Font Size: a A A

Security Certification And Application Research Based On The QR Code In Mobile Internet Environment

Posted on:2017-11-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y L LiuFull Text:PDF
GTID:2348330533450143Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In the 21 st century, ubiquitous computing is the developing trend of information technique. Mobile internet is one of the most influential technology in the field of computer. As the number of mobile internet users increases, the security of the mobile internet is receiving more and more attention. QR code, as the carrier of information in mobile internet, has been widely used from the web link and identity information transmission to the authentication service. Unfortunately, QR code may receive many threats due to mobile internet's openness. The sensitive information carried by QR code may be stolen by hacker during its transmission. Therefore, it is necessary to take action to protect the QR code during its transmission. In addition, the security of identity authentication is the basic service in kinds of mobile internet services. Now, many identity authentication services use static password method. But this method may has some hidden shortcomings, such as library hit, speculation and exhaustive attack, it is hackable. So it is important to design a safe authentication scheme base on mobile internet.This paper take QR code as research object, analyzed the security problem of QR code which base on mobile internet during its transmission, and also analyzed the problem of identity authentication using QR code base on mobile internet. Firstly, the author analyzed some security problems of QR code during its communication process.To avoid the threats of existing security problems, this paper put forward a QR code encryption mechanism based on the Z-mapping algorithm. This mechanism using Z-Mapping algorithm to encrypt QR code image in order to protect the content carried by QR code, research shows this mechanism has good security and feasibility. Secondly,the author studied and analyzed the existing identity authentication technologies and solutions, and also summarized the existing problems. Then this paper put forward identity authentication scheme based on QR in mobile internet. This scheme combines the QR code, chaotic encryption, mutual authentication and timestamp technology in order to enhances the security of user during identity authentication process. At the same time, experimental results show that the scheme has strong practicability.Research shows that the QR code encryption mechanism in this paper can effectively protect the information carried by QR code. Also, the identity authenticationscheme base on mobile internet in this paper has good security and feasibility. The two points in this paper complement each other and has reference value to protect the intelligent terminal base on mobile internet.
Keywords/Search Tags:Mobile internet, Intelligent terminal, QR code, Chaotic encryption, Id entity authentication
PDF Full Text Request
Related items