Font Size: a A A

A Study On Security Application Of The 2D Bar Code Technology In Mobile Terminal

Posted on:2016-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:2308330461957059Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The two-dimensional code is not only the information carrier, but also an important method of information collection, dissemination. With the rapid popularization of intelligent terminals and mobile network, the two-dimensional code technology has been widely used in the field of mobile e-commerce, text input, food safety management. Because part of the two-dimensional code containing digital information is sensitive, especially in the field of electronic commerce, the two-dimensional code as the application of electronic documents, how to prevent the two-dimensional code information being stolen or tampered with, is directly related to the interests of consumers and businesses, so that ensure the two-dimensional code information security is necessary, research the two-dimensional code technology how to security application in the mobile terminal is of great significance.This topic is in the electronic commerce OTO (Online To Online, payment via the Internet, To the entity shop) business model under the background of rapid development, and researches on the security requirements of the two-dimensional code of the enterprises. First of all, the theory preparation stage, understand the development course of two-dimensional code, type, coding principle and application, and analyzes the advantages and disadvantages between various types of two-dimensional code, select the has a wide range of application of QR codes for the research object of this paper. By mastering the principle of encryption technology and analysis the advantages and disadvantages of all kinds of encryption algorithms, fully considering the balance between economic efficiency and security, select the RSA public key encryption algorithm is applied to encrypt QR code, and optimize the RSA encryption algorithm; Secondly, the paper puts forward the two-dimensional code security application system, based on PKI (Public Key Infrastructure) Public Key system prototype, including Key generation and management module, encryption the two-dimensional code generation module and encryption the two-dimensional code identification module, respectively corresponding to the PKI Public Key system certification center (the two-dimensional code management platform), service providers and consumer goods three roles; Again, build a QR code Android development platform, transplant OpenCV image processing (Open Source Computer Vision Library, Computer Vision Library) Library and camera driver, by the program realize the QR code generated, identification, encryption and decryption, through QR code terminal connected to the QR code management platform, the test results show that this system can guarantee the QR code information security in the process of generation, transmission and read。Characteristics of this paper is to optimize the RSA encryption algorithm, improves the speed of the RSA to encrypt data, and adopt closed key management scheme, can in the case of short key length, higher security, more conducive to enterprise business applications. Specifically, the asymmetric algorithm of private and public keys by QR code platform unified management, each generated QR code must apply to the public key, also must apply to the private key authentication, will break the traditional public key distributed, by increasing the length of key, to ensure the safety of digital information.
Keywords/Search Tags:The two-dimensional code, Mobile terminal, RSA encryption algorithm, PKIpublic key system, OTO business model
PDF Full Text Request
Related items