A - Data processing method, system, electronic device and computer readable storage medium - Google Patents

Data processing method, system, electronic device and computer readable storage medium Download PDF

Info

Publication number
CN111506894A
CN111506894A CN201910100140.9A CN201910100140A CN111506894A CN 111506894 A CN111506894 A CN 111506894A CN 201910100140 A CN201910100140 A CN 201910100140A CN 111506894 A CN111506894 A CN 111506894A
Authority
CN
China
Prior art keywords
identity
information
node
electronic identity
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910100140.9A
Other languages
Chinese (zh)
Inventor
刘海龙
董成根
杨小雪
郭宏杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eidlink Information Technology Co ltd
Original Assignee
Eidlink Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eidlink Information Technology Co ltd filed Critical Eidlink Information Technology Co ltd
Priority to CN201910100140.9A priority Critical patent/CN111506894A/en
Publication of CN111506894A publication Critical patent/CN111506894A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A data processing method, a system, an electronic device and a computer readable storage medium are disclosed, which generate an electronic identity mark by receiving an identity authentication request sent by an information receiving node, responding to the passing of the authentication of the identity authentication request, and send the electronic identity mark and an authentication result to the information receiving node. The embodiment of the invention replaces identity information with the electronic identity identification for transmission, thereby not only effectively solving the problem of leakage of user information in the real-name system execution process of the express industry, but also meeting the requirement of effective supervision of government departments.

Description

Data processing method, system, electronic device and computer readable storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a data processing method, a data processing system, electronic equipment and a computer readable storage medium.
Background
The process of information transmission and supervision after the real name system of a sender in the existing express industry is as follows: a user uses a client or a courier to input the mail sending information into an express information system by using an express scanning gun, and the express information system performs real-name authentication on the identity information of a sender. After the express delivery information system is authenticated by real name, the order number and the information of the sender and receiver are bound to generate waybill information, and then the waybill information is transmitted to the national post office, and the national post office sends the waybill information to a logistics public security department for delivery security supervision system to manage. The express information system, the national post office and the public security department consignment logistics security supervision system are transmitted in a real-name information mode, data loss is easily caused, user information is revealed, and operation risks are increased for express companies.
Disclosure of Invention
In view of this, embodiments of the present invention provide a data processing method, a system, an electronic device, and a computer-readable storage medium, which can not only effectively solve the problem of leakage of user information during the real-name system execution process of the express industry, but also meet the requirement of effective supervision by a government department.
In a first aspect, an embodiment of the present invention provides a data processing method, where the method includes:
receiving an identity authentication request sent by an information receiving node, wherein the identity authentication request comprises identity information;
responding to the identity authentication request and passing the authentication, and generating an electronic identity;
and sending the electronic identity and the authentication result to an information receiving node.
Preferably, the method further comprises:
receiving an electronic identity of a problem express sent by a supervision node, wherein the electronic identity is obtained through waybill information bound with the electronic identity;
inquiring and acquiring corresponding identity information according to the electronic identity of the problem express;
encrypting the identity information of the electronic identity of the problem express;
and sending the identity information ciphertext of the electronic identity of the problem express to a supervision node.
Preferably, the identity information of the electronic identity of the encrypted problem express includes:
and encrypting the identity information of the electronic identity identifier of the problem express according to the secret key to generate an identity information ciphertext.
Preferably, the key is a symmetric key or an asymmetric key; the identity information includes an identification number.
In a second aspect, a further embodiment of the present invention provides a data processing method, including:
in response to receiving the identity information, sending an identity authentication request;
receiving an electronic identity and an authentication result, wherein the electronic identity is generated according to the identity information;
generating waybill information in response to receiving a waybill generation request;
and sending the waybill information and the electronic identity mark.
Preferably, the waybill generation request comprises a recipient name, a recipient address, a recipient contact address, a sender name, a sender address and a sender contact address.
