| Since the birth of the Internet,it has been changing people’s lives gradually,it keeps developing and penetrating into our lives.Traditional industries embraced the Internet one by one,which has created a lot of miracles.Electronic commerce is the product of the combination of Internet and the traditional business,it moves traditional offline transactions online,which brings so much convenience to people’s lives,however,there are various unsafe factors on the Internet,this is a challenge to e-commerce security.Firstly,after in-depth investigating,this paper describes the security situation and safety requirements of e-commerce in domestic and international,then does some in-depth research of e-commerce concerned security technologies,these technologies include data encryption,authentication technology and secure transaction protocols.Secondly,in this paper,we study deceptions in the electronic commerce network,and analyze strengths and weaknesses of the traditional method based on MD5 digital signature.On this basis,we propose a method of security validation based on time and MD5 algorithm.This method combines traditional MD5 digest algorithm with validation based on time,having a double checking mechanism,this method is more efficient than traditional methods,besides,it can effectively prevent deception and distinguish repeated or invalid data packet.Security is the foundation and prerequisite of an e-commerce system,the purpose of research on security technology is to better service e-commerce systems.In this paper,through in-depth research on security technology,we laid a solid foundation for building secure and reliable e-commerce system.With systematic investigation,we decide to build an e-commerce system relying on security framework.Under this premise,we completely analyze module demands of the e-commerce system that is to be built,the logic flow of the e-commerce is designed according to module demands,based on modules and business logic process,we design the database system of e-commerce system and determine the tables and fields need.Finally,we chose appropriate technology and rational design,build a secure and reliable e-commerce system. |