面向移动应用的电子优惠券隐私保护研究
发布时间:2018-04-01 04:44
本文选题:身份认证 切入点:生物识别技术 出处:《沈阳师范大学》2017年硕士论文
【摘要】:现如今,随着移动电子商务界的快速发展,与互联网相关的许多服务例如股票交换、网上购物和银行业务逐渐成为人们生活中不可缺少的部分,消费者大多采用网上支付的方式,而电子优惠券的出现,无疑为消费者群体带来便捷的优惠,电子优惠券的种类繁多,越来越多的人在购物时都会使用电子优惠券,但随之而来的是网络信息安全问题日趋严重,目前已发生很多起盗取私人信息及财务的事件,因此人们广泛研究认证方案及密钥协商协议。本文主要针对电子优惠券环境下的网络安全问题进行了深入的研究,提出了基于生物识别技术的一次性口令认证方案,采用生物识别认证技术与一次性口令相结合的方式,搭建了电子优惠券环境下的网络密钥协议。首先通过对基本理论知识的简单介绍,我们知道了生物识别技术有着唯一性与不可替代性的特点,且生物特征的采集成本极低,一次性口令使得用户在登录过程中加入了更多不可预知的因素,利用哈希函数构建密钥,避免许多消耗算法,这样就为消费者的身份识别与认证提供了巨大的安全保障,有效的防止了攻击者通过各种非法途径的攻击,实现高可靠性、高效率的电子优惠券系统。本文对该密钥协议的各个环节进行了重点说明、详细的给出算法步骤,包括电子优惠券用户的注册阶段、电子优惠券的发行阶段、电子优惠券的下载阶段、一次性口令更新阶段,然后给出安全性分析以及效率分析,最后总结电子优惠券环境下的密钥协议并对该网络密钥协议进行展望。
[Abstract]:Nowadays, with the rapid development of mobile e-commerce, many Internet-related services such as stock exchange, online shopping and banking have become an indispensable part of people's lives. Consumers mostly pay online, and the emergence of electronic coupons undoubtedly brings convenience to consumers. There are a wide variety of electronic coupons, and more and more people will use electronic coupons when shopping. However, the problem of network information security is becoming more and more serious. At present, there have been many incidents of theft of private information and financial resources. Therefore, the authentication scheme and key agreement protocol are widely studied. In this paper, a one-off password authentication scheme based on biometrics is proposed, which focuses on the network security in the electronic coupons environment. The network key protocol under the environment of electronic coupons is constructed by combining biometric authentication technology with one-off password. Firstly, the basic theoretical knowledge is briefly introduced. We know that biometric technology has the characteristics of uniqueness and irreplaceable, and the cost of biometric acquisition is very low. The one-time password makes users add more unpredictable factors to the login process. By using hash function to construct key and avoid many consuming algorithms, it provides huge security for the identification and authentication of consumers, effectively prevents attackers from attacking by various illegal ways, and achieves high reliability. This paper focuses on each link of the key protocol, and gives the algorithm steps in detail, including the registration stage of electronic coupons users, the issuing stage of electronic coupons. The downloading stage of electronic coupons, the one-off password updating stage, and the security analysis and efficiency analysis are given. Finally, the key protocol under the environment of electronic coupons is summarized and the network key protocol is prospected.
【学位授予单位】:沈阳师范大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:F724.6;F832.2;TP309
【参考文献】
相关期刊论文 前8条
1 方植彬;;信息与通信网络安全技术——生物识别技术[J];电子产品可靠性与环境试验;2014年05期
2 任伟;;密码学与现代密码学研究[J];信息网络安全;2011年08期
3 张U,
本文编号:1694033
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/1694033.html