In a third aspect, a further embodiment of the present invention provides a data processing method, including:
in response to receiving the identity information, the information receiving node sends an identity authentication request to the real-name authentication node;
responding to the identity authentication request and passing the authentication, and generating an electronic identity by the real-name authentication node;
the real-name authentication node sends the electronic identity and the authentication result to the information receiving node;
in response to receiving the waybill generation request, the information receiving node generates waybill information;
the operation node transmits the waybill information and the electronic identity mark which are sent by the information receiving node;
the supervision node detects objects corresponding to all waybill information according to a preset algorithm;
in response to the detection of the problematic express, the supervision node sends an electronic identity of the problematic express to the real-name authentication node, wherein the electronic identity is obtained through waybill information bound with the electronic identity;
the real-name authentication node inquires and acquires corresponding identity information according to the electronic identity of the problem express;
encrypting and sending the identity information of the problem express electronic identity by the real-name authentication node;
and the supervision node associates the identity information of the problem express electronic identity with the problem express.
In a fourth aspect, a further embodiment of the present invention provides a data processing system, which includes an information receiving node, a real-name authentication node, an operation node, and a supervisory node, where,
the information receiving node is used for responding to the received identity information, sending an identity authentication request to the real-name authentication node, responding to the received waybill generation request, generating waybill information and sending the waybill information and the electronic identity identifier to the operation node;
the real-name authentication node is used for responding to the passing of the authentication request authentication, generating an electronic identity, sending the electronic identity and an authentication result to the information receiving node, receiving the electronic identity of the problem express sent by the supervision node, inquiring and acquiring corresponding identity information according to the electronic identity of the problem express, encrypting and sending the identity information of the electronic identity of the problem express to the supervision node;
the operation node is used for forwarding the waybill information and the electronic identity mark sent by the information receiving node;
the monitoring node is used for detecting objects corresponding to all waybill information according to a preset algorithm, responding to the detection of problem express, sending an electronic identity of the problem express to the real-name authentication node, receiving identity information of the electronic identity of the problem express, and associating the identity information of the electronic identity of the problem express with the problem express, wherein the electronic identity of the problem express is the electronic identity bound with the waybill information of the problem express.
In a fifth aspect, the present invention further provides an electronic device, including a memory and a processor, wherein the memory is configured to store one or more computer program instructions, and wherein the one or more computer program instructions are executed by the processor to implement the method according to the first aspect or the second aspect.
In a sixth aspect, the present invention further provides a computer readable storage medium on which computer program instructions are stored, wherein the computer program instructions, when executed by a processor, implement the method according to the first aspect or the second aspect.
The embodiment of the invention receives the identity authentication request sent by the information receiving node, responds to the passing of the identity authentication request authentication, generates the electronic identity identification, and sends the electronic identity identification and the authentication result to the information receiving node, thereby not only effectively solving the problem of user information leakage in the real-name system execution process of the express industry, but also meeting the requirement of effective supervision of government departments.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent from the following description of the embodiments of the present invention with reference to the accompanying drawings, in which:
FIG. 1 is a flow chart of a data processing method of a first embodiment of the present invention;
FIG. 2 is a flow chart of a data processing method of a second embodiment of the present invention;
FIG. 3 is a flow chart of a data processing method of a third embodiment of the present invention;
FIG. 4 is a block diagram of a data processing system according to a fourth embodiment of the present invention;
fig. 5 is a schematic view of an electronic device according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described below based on examples, but the present invention is not limited to only these examples. In the following detailed description of the present invention, certain specific details are set forth. It will be apparent to one skilled in the art that the present invention may be practiced without these specific details. Well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
Further, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale.
Unless the context clearly requires otherwise, throughout the description and the claims, the words "comprise", "comprising", and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is, what is meant is "including, but not limited to".
In the description of the present invention, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present invention, "a plurality" means two or more unless otherwise specified.
Fig. 1 is a flowchart of a data processing method according to a first embodiment of the present invention. As shown in fig. 1, the method comprises the steps of:
step S110, receiving an identity authentication request sent by the information receiving node.
When the information receiving node receives the identity information of the user, the information receiving node sends an identity authentication request to the real-name authentication node so as to authenticate the identity information of the user. In this embodiment, the information receiving node is an express information system, and the real-name authentication node is a network identification system of a public security department. The identity information refers to the information used for representing the identity of the sender, such as the identification card number, the name and the like of the sender.
