Font Size: a A A

Research And Implementation Of Drugs Receipt Authentication Technology Based On Two-dimensional Code

Posted on:2017-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:D T XuFull Text:PDF
GTID:2348330503967216Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of pharmaceutical industry in China, pharmaceuticals sales chains need to be managed scientifically and effectively. However, there lacks encryption and authentication procedure in getting Pharmaceuticals receipts, which makes it possible to modify and forge; an consumers have no way to defend their own legal rights and interests. In order to solve this phenomenon which attaches great importance to the need of improving China's core competitiveness in pharmaceutical industry, and of promoting the sustainable and healthy development of the pharmaceutical industry. The author puts forward a suggestion to adopt this technology in the Pharmaceuticals receipts, which will be conducive to the Pharmaceuticals consumers and seller certification procedure.This paper covers the following main research procedures:(1) This paper points out that the QR Code identification technology enjoys a rapid development presently.Based on the insufficiency of QR Code and the analysis of classical certification and encryption algorithm, the author designed a set of QR Code signature verification scheme suitable for pharmaceuticals receipts. This QR Code signature verification scheme is authenticated mainly with the actual record of buying medicine every time, the basic information element in the receipts and the company data. Thus, the receipt can not be forged and modified.(2) According to the above signature scheme, the system of medicamentarius purchasing pharmaceuticals and of consumers scanning QR code can be realized. The pharmacy system can the data of every purchase and print the receipts with a QR Code on it. Consumer code system can be obtained with an android phone to get certification results. The pharmacy purchasing system is realized through J2 EE development platform, SSH framework support technology, Ali Cloud server,MySQL database data storage, Seven Cows photo storage interface, and the front-end technology such as JavaScript and CSS.(3) In this paper, efficiency and safety of the system is analyzed at the same time. On the signature algorithm, the author compared the advantages anddisadvantages of several signature algorithm. The author adopted authority management and interface design on the structure design so that the common network attack can be effectively prevented. A reasonable scheme implementation would be chosen according to the actual situation, which will effectively improve the performance of the system.
Keywords/Search Tags:RSA, DSA, digital signature, QR Code, Secure authentication
PDF Full Text Request
Related items