非对称加密二维码防伪系统的设计南阳理工学院本科毕业设计(论文)非对称加密二维码防伪系统的设计Two-dimensionalcodedesignedasymmetricencryptionsecuritysystem学院(系):计算机与信息工程学院专业:计算机科学与技术(信息安全方向)学生姓名:胡仁东学号:1106655089指导教师(职称):张芳(讲师)评阅教师:完成日期:2015年5月南阳理工学院NanyangInstituteofTechnology非对称加密二维码防伪系统的设计非对称加密二维码防伪系统的设计计算机科学与技术(信息安全方向)专业胡仁东[摘要]长期以来,层出不穷的假冒伪劣产品严重危及着生产企业和广大消费者的利益,极大程度的影响了国家经济发展。如何找到一个理想的防伪手端,能够很好的解决伪劣产品的泛滥问题,是人们长期致力于的研究之一。本文论述了一种基于非对称加密技术和二维码防伪技术进行防伪的方法。将商品的唯一编码用非对称加密RSA算法进行加密处理后,生成一个相应的QR二维码图标,并将图标印制到生产的商品上,随着商品一起进行流通;当消费者购买商品之后,可以利用安装有专用二维码扫码器的智能手机,对QR二维码图标进行解读,将解读出的商品编码在服务器数据库中进行查找,根据查找到的信息来判断商品的真伪。该防伪查询系统的推出,不但维护了消费者和生产厂家的合法权益,减少损失,而且还为广大企业提高了信誉度,树立了品牌形象,提高了市场竞争力。[关键词]二维码;RSA算法;数码防伪;非对称加密二维码防伪系统的设计Asymmetricencryptionisatwo-dimensionalcodesecuritysystemAbstract:Foralongtime,anendlessstreamoffakeandshoddyproductsseriouslyjeopardizetheinterestsofproducersandconsumers,greatlyaffectedthecountry'seconomicdevelopment.Howtofindanidealsecurityhand-side,canbeagoodsolutiontotheproliferationofcounterfeitproducts,itisoneofthepeople'slong-termcommitment.Thispaperdiscussesamethodbasedonasymmetricencryptiontechnologyandtwo-dimensionalcodessecurityanti-counterfeitingtechnology.TheuniquecodeofgoodsusingasymmetricencryptionalgorithmRSAencryptionprocessing,togenerateacorrespondingtwo-dimensionalQRcodeiconandaniconprintedontheproductionofgoods,togetherwiththecirculationofcommodities;laterwhenconsumersbuygoodsyoucanusetoinstallaspecialtwo-dimensionalcodescancodeissmartmobilephone,theQRcodeiconinterpretation,theinterpretationofthecommoditycodelookupintheserverdatabase,accordingtotheobtainedinformationtodeterminetheauthenticityofthegoods.Theintroductionofthesystemsecuritycheck,notonlytosafeguardthelegitimaterightsandinterestsofconsumersandmanufacturers,toreducetheloss,butalsoforthemajorityofenterprisestoimprovethecredibility,establishabrandimage,enhancethemarketcompetitiveness.Keywords:two-dimensionalcode;RSA;Digitalsecurity非对称加密二维码防伪系统的设计目录1绪论.......................................................................................................................................................11.1系统研究背景与意义................................................................................................................11.2二维码防伪系统的可行性分析................................................................................................21.3本文主要研究的内容................................................................................................................22理论基础...............................................................................................................................................22.1二维码理论基础........................................................................................................................32.1.1二维码的特点............................................................................................................32.1.2二维码的分类............................................................................................................42.1.3QR二维码...................................................................................................................42.2数据加密技术............................................................................................................................52.2.1对称式加密技术......................................................52.2.2对称加密算法........................................................62.2.3非对称式加密技术........................................................................................................62.2.4非对称加密算法............................................................................................................62.2.5非对称加密算法与对称加密算法的区别....................................................................62.3RSA算法....................................................................................................................................72.3.1RSA算法理论.................................................................................................................73系统需求分析和设计方案..........................................................83.1系统需求分析..............................................................83.1.1防伪系统的总体需求....................................................................................................83.1.2防伪系统的功能需求分析............................................................................................83.1.3防伪系统的性能需求分析............................................................................................93.2系统的总体设计思想..............................................................................................................103.3防伪系统的构架......................................................................................................................103.4防伪系统的工作流程..............................................................................................................114防伪系统设计.....................................................................................................................................134.1系统介绍..........................................................