Font Size: a A A

Design Of Asymmetric Encryption2-dimensional Code Anti-counterfeit System

Posted on:2014-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:R K XieFull Text:PDF
GTID:2268330401967224Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In today’s market, economy develops and the market tends integration,counterfeit and shoddy goods flooded and seriously damaged the interests of consumersand producers. Existing anti-counterfeiting technology is widely used in various fieldsof production and living, but there is the problems of high cost, technical difficulty,easily clone security less than ideal. Although the government has increased the combatand management efforts, manufacturers use a variety of security technologies toprotect currency, notes, documents and other items especially for closely related todaily life, driven by the enormous benefits, lawless counterfeiters improve theircounterfeiting technology. Currency notes, documents, and other important productsare counterfeited, copied by adopting high-tech crime. As the growing number ofhigh-tech forgery crime, normal people feel more and more difficult to identify theproduct. On the one hand, we must continue to improve the anti-counterfeitingtechnology, increase the complexity level and cost of the counterfeiters’ forging andcopying the real, on the other hand how the public can quickly, accurately and easilyidentify the authenticity is the problem need to be urgently resolved.The main research of this thesis is on the currently widespread using of3Gphone, the real popular application of the two-dimensional code. We usetwo-dimensional code encoding and phone scanning decoding principle combined withkey encryption technology. After analyze the asymmetric encryption algorithm and theactual effect on the basis, we develop an asymmetric encryption of two-dimensionalcode system. Design and Implementation of the asymmetric encryption oftwo-dimensional code system will mainly involve asymmetric encryption anddecryption, two-dimensional code scanning recognition, mobile networkcommunication technology.The system possesses a high degree of confidentiality, low cost, easily beingidentified, which can effectively prevent the circulation of counterfeit goods on themarket. It can be widely used in all kinds of goods,documents,certificates,coupons.Its main innovation has the following four aspects: 1. As the producer widely released the built-in public key APP open, people candecode to identify the authenticity by their cell phones which are installed the APP,reaching mass scale security certification, any individual can be anywhere certificateauthenticity of identification, effectively overawing fraud crimes.2.The system can achieve real-time local identification, identify importantcurrency, securities, documents, certificates, diplomas, bills, commoditiesof special significance.3. The system uses a two-dimensional code for the encrypted information carrierwhich is low-cost and huge information storage capacity, and information is passedin a scanned image, can be quickly decoded which improves distinguished speed.4. The terminal authentication device is popular, convenient and practical. It’s notlimited to smart phones, laptops, net-books, IPAD, digital cameras but also otherdigital products which can be used as authentication terminal equipment. Moneydetectors can be coupled with scanning functions and loaded the relevant procedures onthe authenticity.5. The system can prevent the counterfeiting of means by completely cloning genuinegoods, enhance security capabilities.
Keywords/Search Tags:Asymmetric encryption, Two-dimension bar code, Anti-counterfeit
PDF Full Text Request
Related items