Font Size: a A A

Research And Implementation Of A Technology Of Certificate Authentication Based On Two-Dimensional Code

Posted on:2016-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:L PanFull Text:PDF
GTID:2298330467993180Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Today’s society is experiencing an age of needing "proof", identity authentication and certification has been involved in various aspects of people’s life. Certificate authentication technology as another important topic in the field of information security has attracted more and more attention of the whole society, it is directly related to national security and economic development, an effective means of certificate authentication plays a very active role in maintaining social balance and stability of the institutionalized management.This thesis aimed at the existing immature authentication mechanism, analyzed the characteristics of the common authentication technology, designed a system architecture based on hash、encryption technology and two-dimensional code technology, realized and evaluated each function module of the system, the evaluation results proved the superiority and feasibility of the proposed system. The main research work was as followed:(1) Proposed a certificate authentication system architecture based on QR two-dimensional code, AES algorithm and SHA-256. Compared with the system using traditional materials, RFID, biological identification and digital watermarking security authentication technology, this system supported dual channel authentication operation, while considering the certification effectiveness, it also emphasized the protection of the privacy of documents and personal information. The system supported error-free recognition, solved the problem of "witness identity". Based on the mass user credential background, the system can make up for the existing defect on combined technology of DES, RSA, Data Matrix in key management, algorithm of security, implementing efficiency.(2) Designed and implemented a certificate authentication system. Detailed designed the main points of each function module, implemented the key technology of the authentication system. Introduced the evidence of checks to solve the problem of "multi certificate" can’t be verified; used the AES algorithm to realize the certificate data protection; used the holder’s identity and the period of validity of the certificate as the key generation parameters to realize non single authentication and timeliness authentication, to implement the key’s automatic generation, to avoid the risk of transmitting keys; used QR two-dimensional code technology to implement authentication information’s storage and display, to improve system stability.(3) Carry out the function and the performance evaluation of the proposed authentication system. Analysis of information literacy of QR code in5states, evaluate system’s authentication ability in the face of documents in the conventional or special circumstances. To simulate the existing documents forged and illegal use, focus on evaluating the system logic to the reliability and feasibility of effective certificate audition.This system improved the existing certificate authentication mechanism from Ihree dimensions of the security, authentication and applicability, achieved the desired design goals. Put forward the further optimized scheme aims at functions and technical key points of the system, fully prepared for subsequent in-depth study.
Keywords/Search Tags:AES encryption algorithm, SHA-256hash, QR codecertificate authentication
PDF Full Text Request
Related items