And step S120, responding to the authentication passing of the identity authentication request, and generating an electronic identity.
And the real-name authentication node authenticates the received identity authentication request, and generates the electronic identity identifier of the identity information when the authentication is passed. The process of authenticating the real-name authentication node is to compare the received identity information with all the identity information in the real-name authentication node and judge whether the identity information exists really. When the real-name authentication node has identity information matched with the received identity information, the authentication is passed, and the real-name authentication node generates an electronic identity of the identity information. In this embodiment, the electronic identity is a network electronic identity signed by a network identity recognition system of a citizen of the ministry of public security, and cannot be changed. The electronic identity label can identify identity remotely on line on the premise of not revealing identity information.
And step S130, sending the electronic identity and the authentication result to the information receiving node.
And after the real-name authentication node passes the authentication, generating an electronic identity of the identity information. And then the electronic identity and the authentication result are sent to an information receiving node. The authentication result is used for prompting that the identity information received by the information receiving node is real, and subsequent sending operation can be carried out. In another optional implementation manner, when the real-name authentication node fails in authentication, the corresponding failure result is sent to the information receiving node, the information receiving node is prompted that the identity information of the user does not exist, and the user can be refused to perform the next operation.
In this embodiment, the information receiving node may continue to receive the waybill generation request, i.e., the consignee information, input by the user according to the received authentication passing result, then generate the waybill generation request into the waybill information, and finally send the generated waybill information and the electronic identity identifier together to the operation node for effective storage. In this embodiment, the waybill generation request may include a recipient name, a recipient address, a recipient contact address, a sender name, a sender address, and a sender contact address. The waybill information can be an order number or a waybill code and the like. In the process of transmitting the waybill information and the electronic identity, the leakage of the waybill generation request and the identity information can be avoided. In this embodiment, the operation node may be a national postal service bureau, and is configured to uniformly manage operations of all express companies.
The operation node stores the received waybill information and the electronic identity mark and then forwards the received waybill information and the electronic identity mark to the supervision node, and the supervision node can detect actual objects of the waybill information according to a preset algorithm. For example, when the supervision node detects a problem express delivery with an improper rule or potential safety hazard, the corresponding electronic identity can be queried through waybill information on the problem express delivery. The electronic identity mark on the problem express is sent to the real-name authentication node, so that the corresponding identity information can be inquired and obtained, and the supervision node can be positioned to an actual sender according to the identity information of the problem express, so that the supervision of the express item is realized. In this embodiment, the supervisory node may be a logistics security supervisory system that is posted by the ministry of public security.
The data processing method of the embodiment further includes:
and S140, receiving the electronic identity of the problem express sent by the supervision node.
The real-name authentication node receives the electronic identity of the problem express sent by the supervision node to inquire and acquire the identity information of the real-name authentication corresponding to the problem express, and then the real-name authentication node is positioned to the sender to realize the supervision of the express article. The electronic identity of the problem express is the electronic identity corresponding to the problem express detected by the supervision node, namely the electronic identity of the problem express. And the electronic identity is bound with the waybill information. When the detected problem express is carried out, the corresponding electronic identity can be obtained through waybill information of the problem express.
And S150, inquiring and acquiring corresponding identity information according to the electronic identity of the problem express.
And the real-name authentication node inquires and acquires corresponding identity information according to the received electronic identity identifier of the problem express.
And S160, encrypting the identity information of the electronic identity of the problem express.
And the real-name authentication node encrypts the inquired identity information through a secret key to generate an identity information ciphertext. In this embodiment, the real-name authentication node and the supervision node have keys stored therein in advance, and may encrypt and decrypt identity information. In this embodiment, the key may be a symmetric key or an asymmetric key.
And S170, sending the identity information ciphertext of the electronic identity of the problem express to a supervision node.
And the real-name authentication node sends the encrypted identity information ciphertext to the monitoring node. After the real-name authentication node sends the identity information ciphertext to the supervision node, the supervision node decrypts the identity information ciphertext to associate the acquired identity information of the sender with the express item with the problem, so that the sender can be quickly inquired, and the express item can be supervised.
