Font Size: a A A

Research And Implementation Of Merchandise Security Based On QR Code

Posted on:2014-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:W W WangFull Text:PDF
GTID:2248330398972298Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the mobile Internet development and the improvement of people’s living standards, the number of smart phone users grows strongly. So that mobile phone applications are involved into the consumers’ life. Two-dimension code is widely downloaded as a mobile application. The anti-counterfeiting technology of the two-dimension code systems are developed late in our country. But due to the rapid development of the QR Code, QR Code is adopted as the one of anti-counterfeiting means by the some banks and enterprises such as The People’s Bank of China. QR Code is also printed on Ministry of Railways’s new version of train tickets.There are two anti-counterfeiting technology such as DES using symmetric key encryption algorithms and RSA using asymmetric key encryption algorithms. The subject uses the RSA algorithm:the server side stores private key to encrypt and generate QR Code. The mobile client uses the corresponding public key to decrypt, and then takes the public key information to request the server-side data. If the public key is verified by the server, the server sends data in JSON format to the mobile client. Then the mobile client parses the data and displays to the consumer.The main subject of the research is based on QR code’s commercial security application, and then for the design and implementation. The paper describes the background knowledge as well as the anti-counterfeiting technology of two-dimension code, and introduces terms, techniques and related algorithms. The paper focuses on the introduction of the processes of the system, the operating environment of the system, system architecture, database design, as well as various functional modules’s implementation.Taking the highly concurrent access into account, the system is designed distributedly. The subject uses Nginx’s reverse proxy to load balanced. The front server uses Memcached cache, and the backend server uses Redis. Database uses a master-slave replication technology architecture. Meeting these needs can solve some of the current facing bottlenecks.Finally, the paper will summarize the subjects and give the outlook, and then propose the shortcomings of the system and next-step work.
Keywords/Search Tags:Two-dimension Code, Traceable Security, Load Balance, Distributed Systems, RSA
PDF Full Text Request
Related items