Font Size: a A A

Design And Implementation Of The Credit Card Business POS Key Management System Based On VoIP

Posted on:2016-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:F FangFull Text:PDF
GTID:2308330473955973Subject:Software engineering
Abstract/Summary:PDF Full Text Request
POS machine manufacturers more complicated, more and more consumers own security concerns, someday, POS machines need to be able to select customized Vo IP encryption to ensure the confidentiality of user information. For this reason, research Vo IP communication key management scheme, it is very necessary.This paper studies the Vo IP system applies POS machine communication card key management scheme. First, in the context of the research, analyzing current developments in Vo IP communication systems, are particularly concerned about the special nature of their network environment. Secondly, the analysis of system requirements and design VoIP key management scheme. Research current Vo IP systems major communication protocols, as well as in the presence of Vo IP communication systems security issues and major security countermeasures. Third, the overall structure of the system design. The overall architecture and security sub-module design, and research related to key management security technology solutions expertise. Fourth, the design and implementation of Vo IP secure communication systems. First, the security module hardware design and implementation, and then design the two separate identities and trigeminal key tree based on bilinear Diffie-Hellman assumption that both sides can be certified and distributed multi-party key agreement scheme key management scheme, and through analysis verify the validity of these two programs, the last time embedded applications to achieve this in two key management software solutions.This paper implements the VoIP security terminal, according to a key implementations for data encryption and decryption for end to end encryption, using a fully encrypted key management technology to achieve the security of Vo IP communications and real-time requirements, making Vo IP communications obtained secret a guarantee. Experimental data show, VoIP security after POS terminals communicate between multiple sets of two terminals repeatedly tested by packet capture analysis, the system is stable and reliable, no loss, the audio signal and a clear and vivid picture no obvious distortion, POS confidential state communication is successful, another key negotiation text data throughput and time-consuming in the acceptable range.
Keywords/Search Tags:Voice over Internet Protocol, key management, point of sale terminals, handling capacity
PDF Full Text Request
Related items