This embodiment can be applied to in the express delivery trade, specifically: the user uses the express information system to obtain the identity information of the sender, then the real-name authentication is carried out through the public network identity recognition system of the ministry of public security to generate an electronic identity mark, the personal identity information is identified, and the unrecoverable mark is used for replacing the personal identity information, so that the risk that the identity information is illegally sold or leaked is reduced. And then, the express delivery information system transmits the electronic identity identification and the acquired waybill information to a national post office and a public security department for consignment logistics security management system. The problem express is inquired through modeling analysis of big data of the express article by the post-delivery logistics supervision system of the ministry of public security, then the electronic identity of the problem express is sent to a citizen network identity recognition system of the ministry of public security to inquire corresponding real-name identity information, the post-delivery logistics security management system of the ministry of public security associates the problem express with the real-name identity information, and the problem express and related personnel are handled legally.
The embodiment of the invention can effectively solve the problem of leakage of user information in the real-name system execution process of the express industry and meet the requirement of effective supervision of government departments.
Fig. 2 is a flowchart of a data processing method according to a second embodiment of the present invention. As shown in fig. 2, the method comprises the steps of:
step S210, in response to receiving the identity information, sending an identity authentication request.
When the information receiving node receives the identity information of the user, the information receiving node sends an identity authentication request to the real-name authentication node so as to authenticate the identity information of the user. In this embodiment, the information receiving node is an express information system, and the real-name authentication node is a network identification system of a public security department. The identity information refers to the information used for representing the identity of the sender, such as the identification card number, the name and the like of the sender.
And step S220, receiving the electronic identity and the authentication result.
And the real-name authentication node authenticates the received identity authentication request, and generates the electronic identity identifier of the identity information when the authentication is passed. The process of authenticating the real-name authentication node is to compare the received identity information with all the identity information in the real-name authentication node and judge whether the identity information exists really. When the real-name authentication node has identity information matched with the received identity information, the authentication is passed, and the real-name authentication node generates an electronic identity of the identity information. In this embodiment, the electronic identity is a network electronic identity signed by a network identity recognition system of a citizen of the ministry of public security, and the identity can be remotely recognized on line on the premise of not revealing identity information.
And after the real-name authentication node passes the authentication, generating an electronic identity of the identity information. And then the electronic identity and the authentication result are sent to an information receiving node. The authentication result is used for prompting that the identity information received by the information receiving node is real, and subsequent sending operation can be carried out. In another optional implementation manner, when the real-name authentication node fails in authentication, the corresponding failure result is sent to the information receiving node, the information receiving node is prompted that the identity information of the user does not exist, and the user can be refused to perform the next operation.
And step S230, responding to the received waybill generation request, and generating waybill information.
In this embodiment, the information receiving node may continue to receive the information input by the user, that is, the waybill generation request, according to the received authentication passing result, and then generate the waybill information from the content of the waybill generation request. In this embodiment, the content of the waybill generation request may include a recipient name, a recipient address, a recipient contact address, a sender name, a sender address, and a sender contact address. The waybill information can be an order number or a waybill code and the like.
And S240, sending the waybill information and the electronic identity.
And the information receiving node sends the generated waybill information and the electronic identity identification to the operation node. In the process of transmitting the waybill information and the electronic identity, the leakage of the waybill generation request and the identity information can be avoided. In this embodiment, the operation node may be a national postal service bureau, and is configured to uniformly manage operations of all express companies.
The data processing method of the embodiment further includes: after receiving the waybill information and the electronic identity mark, the operation node forwards the waybill information and the electronic identity mark to the supervision node, and the supervision node can detect the actual object of the waybill information according to a preset algorithm. For example, when a supervisor detects a problem express delivery with an improper rule or potential safety hazard, the corresponding electronic identity can be inquired by inputting waybill information on the problem express delivery into the supervisory node. The supervision node can also detect a problem express item through data modeling analysis, and then inquire the corresponding electronic identity through waybill information on the problem express. After the electronic identity of the problem express is inquired by the supervision node, the electronic identity is sent to the real-name authentication node, the identity information of the electronic identity real-name authentication can be inquired and obtained, and the supervision node can be positioned to an actual sender according to the identity information, so that the supervision of the express item is realized. In this embodiment, the supervisory node may be a logistics security supervisory system that is posted by the ministry of public security.
