期刊文献+

基于物联网印章的银行支票交易系统

Study on bank check transaction system based on IOT seal
下载PDF
导出
摘要 利用假冒印章及盗用印章进行非法支票交易的经济犯罪对正常的金融秩序构成极大威胁,为了解决银行支票交易过程中的潜在风险,提出了一种基于物联网印章技术的银行支票交易系统解决方案。该方案采用物联网技术对印章的使用进行实时监控,并采用AES加密算法对印章、支票等业务信息进行加密,最后在银行端进行解密验证业务。结果表明,本方案能有效防止利用假冒印章及盗用印章来进行非法支票交易活动,可为银行支票交易安全提供保障。 Using counterfeit or stolen seals to carry out illcgall check transactions poses a great threat to the normal function of the financial order. In order to avoid the potential risks in the process of bank check transaction, the paper proposes a solution that is based on the seal of the Internet of Things (IOT) technology. In the paper, IOT technology is used to monitor the seal usage in a real-time manner, AES encryption algorithm is taken to encrypt the service information, including seals, checks, etc and decryption is implemented at the bank side. Results show that the proposed solution can effectively avoid using counterfeit or stolen seals to carry out illegall check transactions, which offers protection for the safety of bank cheek transactions.
作者 罗志伟 王瑜
出处 《物联网技术》 2012年第8期24-27,共4页 Internet of things technologies
基金 成都高新区地方创新基金(09DFCXYB024)
关键词 印章 支票 物联网 AES加密算法 seal check IOT AES encryption algorithm
  • 相关文献

参考文献11

  • 1ITU Strategy and Policy Unit (SPU). ITU internet reports 2005:the Internet of Things[R].Geneva:International Telecommunication Union (ITU),2005.
  • 2孙利民;李建中;陈渝.无线传感器网络[M]北京:清华大学出版社,2005.
  • 3杨博,王磊,杨创业.我国无线通信技术的发展和应用研究[J].电脑知识与技术(过刊),2010,0(18):4912-4913. 被引量:21
  • 4任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 5高守纬;吴灿阳.ZigBee 技术实践教程:基于 CC2430/31的无线传感器网络解决方案[M]北京:北京航空航天大学出版社,2009.
  • 6张洁,朱丽娟.DES加密算法分析与实现[J].软件导刊,2007,6(2):95-97. 被引量:17
  • 7张福泰;李继国;王晓明.密码学教程[M]武汉:武汉大学出版社,2006.
  • 8NECHVATAL J,BARKER E,BASSHAM L. Report on the development of the advanced encryption standard (AES)[OL].http:/ csrc.nist.gov/encryption/aes/index.html,2001.
  • 9DAEMEN J,RIJMEN V. Rijndael: the advanced encryption standard[J].Dr Dobbs Journa1,2001.137-139.
  • 10CHUNG Chin-ho,CHEN Wen-yuan,TU Ching-ming. Image hidden technique using QR-barcode[A].Kyoto,Japan:Computer & Socitey,2009.522-524.

二级参考文献37

  • 1ALERT. http://www.altersystem.org.
  • 2Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 3Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.
  • 4Sensor Webs. http://sensorwebs.jpl.nasa.gov/.
  • 5Shill E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the ACM MobiCom 2001. Rome: ACM Press, 2001. 272-286.
  • 6Akyildiz I.F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4):393~422.
  • 7Asada G, Dong M, Lin TS, Newberg F, Pottle .G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15-20.
  • 8Sohrabi K, Pottie GJ. Performance of a novel self-organization protocol for wireless Ad hoc sensor networks. In: Proceedings of the IEEE 50th Vehicular Technology Conference. Amsterdam, 1999. 1222~1226.
  • 9Sinhua A, Chandrakasan A. Dynamic power management in wireless sensor network. IEEE Design and Test of Computer, 2001,18(2):62~74.
  • 10Lm C, Kim H, Ha S. Dynamic voltage scheduling technique for low-power multimedia application using buffers. In: Proceedings of the International Symposium on Low Power Electronics and Design. California: ACM Portal Press, 2001. 34~39.http://eeserver.korea.ac.kr/-bk21/arch/bk21 conf/26.pdf.

共引文献1743

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部