[1]张丰,施勇,薛质. 二维QR码在电子商务中应用的安全性研究[J].计算机技术与发展,2017,27(03):131-135.
 ZHANG Feng,SHI Yong,XUE Zhi. Research on Security of Application of 2-Dimentional QR Code in Electronic Commerce[J].,2017,27(03):131-135.
点击复制

 二维QR码在电子商务中应用的安全性研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年03期
页码:
131-135
栏目:
安全与防范
出版日期:
2017-03-10

文章信息/Info

Title:
 Research on Security of Application of 2-Dimentional QR Code in Electronic Commerce
文章编号:
1673-629X(2017)03-0131-05
作者:
 张丰施勇薛质
 上海交通大学 电子信息与电气工程学院;上海市信息安全综合管理技术研究重点实验室
Author(s):
 ZHANG FengSHI YongXUE Zhi
关键词:
 二维QR码电子商务安全性研究
Keywords:
 2-Dimentional QR codeE-commercesecurity study
分类号:
TP393
文献标志码:
A
摘要:
 近年来,二维QR码在电子商务中的应用越来越广泛,但是随之也出现了许多关于二维码的安全问题.因此,主要采用文献调研以及实验实践的方法,研究了二维QR码在电子商务中的应用以及安全性问题.对二维QR码的构成、来源、特点进行了概述,对二维QR码在当今电子商务中各个方面的应用,如安全登录、扫描购物、电子凭证、二维码支付等,进行了介绍,并对二维QR码在电子商务应用中的安全性问题,如物理攻击、隐私泄露、扫描攻击等,进行了总结.从信息安全具体的安全属性出发,总结和提出了对二维码内容进行加密、对发布者发布的二维码提供身份认证机制这两大改进方向.
Abstract:
 In recent years,the application of 2-Dimentional (2D) QR code has more and more extensive in E-commerce,accompanying with many security issues. Hence,the application and security issue of QR code in the E-commerce are studied by means of document re-search and experiment. The formation,origin and features of 2D QR code are summed up,diverse applications of QR code in current E-commerce including secure login,scanning shopping,electronic certificate,2-Dimensional code payment are introduced,and the emerging security issues such as physical attacks,privacy divulging,scanning attacks and so on summarized. Finally,by referring the attributions of information security,two improving ways of encryption of 2D code contents and offering authentication of the issued specific 2D code are summed up.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(03):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(03):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(03):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(03):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(03):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(03):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(03):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(03):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(03):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(03):47.

更新日期/Last Update: 2017-05-18