Fig. 3 is a flowchart of a data processing method according to a third embodiment of the present invention. As shown in fig. 3, the method comprises the steps of:
step S1, the information receiving node receives the identity information.
The identity information refers to the information used for representing the identity of the sender, such as the identification card number, the name and the like of the sender. In this embodiment, the identity information may be obtained through user input, or may be obtained through scanning with a specific tool, such as a scanning gun of a courier.
And step S2, the information receiving node sends an identity authentication request to the real-name authentication node.
When the information receiving node receives the identity information of the user, the information receiving node sends an identity authentication request to the real-name authentication node so as to authenticate the identity information of the user. In this embodiment, the information receiving node is an express information system, and the real-name authentication node is a network identification system of a public security department.
And step S3, responding to the passing of the authentication request, and generating an electronic identity by the real-name authentication node.
And the real-name authentication node authenticates the received identity authentication request, and generates the electronic identity identifier of the identity information when the authentication is passed. The process of authenticating the real-name authentication node is to compare the received identity information with all the identity information in the real-name authentication node and judge whether the identity information exists really. When the real-name authentication node has identity information matched with the received identity information, the authentication is passed, and the real-name authentication node generates an electronic identity of the identity information. In this embodiment, the electronic identity is a network electronic identity signed by a network identity recognition system of a citizen of the ministry of public security, and cannot be changed. The electronic identity label can identify identity remotely on line on the premise of not revealing identity information.
And step S4, the real-name authentication node sends the electronic identity and the authentication result to the information receiving node.
And after the real-name authentication node passes the authentication, generating an electronic identity of the identity information. And then the electronic identity and the authentication result are sent to an information receiving node. The authentication result is used for prompting that the identity information received by the information receiving node is real, and subsequent sending operation can be carried out. In another optional implementation manner, when the real-name authentication node fails in authentication, the corresponding failure result is sent to the information receiving node, the information receiving node is prompted that the identity information of the user does not exist, and the user can be refused to perform the next operation.
Step S5, the information receiving node receives the waybill generation request.
In this embodiment, the information receiving node may continue to receive the waybill generation request input by the user, that is, the specific information of the express mailing, according to the received authentication passing result. In this embodiment, the specific information of the express mail may include a recipient name, a recipient address, a recipient contact address, a sender name, a sender address, and a sender contact address.
And step S6, the information receiving node generates waybill information according to the waybill generation request.
And the information receiving node generates the waybill information according to the received waybill generation request. The waybill information can be an order number or a waybill code and the like. The specific information of the express delivery mailing can be prevented from being leaked in the subsequent transmission process in the waybill information mode.
And step S7, the information receiving node sends the waybill information and the electronic identity to an operation node.
And the information receiving node sends the generated waybill information and the electronic identity identification to the operation node. The operation node can be used for storing all waybill information and electronic identity marks so as to conveniently carry out unified management on a plurality of information receiving nodes. The waybill information and the electronic identity mark can avoid the leakage of the information and the identity information of the receiver and the sender in the transmission process. In this embodiment, the operation node may be a national postal service bureau, and is configured to uniformly manage operations of all express companies.
And step S8, the operation node forwards the waybill information and the electronic identity.
And step S9, the supervisory node detects objects corresponding to all waybill information according to a preset algorithm.
The operation node stores the received waybill information and the electronic identity mark and then forwards the received waybill information and the electronic identity mark to the supervision node, and the supervision node can detect actual objects of the waybill information according to a preset algorithm. For example, when the supervision node detects a problem express delivery with an improper rule or potential safety hazard, the corresponding electronic identity can be queried through waybill information on the problem express delivery. The supervision node can also detect the problem express through data modeling analysis, and then inquire the corresponding electronic identity through waybill information on the problem express.
And step S10, responding to the detected problem express, the supervision node sends the electronic identity of the problem express to the real-name authentication node.
And after the supervision node detects the problem express, the electronic identity of the problem express is sent to the real-name authentication node. In this embodiment, the problem express delivery refers to express delivery that does not comply with laws and regulations or has potential safety hazards.
And S11, the real-name authentication node queries and acquires corresponding identity information according to the electronic identity of the problem express.
And S12, encrypting the identity information of the electronic identity of the problem express by the real-name authentication node.
After the real-name authentication node inquires the identity information corresponding to the electronic identity of the problem express, encrypting the identity information through a secret key to generate an identity information ciphertext. In this embodiment, the real-name authentication node and the supervision node have keys stored therein in advance, and may encrypt and decrypt identity information. In this embodiment, the key may be a symmetric key or an asymmetric key. The identity information can be prevented from being leaked in the subsequent transmission process in a ciphertext mode, and the security of identity information transmission is improved.
And step S13, the real-name authentication node sends an identity information ciphertext to the supervision node.
And S14, the supervision node decrypts and associates the identity information with the problem express.
And after the real-name authentication node sends the identity information ciphertext to the supervision node, the supervision node decrypts the identity information ciphertext through the secret key. And then, the acquired identity information of the sender is associated with the problematic express delivery, so that the sender of the problematic express delivery can be quickly inquired, and the supervision of the problematic express delivery and the sender is realized. In this embodiment, the supervisory node may be a logistics security supervisory system that is posted by the ministry of public security.
The embodiment of the invention carries out real-name authentication on the identity information through the real-name authentication node, generates the non-modifiable electronic identity for transmission, can effectively solve the problem of leakage of user information in the real-name system execution process of the express industry, and simultaneously meets the requirement of effective supervision of government departments.
Fig. 4 is a schematic configuration diagram of a data processing system according to a fourth embodiment of the present invention. As shown in fig. 4, the data processing system 4 includes an information receiving node 41, a real-name authentication node 42, an operation node 43, and a supervisory node 44. The information receiving node 41 is configured to send an identity authentication request to the real-name authentication node 42 in response to receiving the identity information, generate waybill information from the waybill generation request in response to receiving the waybill generation request, and send the waybill information and the electronic identity to the operation node 43. The real-name authentication node 42 is configured to generate an electronic identity in response to the passing of the authentication request, send the electronic identity and an authentication result to the information receiving node 41, receive the electronic identity of the problem express sent by the supervision node 44, obtain corresponding identity information according to the query of the electronic identity of the problem express, encrypt and send the identity information of the electronic identity of the problem express. The operation node 43 is configured to forward the waybill information and the electronic identity identifier sent by the information receiving node 41. The supervision node 44 is configured to detect objects corresponding to all waybill information according to a predetermined algorithm, send an electronic identity of the problem express to the real-name authentication node 42 in response to detection of the problem express, receive identity information of the electronic identity of the problem express, and associate the identity information of the electronic identity of the problem express with the problem express.
Fig. 5 is a schematic view of an electronic device according to a fifth embodiment of the present invention. The electronic device shown in fig. 5 is a general-purpose data processing apparatus comprising a general-purpose computer hardware structure including at least a processor 51 and a memory 52. The processor 51 and the memory 52 are connected by a bus 53. The memory 52 is adapted to store instructions or programs executable by the processor 51. The processor 51 may be a stand-alone microprocessor or a collection of one or more microprocessors. Thus, the processor 51 implements the processing of data and the control of other devices by executing instructions stored by the memory 52 to perform the method flows of embodiments of the present invention as described above. The bus 53 connects the above components together, and also connects the above components to a display controller 54 and a display device and an input/output (I/O) device 55. Input/output (I/O) devices 55 may be a mouse, keyboard, modem, network interface, touch input device, motion sensing input device, printer, and other devices known in the art. Typically, the input/output device 55 is connected to the system through an input/output (I/O) controller 56. Preferably, the electronic device of the present embodiment is a server.
Also, as will be appreciated by one skilled in the art, aspects of embodiments of the present invention may be embodied as a system, method or computer program product. Accordingly, various aspects of embodiments of the invention may take the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," module "or" system. Further, aspects of the invention may take the form of: a computer program product embodied in one or more computer readable media having computer readable program code embodied thereon.
Any combination of one or more computer-readable media may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of embodiments of the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to: electromagnetic, optical, or any suitable combination thereof. The computer readable signal medium may be any of the following computer readable media: is not a computer readable storage medium and may communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including AN object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
The flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention described above describe various aspects of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of data processing, comprising:
receiving an identity authentication request sent by an information receiving node, wherein the identity authentication request comprises identity information;
responding to the identity authentication request and passing the authentication, and generating an electronic identity;
and sending the electronic identity and the authentication result to an information receiving node.
2. The data processing method of claim 1, wherein the method further comprises:
receiving an electronic identity of a problem express sent by a supervision node, wherein the electronic identity is obtained through waybill information bound with the electronic identity;
inquiring and acquiring corresponding identity information according to the electronic identity of the problem express;
encrypting the identity information of the electronic identity of the problem express;
and sending the identity information ciphertext of the electronic identity of the problem express to a supervision node.
3. The data processing method of claim 2, wherein the identity information of the electronic identity of the encrypted problem courier comprises:
and encrypting the identity information of the electronic identity identifier of the problem express according to the secret key to generate an identity information ciphertext.
4. The data processing method of claim 3, wherein the key is a symmetric key or an asymmetric key; the identity information includes an identification number.
5. A method of data processing, comprising:
in response to receiving the identity information, sending an identity authentication request;
receiving an electronic identity and an authentication result, wherein the electronic identity is generated according to the identity information;
generating waybill information in response to receiving a waybill generation request;
and sending the waybill information and the electronic identity mark.
6. The data processing method of claim 5, wherein the waybill generation request includes a recipient name, a recipient address, a recipient contact address, a sender name, a sender address, a sender contact address.
7. A method of data processing, comprising:
in response to receiving the identity information, the information receiving node sends an identity authentication request to the real-name authentication node;
responding to the identity authentication request and passing the authentication, and generating an electronic identity by the real-name authentication node;
the real-name authentication node sends the electronic identity and the authentication result to the information receiving node;
in response to receiving the waybill generation request, the information receiving node generates waybill information;
the operation node transmits the waybill information and the electronic identity mark which are sent by the information receiving node;
the supervision node detects objects corresponding to all waybill information according to a preset algorithm;
in response to the detection of the problematic express, the supervision node sends an electronic identity of the problematic express to the real-name authentication node, wherein the electronic identity is obtained through waybill information bound with the electronic identity;
the real-name authentication node inquires and acquires corresponding identity information according to the electronic identity of the problem express;
encrypting and sending the identity information of the problem express electronic identity by the real-name authentication node;
and the supervision node associates the identity information of the problem express electronic identity with the problem express.
8. A data processing system comprises an information receiving node, a real-name authentication node, an operation node and a supervision node, wherein,
the information receiving node is used for responding to the received identity information, sending an identity authentication request to the real-name authentication node, responding to the received waybill generation request, generating waybill information and sending the waybill information and the electronic identity identifier to the operation node;
the real-name authentication node is used for responding to the passing of the authentication request authentication, generating an electronic identity, sending the electronic identity and an authentication result to the information receiving node, receiving the electronic identity of the problem express sent by the supervision node, inquiring and acquiring corresponding identity information according to the electronic identity of the problem express, encrypting and sending the identity information of the electronic identity of the problem express to the supervision node;
the operation node is used for forwarding the waybill information and the electronic identity mark sent by the information receiving node;
the monitoring node is used for detecting objects corresponding to all waybill information according to a preset algorithm, responding to the detection of problem express, sending an electronic identity of the problem express to the real-name authentication node, receiving identity information of the electronic identity of the problem express, and associating the identity information of the electronic identity of the problem express with the problem express, wherein the electronic identity of the problem express is the electronic identity bound with the waybill information of the problem express.
9. An electronic device comprising a memory and a processor, wherein the memory is configured to store one or more computer program instructions, wherein the one or more computer program instructions are executed by the processor to implement the method of any of claims 1-6.
10. A computer-readable storage medium on which computer program instructions are stored, which, when executed by a processor, implement the method of any one of claims 1-6.
CN201910100140.9A 2019-01-31 2019-01-31 Data processing method, system, electronic device and computer readable storage medium Pending CN111506894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910100140.9A CN111506894A (en) 2019-01-31 2019-01-31 Data processing method, system, electronic device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910100140.9A CN111506894A (en) 2019-01-31 2019-01-31 Data processing method, system, electronic device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111506894A true CN111506894A (en) 2020-08-07

Family

ID=71863823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910100140.9A Pending CN111506894A (en) 2019-01-31 2019-01-31 Data processing method, system, electronic device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111506894A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554032A (en) * 2016-02-03 2016-05-04 深圳支付界科技有限公司 Identity real-name authentication method and authentication system based on express sending
CN106487518A (en) * 2016-10-31 2017-03-08 金联汇通信息技术有限公司 A kind of real-name authentication system and method for express delivery industry
CN106712958A (en) * 2015-12-06 2017-05-24 杨斌 Information collection method and system and real name system information collection method, system and application
CN106709842A (en) * 2016-12-08 2017-05-24 杭州晟元数据安全技术股份有限公司 High-efficiency safe express delivery real-name-system method
CN106875143A (en) * 2017-02-09 2017-06-20 江苏军物联网股份有限公司 A kind of express delivery system of real name supervisory systems and monitoring and managing method
CN107302435A (en) * 2017-07-21 2017-10-27 金联汇通信息技术有限公司 Identity information processing method, system and its corresponding server
CN108898196A (en) * 2018-06-20 2018-11-27 广州市公安局白云区分局 Logistics inspection monitoring method, device and type patrol terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712958A (en) * 2015-12-06 2017-05-24 杨斌 Information collection method and system and real name system information collection method, system and application
CN105554032A (en) * 2016-02-03 2016-05-04 深圳支付界科技有限公司 Identity real-name authentication method and authentication system based on express sending
CN106487518A (en) * 2016-10-31 2017-03-08 金联汇通信息技术有限公司 A kind of real-name authentication system and method for express delivery industry
CN106709842A (en) * 2016-12-08 2017-05-24 杭州晟元数据安全技术股份有限公司 High-efficiency safe express delivery real-name-system method
CN106875143A (en) * 2017-02-09 2017-06-20 江苏军物联网股份有限公司 A kind of express delivery system of real name supervisory systems and monitoring and managing method
CN107302435A (en) * 2017-07-21 2017-10-27 金联汇通信息技术有限公司 Identity information processing method, system and its corresponding server
CN108898196A (en) * 2018-06-20 2018-11-27 广州市公安局白云区分局 Logistics inspection monitoring method, device and type patrol terminal

Similar Documents

Publication Publication Date Title
CN107180175B (en) Distribution method, distribution device, and distribution system
US10298578B2 (en) Communication relay device, communication network, and communication relay method
CN104008351B (en) Window application completeness check system, method and device
CN103929411B (en) Information displaying method, terminal, safety server and system
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN109302501B (en) Industrial control data storage method, device and system based on block chain technology
CN104216830B (en) Method and system for detecting consistency of equipment software
CN106790156A (en) A kind of smart machine binding method and device
CN105205705A (en) Method and apparatus of automatic entrance into account book of electronic invoice
CN104268716A (en) Electronic commerce information processing method, electronic commerce server and electronic invoice server
CN110071937B (en) Login method, system and storage medium based on block chain
CN102571355A (en) Method and device for importing secret key without landing
CN102404107B (en) A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal
CN107038540B (en) Method and device for object type distribution based on intelligent bar code
CN111506894A (en) Data processing method, system, electronic device and computer readable storage medium
CN111510421B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN109472667A (en) Airline tickets management method and device
CN109218009B (en) Method, client and server for improving equipment ID security
CN111510416A (en) Data information transmission method, electronic device and readable storage medium
CN103984973A (en) Quality testing anti-fake control method based on two-dimensional bar code application
CN211557285U (en) Control terminal, signature server and task server
CN104252591A (en) Authorization and information encrypted communication method based on USBKey
CN111382050B (en) Network service interface testing method and device
CN108182777B (en) Alarm method, device and system based on laser correlation technology
CN111083164A (en) Safety protection method of industrial control system and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200807

RJ01 Rejection of invention patent application after publication